VB Blog

VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka

Posted by   Martijn Grooten on   Sep 12, 2016

In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi Talbi will present a paper on Haka, a tool that can be used to monitor and debug malware's network communications.

Read more  

Paper: Behavioural Detection and Prevention of Malware on OS X

Posted by   Martijn Grooten on   Sep 12, 2016

In a new paper published through Virus Bulletin, Vincent Van Mieghem presents a novel method for detecting malware on Mac OS X, based on the system calls used by malicious software.

Read more  

VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!

Posted by   Martijn Grooten on   Sep 9, 2016

At VB2016, four researcher from Bitdefender will present a paper in which they look at vulnerabilities in four "smart" power outlets.

Read more  

VB2016 preview: Uncovering the Secrets of Malvertising

Posted by   Martijn Grooten on   Sep 7, 2016

Malvertising, in which legitimate ad networks are abused to silently infect users with malware, has become a real plague in recent years. A VB2016 paper by Malwarebytes researchers Jérôme Segura and Chris Boyd will look at the issue.

Read more  

VB2016: Important Information About the Hotel

Posted by   Martijn Grooten on   Sep 6, 2016

Many people have already registered for VB2016 and the conference hotel is rapidly filling up - registration for the event will remain open right up until the start of the conference, but here, we provide some advice about booking accommodation.

Read more  

VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests

Posted by   Martijn Grooten on   Sep 6, 2016

At VB2016, Cylance researcher Brian Wallace will reveal a multi-platform tool that runs on the endpoint and uses various techniques to detect ongoing man-in-the-middle attacks.

Read more  

A look at the VB2016 sponsors

Posted by   Martijn Grooten on   Sep 5, 2016

More than a dozen companies and organizations are lending their support to VB2016 as conference sponsors and supporting organizations.

Read more  

Guest blog: Nemucod ransomware analysis

Posted by   Virus Bulletin on   Sep 2, 2016

In a guest blog, Webroot researcher Jesse Lopez looks at another variant in the massive crop of malware that takes users’ files hostage: Nemucod ransomware.

Read more  

VB2016 preview: Mobile Applications: a Backdoor into Internet of Things?

Posted by   Martijn Grooten on   Sep 1, 2016

At VB2016 in Denver, Fortinet researcher Axelle Apvrille will discuss how analysing a device's complementary mobile app can help a great deal in understanding the architecture of a smart device.

Read more  

VB2016 preview: Wild Android Collusions

Posted by   Martijn Grooten on   Aug 31, 2016

Full technical details of the first in-the-wild Android app 'collusion' attack, where multiple apps perform an attack in collaboration, will be shared with the public in at VB2016 in Denver on 5 October.

Read more  

Search blog

Spam King sued again

Serial spammer charged with more spamming.
Serial spammer charged with more spamming. Software and security firm Infinite Monkeys & Company has announced that a lawsuit has been filed against 'Spam King' Scott Richter, head… https://www.virusbulletin.com/blog/2006/09/spam-king-sued-again/

Zero-day exploit targeting IE flaw

'Extremely critical' buffer overflow used to drop spyware.
'Extremely critical' buffer overflow used to drop spyware. Researchers at anti-spyware firm Sunbelt Software have reported an new attack actively exploiting another unpatched… https://www.virusbulletin.com/blog/2006/09/zero-day-exploit-targeting-ie-flaw/

Several backdoors in PDF revealed

Researcher lists security issues with document format.
Researcher lists security issues with document format. A researcher analysing the possibility of exploiting vulnerabilities in the Adobe PDF file format has released a lengthy list… https://www.virusbulletin.com/blog/2006/09/several-backdoors-pdf-revealed/

Google embarrassed by phishing demo

Fake Gmail site served by Google itself.
Fake Gmail site served by Google itself. Web search and service behemoth Google has had its security credibility hit this weekend, after a site was set up on its servers spoofing… https://www.virusbulletin.com/blog/2006/09/google-embarrassed-phishing-demo/

FTC shuts down spammers

Four spam companies hit by CAN-SPAM rulings.
Four spam companies hit by CAN-SPAM rulings. The US Federal Trade Commission (FTC) stepped its anti-spam operations up a gear last week, shutting down four separate organisations… https://www.virusbulletin.com/blog/2006/09/ftc-shuts-down-spammers/

Chain letter email reaps addresses

Fake research a harvesting trick by spammers.
Fake research a harvesting trick by spammers. An email widely spammed out in recent days claiming to be part of a research project into email use is in fact a scam designed to… https://www.virusbulletin.com/blog/2006/09/chain-letter-email-reaps-addresses/

