VB Blog

Transparency is essential when monitoring your users' activities

Posted by   Virus Bulletin on   Sep 20, 2017

Activity monitoring by security products in general, and HTTPS traffic inspection in particular, are sensitive issues in the security community. There is a time and a place for them, VB's Martijn Grooten argues, but only when they are done right.

Read more  

VB2017 preview: Android reverse engineering tools: not the usual suspects

Posted by   Martijn Grooten on   Sep 19, 2017

We preview the VB2017 paper by Fortinet researcher Axelle Apvrille, in which she looks at some less obvious tools for reverse engineering Android malware.

Read more  

Malicious CCleaner update points to a major weakness in our infrastructure

Posted by   Martijn Grooten on   Sep 18, 2017

Researchers from Cisco Talos have found that a recent version of the widely used CCleaner tool installed malware on the machine.

Read more  

Despite the profitability of ransomware there is a good reason why mining malware is thriving

Posted by   Virus Bulletin on   Sep 15, 2017

Though ransomware is far more profitable than using a compromised PC to mine bitcoins, the global distribution of malware means that there are many botnets for which mining is the most efficient way to extract money out of a PC.

Read more  

VB2017 preview: Crypton - exposing malware's deepest secrets

Posted by   Martijn Grooten on   Sep 14, 2017

We preview the VB2017 paper by Julia Karpin and Anna Dorfman (F5 networks), in which they present a tool to decrypt encrypted parts of malware.

Read more  

VB2017 preview: Hacktivism and website defacement: motivations, capabilities and potential threats

Posted by   Martijn Grooten on   Sep 13, 2017

We preview the VB2017 paper by Marco Romagna and Niek Jan van den Hout (The Hague University of Applied Sciences), in which they thoroughly analyse the motivations and modus operandy of hacktivists.

Read more  

Three questions to ask about security product bypasses

Posted by   Martijn Grooten on   Sep 13, 2017

Proof-of-concepts for bypasses of security products always sound scary, but how seriously should we take them? VB Editor Martijn Grooten lists three questions one should ask about any such bypass to determine how serious a threat it represents.

Read more  

VB2017: WHOIS and EICAR Small Talks added

Posted by   Martijn Grooten on   Sep 12, 2017

Today, we announce two more 'Small Talks' for the VB2017 programme. In one of them, Neil Schwarzman will discuss the consequences of the GDPR for WHOIS and abuse research, while the other will be hosted by three members of EICAR, who will discuss its work on a trustworthiness strategy and minimum standard.

Read more  

VB2017: nine last-minute papers announced

Posted by   Martijn Grooten on   Sep 11, 2017

From attacks on Ukraine's power grid to web shells, and from car hacking to ransomware: we announce the first nine 'last-minute' papers on the VB2017 programme.

Read more  

Patching is important even when it only shows the maturity of your security process

Posted by   Martijn Grooten on   Sep 5, 2017

A lot of vulnerabilities that are discovered are never exploited in the wild. It is still important to patch them though.

Read more  

Search blog

Fake malware infection alerts spammed out

Latest spam run masquerades as malware warning and fix.
Latest spam run masquerades as malware warning and fix. The group behind last week's Fourth of July spams are thought to be behind another campaign this week, with messages… https://www.virusbulletin.com/blog/2007/07/fake-malware-infection-alerts-spammed-out/

Google buys Postini

Managed security service snapped up by giant.
Managed security service snapped up by giant. Ever-expanding web giant Google has continued its growth into both security and software-as-service spheres with the $625 million… https://www.virusbulletin.com/blog/2007/07/google-buys-postini/

Trojan using webmail to send spam

Captcha systems possibly cracked to automate account creation.
Captcha systems possibly cracked to automate account creation.BitDefender has reported a new trojan attempting to bypass security measures on leading webmail systems Hotmail and… https://www.virusbulletin.com/blog/2007/07/trojan-using-webmail-send-spam/

Battle over Blackberry spyware threat

Spy tool for popular device claims to be legitimate.
Spy tool for popular device claims to be legitimate. The expansion of the FlexiSpy mobile device snooping software, originally available only for the Symbian platform but with… https://www.virusbulletin.com/blog/2007/07/battle-over-blackberry-spyware-threat/

Fourth of July targeted by trojan spam

Celebration card emails carry links to malware.
Celebration card emails carry links to malware. A further wave of greetings-card spam has been widely seeded, in the wake of considerable Storm Worm activity in the last week, with… https://www.virusbulletin.com/blog/2007/07/fourth-july-targeted-trojan-spam/

