VB Blog

DNS cache poisoning used to steal emails

Posted by   Virus Bulletin on   Sep 12, 2014

Call to use end-to-end encryption and to deploy DNSSEC.

Read more  

VB2014 preview: Apple without a shell - iOS under targeted attack

Posted by   Virus Bulletin on   Sep 12, 2014

FireEye researchers show a large attack vector for Apple's mobile operating system.

Read more  

Left-to-right override makes a return in spam

Posted by   Virus Bulletin on   Sep 11, 2014

Trick shows that spammers still try to beat content-based filters.

Read more  

Paper: Prosecting the Citadel botnet - revealing the dominance of the Zeus descendent: part two

Posted by   Virus Bulletin on   Sep 11, 2014

Aditya K. Sood and Rohit Bansal study the malware's behaviour when ran on a physical machine.

Read more  

Crypto blunder makes TorrentLocker easy to crack

Posted by   Virus Bulletin on   Sep 10, 2014

Use of single XOR key leaves ransomware open to known-plaintext attack.

Read more  

VB2014 preview: The three levels of exploit testing

Posted by   Virus Bulletin on   Sep 9, 2014

Richard Ford and Marco Carvalho present an idea for how to test products that claim to detect the unknown.

Read more  

VB2014 preview: last-minute papers added to the programme

Posted by   Virus Bulletin on   Sep 5, 2014

Hot topics to be covered at VB2014 conference in Seattle.

Read more  

Paper: Prosecting the Citadel botnet - revealing the dominance of the Zeus descendent: part one

Posted by   Virus Bulletin on   Sep 3, 2014

Aditya K. Sood and Rohit Bansal dissect botnet primarily used for financial fraud.

Read more  

VB2014 preview: Swipe away, we're watching you

Posted by   Virus Bulletin on   Sep 2, 2014

Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware.

Read more  

VB2014 preview: Design to discover: security analytics with 3D visualization engine

Posted by   Virus Bulletin on   Aug 29, 2014

Thibault Reuille and Dhia Mahjoub use particle physics to shows clusters of malicious domains.

Read more  

Search blog

FBI serves up Operation Bot Roast

Investigations identify more than 1 million victim IP addresses.
Investigations identify more than 1 million victim IP addresses. The FBI has announced the results of an ongoing initiative, dubbed 'Operation Bot Roast', which is aimed at… https://www.virusbulletin.com/blog/2007/06/fbi-serves-operation-bot-roast/

4 critical flaws patched this Patch Tuesday

Microsoft's June Security Bulletin covers range of vulnerabilities.
Microsoft's June Security Bulletin covers range of vulnerabilities.Microsoft's latest 'Patch Tuesday' security bulletin, released yesterday, includes fixes for six vulnerabilities,… https://www.virusbulletin.com/blog/2007/06/4-critical-flaws-patched-patch-tuesday/

Bugs found in Apple's new Windows browser within hours of release

Safari not so good-y.
Safari not so good-y. A number of security researchers say they found bugs in Apple's brand new web browser Safari for Windows just hours after its public beta release on 11 June.… https://www.virusbulletin.com/blog/2007/06/bugs-found-apple-s-new-windows-browser-within-hours-release/

Spammer enters guilty plea

Admits to having spammed 1.2 million AOL customers.
Admits to having spammed 1.2 million AOL customers. A Brooklyn man has pleaded guilty to having sent spam messages to over 1.2 million AOL customers in August 2005. According to… https://www.virusbulletin.com/blog/2007/06/spammer-enters-guilty-plea/

'Direct' cost of malware infections on the decline

Report finds direct costs from malware infections declined over last two years.
Report finds direct costs from malware infections declined over last two years. A report by Computer Economics has stated that the financial impact of malware infections fell to… https://www.virusbulletin.com/blog/2007/06/direct-cost-malware-infections-decline/

Serious holes in Yahoo! Messenger

Critical vulnerabilities fully disclosed.
Critical vulnerabilities fully disclosed. Two security flaws in the popular Yahoo! Messenger communications software have been reported, with full details available online before a… https://www.virusbulletin.com/blog/2007/06/serious-holes-yahoo-messenger/

