VB Blog

VB2016 paper: Mobile applications: a backdoor into the Internet of Things?

Posted by   Martijn Grooten on   Nov 29, 2016

While the Internet of Things blossoms with newly connected objects every day, the security and privacy of these objects is often overlooked, making the IoT a major security concern. Unfortunately, reverse-engineering so-called smart devices is not an easy task. In her VB2016 paper, Axelle Apvrille presented a novel way of analysing smart devices: by looking at the accompanying mobile app. Today, we publish both Axelle’s paper and the video recording of her VB2016 presentation.

Read more  

VB2016 paper: Wave your false flags! Deception tactics muddying attribution in targeted attacks

Posted by   Martijn Grooten on   Nov 21, 2016

Today, we publish the VB2016 paper and presentation (recording) by Kaspersky Lab researchers Juan Andrés Guerrero-Saade and Brian Bartholomew, in which they look at some of the deception tactics used in targeted attacks.

Read more  

Throwback Thursday: The Politics of Anti-Virus

Posted by   Helen Martin on   Nov 10, 2016

President-elect of the United States Donald Trump made a number of promises about cybersecurity during his electoral campaign. What comes of those pledges remains to be seen, but one thing is certain: there will be a team of hard-working, dedicated individuals working behind the scenes to protect the computer systems of Federal government agencies, as there have been for years. Back in 1999, VB published a report describing a day in the life of the Affiliated Computer Services Government Solutions Group (ACS GSG) - the group responsible for providing full service computer support to US Federal government agencies across the United States.

Read more  

VB2016 paper: The TAO of Automated Iframe Injectors - Building Drive-by Platforms For Fun

Posted by   Martijn Grooten on   Oct 18, 2016

We publish Aditya K. Sood's VB2016 paper on the use of iframe injectors by cybercriminals to deliver drive-by downloads.

Read more  

“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker

Posted by   Virus Bulletin on   Sep 26, 2016

An interview with VB2016’s keynote speaker Christine Whalley - Director, Governance and IT Risk Management at Pfizer

Read more  

Throwback Thursday: Following the Breadcrumbs

Posted by   Helen Martin on   Sep 22, 2016

In 1999, Christine Orshesky described how one large organization decided to find out how and where the viruses within it were being obtained so it could do more to protect its networks.

Read more  

VB2016 preview: Cryptography mistakes in malware

Posted by   Martijn Grooten on   Sep 15, 2016

At VB2016, two talks will discuss mistakes made by malware authors in cryptographic implementations. Ben Herzog and Yaniv Balmas will present a paper in which they look at a number of these mistakes, while Malwarebytes researcher hasherezade will present a last-minute paper on making use of some of these mistakes to crack ransomware.

Read more  

GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016

Posted by   Virus Bulletin on   Sep 14, 2016

Next month at VB2016, HPE Security's Oleg Petrovsky will speak about attacks on GPS. We conducted a short interview with Oleg and asked him about GPS, about the conference, and about his ultimate dinner party.

Read more  

BSides Denver: Join and Support the Security Community

Posted by   Martijn Grooten on   Sep 13, 2016

If you are coming to VB2016 in Denver, why not spend an extra day in the Mile-High City and join the free BSides Denver conference, which takes place on Saturday?

Read more  

VB2016 'Last-Minute' Papers Announced

Posted by   Martijn Grooten on   Sep 13, 2016

We are excited to announce the addition of the "last-minute" papers to the VB2016 programme: nine presentations covering hot research topics, from OS X attacks to exotic APTs, breaking ransomware and the current state of BGP.

Read more  

Search blog

More than 50% of users regularly double-check for false positive spam filtering

Only 12% of users trust their spam filter sufficiently not to bother sifting through spam folder.
Only 12% of users trust their spam filter sufficiently not to bother sifting through spam folder. In a poll of more than 1,000 visitors to the VB website, 52% of users say they… https://www.virusbulletin.com/blog/2008/04/more-50-users-regularly-double-check-false-positive-spam-filtering/

HP ships infected USB keys

Autorun worms found on batch of server setup devices.
Autorun worms found on batch of server setup devices. A batch of USB thumb drives containing software intended to assist in the setup of servers have been found to contain some… https://www.virusbulletin.com/blog/2008/04/hp-ships-infected-usb-keys/

Latest Patch Tuesday update released

Microsoft announces five 'critical' vulnerabilities need fixing.
Microsoft announces five 'critical' vulnerabilities need fixing.Microsoft has issued its monthly 'Patch Tuesday' security bulletin, with five 'critical' and three 'important'… https://www.virusbulletin.com/blog/2008/04/latest-patch-tuesday-update-released/

'Kraken' monster botnet causing controversy

As latest botnet scare debated, Storm keeps on blowing.
As latest botnet scare debated, Storm keeps on blowing. Recent reports of a massive botnet, apparently sneaking its trojans past security software and far outnumbering better-known… https://www.virusbulletin.com/blog/2008/04/kraken-monster-botnet-causing-controversy/