Spamhaus fined $11.7 million for blocking spam

US judgement meaningless, says UK anti-spam project.
US judgement meaningless, says UK anti-spam project. An Illinois court has passed a judgement demanding UK-based spam advisory organisation Spamhaus pay $11.7 million in damages to… https://www.virusbulletin.com/blog/2006/09/spamhaus-fined-11-7-million-blocking-spam/

Vulnerability reported in IE

ActiveX flaw opens another hole in MS browser.
ActiveX flaw opens another hole in MS browser. Yet another bug has been found in Microsoft's browser Internet Explorer, only days after a previous problem was patched for the third… https://www.virusbulletin.com/blog/2006/09/vulnerability-reported-ie/

Symantec hit by vulnerabilities

Two flaws in alert handling unveiled.
Two flaws in alert handling unveiled. Two separate vulnerabilites in the alert notification handling systems of Symantec products have been reported this week. Symantec Client… https://www.virusbulletin.com/blog/2006/09/symantec-hit-vulnerabilities/

ISP wins $11 million from spammers

Judgement in EarthLink lawsuit grants heavy payout.
Judgement in EarthLink lawsuit grants heavy payout. US ISP giant EarthLink, a regular champion of the CAN-SPAM Act, has won yet another case against a spammer. The judgement passed… https://www.virusbulletin.com/blog/2006/09/isp-wins-11-million-spammers/

Sony DRM/AOL combo breaks computers

Anti-spyware tool attacks rootkit, kills CD drive.
Anti-spyware tool attacks rootkit, kills CD drive. An alert has been issued by the Office of the Attorney General of Texas, warning that an anti-spyware product from AOL has a… https://www.virusbulletin.com/blog/2006/09/sony-drm-aol-combo-breaks-computers/

Patch Tuesday light on patches

MS patches previous patches, but not Word exploit.
MS patches previous patches, but not Word exploit.Microsoft's monthly 'Patch Tuesday' release of security fixes has been relatively quiet, with only three new bugs repaired, in… https://www.virusbulletin.com/blog/2006/09/patch-tuesday-light-patches/

Barclays phish spammed widely

64% of recent phishes targeting global brand.
64% of recent phishes targeting global brand. Reports from Panda Software warn of a major phishing campaign targeting users of Barclays online banking, causing a 30% rise in… https://www.virusbulletin.com/blog/2006/09/barclays-phish-spammed-widely/

Star sites host most malware

Celebrities bigger lure than sex, says McAfee.
Celebrities bigger lure than sex, says McAfee. A report on adware and spyware from McAfee has stated that celebrity sites, rather than those pushing pornography or other widely… https://www.virusbulletin.com/blog/2006/09/star-sites-host-most-malware/

Zotob authors jailed

One year, two years for worm writing duo.
One year, two years for worm writing duo. Courts in Morocco have convicted two men accused of having a hand in the creation and distribution of the 'Zotob' worm, which struck… https://www.virusbulletin.com/blog/2006/09/zotob-authors-jailed/

Phishing records broken in July

Highest ever numbers of phishing sites and brands, reports APWG.
Highest ever numbers of phishing sites and brands, reports APWG. 154 brands were recorded as targets for phishing attempts in July, according to the Anti Phishing Working Group… https://www.virusbulletin.com/blog/2006/09/phishing-records-broken-july/

Spearphishers track eBay trades

Auction losers tempted by second-chance phishes.
Auction losers tempted by second-chance phishes. As part of the general trend of more focused phishing, users of online auction house eBay are reporting phishes directly targeting… https://www.virusbulletin.com/blog/2006/09/spearphishers-track-ebay-trades/

Fake news site carries trojan

Conspiracy warning spam points to exploit web page.
Conspiracy warning spam points to exploit web page. A spam campaign is directing Australian readers to a faked news site designed to drop a trojan. The initial mails carry a stark… https://www.virusbulletin.com/blog/2006/09/fake-news-site-carries-trojan/

Botnet keepers rake in adware cash

Zombie herder makes $430 per day from single piece of adware.
Zombie herder makes $430 per day from single piece of adware. According to research by the German Honeynet Project, a botnet controller who installed adware including DollarRevenue… https://www.virusbulletin.com/blog/2006/09/botnet-keepers-rake-adware-cash/

More AV products suffer flaws

Vulnerabilities found in AntiVir and avast!.
Vulnerabilities found in AntiVir and avast!. Security defects in two anti-virus products have been reported by security watch company Secunia in the last week. While the AntiVir… https://www.virusbulletin.com/blog/2006/09/more-av-products-suffer-flaws/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.