Amero case sent for retrial

Spyware popup teacher told earlier trial was flawed.
Spyware popup teacher told earlier trial was flawed. Connecticut temporary teaching assistant Julie Amero, convicted of exposing minors to danger when a classroom computer she had… https://www.virusbulletin.com/blog/2007/06/amero-case-sent-retrial/

Microsoft details 'Stirling' integrated suite

Comprehensive security product promised in next-gen Forefront.
Comprehensive security product promised in next-gen Forefront.Microsoft, whose Forefront corporate anti-malware system is the latest step in a continuing onslaught on the security… https://www.virusbulletin.com/blog/2007/06/microsoft-details-stirling-integrated-suite/

Spam barrages take down filters, networks

Report shows increase in spam bombardment attacks.
Report shows increase in spam bombardment attacks.MessageLabs' monthly report on the latest trends in spam has warned of an alarming rise in 'spam spikes', targeted attacks which… https://www.virusbulletin.com/blog/2007/06/spam-barrages-take-down-filters-networks/

CA struck by vulnerability

CAB handling issue affects swathe of products.
CAB handling issue affects swathe of products. Two flaws related to the handling of CAB archive files by the CA anti-virus engine have been reported, rendering products across CA's… https://www.virusbulletin.com/blog/2007/06/ca-struck-vulnerability/

Online malware dangers analysed

Google, McAfee release webserver, search result figures.
Google, McAfee release webserver, search result figures. Two reports out this week have revealed some interesting statistics on the security dangers involved in browsing the… https://www.virusbulletin.com/blog/2007/06/online-malware-dangers-analysed/

Vulnerabilities galore

May was a month of flaw revelations, with vulnerabilities being disclosed in the products of no fewer than nine security vendors.
May was a month of flaw revelations, with vulnerabilities being disclosed in the products of no fewer than nine security vendors. May was a month of flaw revelations, with… https://www.virusbulletin.com/blog/2007/06/vulnerabilities-galore/

June

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2007/06/

Vulnerabilities strike more AV firms, and Mac too

F-Secure and Authentium patch holes, while Samba flaws worry Apple users.
F-Secure and Authentium patch holes, while Samba flaws worry Apple users. Users of Mac OS X, used to a cosy sense of security, have been warned of possible penetration vectors… https://www.virusbulletin.com/blog/2007/06/vulnerabilities-strike-more-av-firms-and-mac-too/

Symantec sued for false positive

Chinese FP issue leads to court case.
Chinese FP issue leads to court case. A Chinese lawyer has begun court proceedings against security firm Symantec, claiming damages as a result of the widely-publicised false… https://www.virusbulletin.com/blog/2007/06/symantec-sued-false-positive/

Another 'Spam King' arrested

Spammer brought to book after 4-year campaign.
Spammer brought to book after 4-year campaign. A Seattle man was indicted yesterday on numerous charges of fraud and deception in relation to a campaign of spamming dating back to… https://www.virusbulletin.com/blog/2007/06/another-spam-king-arrested/

Pestilent spammer arrested

Another 'spam king' locked up.
Another 'spam king' locked up. A man described by anti-spam organisation Spamhaus as 'one of the most persistent professional spammers' was arrested in Seattle late last month… https://www.virusbulletin.com/blog/2007/06/pestilent-spammer-arrested/

Anti-spam laws take hold in Hong Kong

Tough new controls aim at stamping out spam.
Tough new controls aim at stamping out spam. Hong Kong has become the latest place to see the introduction of anti-spam laws, with the first phase of a two-stage process coming… https://www.virusbulletin.com/blog/2007/06/anti-spam-laws-take-hold-hong-kong/

June issue of VB published

The June issue of Virus Bulletin is now available for subscribers to download.
The June issue of Virus Bulletin is now available for subscribers to download. The June 2007 issue of Virus Bulletin is now available for subscribers to browse online or download… https://www.virusbulletin.com/blog/2007/06/june-issue-vb-published/

Google buys into security

Google makes stealth purchase of security firm.
Google makes stealth purchase of security firm. Search and entertainment giant Google completed the purchase of Internet security firm GreenBorder Technologies in mid-May - but… https://www.virusbulletin.com/blog/2007/05/google-buys-security/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.