NOD32 alerts on suspect adverts

False positive reveals sneaky techniques used in ads.
False positive reveals sneaky techniques used in ads.ESET's NOD32 product was updated several times in close succession over the weekend, as false positives were introduced… https://www.virusbulletin.com/blog/2007/07/nod32-alerts-suspect-adverts/

Fake updates and phony postcards carry malware

Microsoft patch and greetings card spams bring more trojans.
Microsoft patch and greetings card spams bring more trojans. Several spam runs posing as vulnerability alerts from Microsoft have been spotted in the last week, with links to… https://www.virusbulletin.com/blog/2007/07/fake-updates-and-phony-postcards-carry-malware/

Challenge Blue Pill

Researcher challenged to prove 100% undetectable rootkit claim.
Researcher challenged to prove 100% undetectable rootkit claim. Joanna Rutkowska, the security researcher who last year claimed that she can create 100% undetectable malware, has… https://www.virusbulletin.com/blog/2007/07/challenge-blue-pill/

Pity poor MS Security workers

MS Security rated 6th worst job in science.
MS Security rated 6th worst job in science. Spare a thought this month for the staff of the Microsoft Security Response Center who, according to Popular Science magazine, have the… https://www.virusbulletin.com/blog/2007/07/pity-poor-ms-security-workers/

July

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/07/

Advance diary dates: VB2008

VB announces VB2008.
VB announces VB2008. VB is pleased to announce that VB2008 will take place 1-3 October 2008 in Ottawa, Canada. Reserve the dates and start making your travel plans now! If you… https://www.virusbulletin.com/blog/2007/07/advance-diary-dates/

July issue of VB published

The July issue of Virus Bulletin is now available for subscribers to download.
The July issue of Virus Bulletin is now available for subscribers to download. The July 2007 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2007/07/july-issue-vb-published/

Spammer offers new service

Spammer turns court order into money-making opportunity.
Spammer turns court order into money-making opportunity. Wily email marketer/spammer (depending on your viewpoint) David Linhardt, famed for suing UK spam-fighting organization… https://www.virusbulletin.com/blog/2007/07/spammer-offers-new-service/

Spanish mobile malware suspect arrested

28-year-old charged with Cabir/Commwarrior crimes.
28-year-old charged with Cabir/Commwarrior crimes. An unnamed man has been arrested in Valencia, Spain, on suspicion of creating and spreading 20 variants of the Cabir and… https://www.virusbulletin.com/blog/2007/06/spanish-mobile-malware-suspect-arrested/

Symantec presenter spotted using KAV

Another update embarrassment as rival software pops up.
Another update embarrassment as rival software pops up. After the recent damaging false positive incident in China, which has led Symantec to offer free software to those hit by… https://www.virusbulletin.com/blog/2007/06/symantec-presenter-spotted-using-kav/

US porn spammers convicted

Two found guilty of CAN-SPAM breaches.
Two found guilty of CAN-SPAM breaches. A federal jury in Phoenix, Arizona, has found two men guilty of two charges of violating the US CAN-SPAM regulations, as well as other… https://www.virusbulletin.com/blog/2007/06/us-porn-spammers-convicted/

100,000 new phishing sites set up in 7 days

IBM sees huge rise in kit-build scam sites.
IBM sees huge rise in kit-build scam sites. Phishing watchers at IBM's X-Force research team have recorded an enormous burst of phishing activity in the last seven days, with over… https://www.virusbulletin.com/blog/2007/06/100-000-new-phishing-sites-set-7-days/

UK users ignoring security issues

Surveys find public in the dark and careless about sensitive data.
Surveys find public in the dark and careless about sensitive data. Several surveys out this week have shown the UK public is failing to take basic security precautions to protect… https://www.virusbulletin.com/blog/2007/06/uk-users-ignoring-security-issues/

Latest VB100 announced

Products for 64-bit Windows Vista to be tested.
Products for 64-bit Windows Vista to be tested. VB has issued a call for submissions for the latest VB100 comparative review, with products for the 64-bit version of Microsoft… https://www.virusbulletin.com/blog/2007/06/latest-announced/

Mpack packs punch in Italy

10,000 sites carrying exploits in large-scale attack.
10,000 sites carrying exploits in large-scale attack. Sophisticated remote-exploit attack kit 'Mpack' has been spotted in use in increasingly large numbers throughout Europe, with… https://www.virusbulletin.com/blog/2007/06/mpack-packs-punch-italy/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.