Google Groups and Blogspot used to serve malware

Company finds own IP address to be serving most malware.
Company finds own IP address to be serving most malware.Malware writers have created thousands of Google Groups with the sole purpose of serving malware, Sunbelt reports. On the… https://www.virusbulletin.com/blog/2008/04/google-groups-and-blogspot-used-serve-malware/

Users of online banking 'should have adequate protection'

New UK banking code says customers who keep their PCs secure will not be responsible for losses due to online theft.
New UK banking code says customers who keep their PCs secure will not be responsible for losses due to online theft. A new banking code launched earlier this week by the British'… https://www.virusbulletin.com/blog/2008/04/users-online-banking-should-have-adequate-protection/

Average spam message size at record low

No decrease of bandwidth usage as number of spam messages keeps increasing.
No decrease of bandwidth usage as number of spam messages keeps increasing. The average size of spam messages has decreased to a record low of just over 2KB, security company… https://www.virusbulletin.com/blog/2008/04/average-spam-message-size-record-low/

Less than 30 per cent of smartphone users have AV installed

Experts disagree on the need for specialist mobile AV protection.
Experts disagree on the need for specialist mobile AV protection. In a poll only 19% of visitors to the VB website said they had anti-malware protection on their mobile phone.… https://www.virusbulletin.com/blog/2008/04/less-30-cent-smartphone-users-have-av-installed/

April

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2008/04/

Almost 90% of Americans feel safe online

Users' confidence does not match up with percentage of properly protected users.
Users' confidence does not match up with percentage of properly protected users. Research by StopBadware.org shows that 88% of Americans say they feel safe online, despite the… https://www.virusbulletin.com/blog/2008/04/almost-90-americans-feel-safe-online/

April Storm

April Fools' Day emails contain new variant of infamous worm.
April Fools' Day emails contain new variant of infamous worm. Security researchers report a new wave of spam emails being sent out. The emails, which use subject lines such as… https://www.virusbulletin.com/blog/2008/04/april-storm/

April issue of VB published

The April issue of Virus Bulletin is now available for subscribers to download.
The April issue of Virus Bulletin is now available for subscribers to download. The April 2008 issue of Virus Bulletin is now available for subscribers to browse online or… https://www.virusbulletin.com/blog/2008/04/april-issue-vb-published/

From Simple Mail to Hypertext

HTTP and FTP take over from SMTP as common malware spreading methods.
HTTP and FTP take over from SMTP as common malware spreading methods.A report from F-Secure has highlighted the recent shift in malware spreading methods from email to web-based… https://www.virusbulletin.com/blog/2008/03/simple-mail-hypertext/

Microsoft acquires Komoku

Anti-rootkit software to become part of Forefront and OneCare.
Anti-rootkit software to become part of Forefront and OneCare. Just before Easter, Microsoft announced it had acquired Komoku, a Maryland-based company that builds anti-rootkit… https://www.virusbulletin.com/blog/2008/03/microsoft-acquires-komoku/

Access flaw exploited via Word

Microsoft's employees hunting vulnerabilities instead of Easter eggs.
Microsoft's employees hunting vulnerabilities instead of Easter eggs. A buffer overrun vulnerability in Microsoft's Jet Database Engine, the underlying database behind Microsoft… https://www.virusbulletin.com/blog/2008/03/access-flaw-exploited-word/

Hoax email warns about 'nasty virus'

Phony advice causes removal of site from search engines.
Phony advice causes removal of site from search engines. Over the last few days an email, written in German, has been seen circulating warning users about a 'nasty virus' that is… https://www.virusbulletin.com/blog/2008/03/hoax-email-warns-about-nasty-virus/

Legitimate program becomes trojan downloader

Website of FlashGet attacked; malicious 'update' automatically downloaded.
Website of FlashGet attacked; malicious 'update' automatically downloaded. By hacking into the website of popular Windows download manager FlashGet, cybercriminals have managed to… https://www.virusbulletin.com/blog/2008/03/legitimate-program-becomes-trojan-downloader/

More 'trusted sites' carrying iframe danger

Big wave of website infections could affect tens of thousands of sites, Trend Micro latest victim.
Big wave of website infections could affect tens of thousands of sites, Trend Micro latest victim. Earlier this week McAfee reported a major outbreak of website infections, with as… https://www.virusbulletin.com/blog/2008/03/more-trusted-sites-carrying-iframe-danger/

EU agency research advises sweeping security improvements

ISPs and developers should be held to account, says report.
ISPs and developers should be held to account, says report. A research paper commissioned by the European Network and Information Security Agency (ENISA) has called for major… https://www.virusbulletin.com/blog/2008/03/eu-agency-research-advises-sweeping-security-improvements/

AV-test.org issues latest figures

In-depth testing covers multiple factors.
In-depth testing covers multiple factors. Independent testing body AV-Test.org has released its latest set of results, with a large group of products tested against a number of… https://www.virusbulletin.com/blog/2008/03/av-test-org-issues-latest-figures/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.