VB Blog

VB2018 paper: From drive-by download to drive-by mining: understanding the new paradigm

Posted by   Martijn Grooten on   Oct 26, 2018

Today, we publish the VB2018 paper by Malwarebytes researcher Jérôme Segura, in which he details the shift from exploit kits to drive-by mining. We also publish the video of his VB2018 presentation.

Read more  

VB2018 presentation: The wolf in sheep's clothing - undressed

Posted by   Martijn Grooten on   Oct 22, 2018

Today, we publish the video of the VB2018 presentation by CSIS researchers Benoît Ancel and Aleksejs Kuprins, who looked at a rather dubious seller of government spyware, described by someone else operating in the same space as a "criminal of the worst kind".

Read more  

VB2018 paper: The dark side of WebAssembly

Posted by   Virus Bulletin on   Oct 17, 2018

Today, we publish the VB2018 paper by Symantec researchers Aishwarya Lonkar and Siddhesh Chandrayan on the security risks that come with WebAssembly.

Read more  

The Virus Bulletin conference returns home: VB2019 to take place in London

Posted by   Martijn Grooten on   Oct 5, 2018

In 2019, the Virus Bulletin conference is set to return home, with VB2019 taking place in London, UK.

Read more  

Guest blog: The case for increasing transparency in cybersecurity

Posted by   Virus Bulletin on   Oct 2, 2018

In a guest blog post, Kaspersky Lab's Anton Shingarev considers the case for increasing transparency in cybersecurity.

Read more  

VB2018 preview: Workshops

Posted by   Martijn Grooten on   Sep 28, 2018

Workshops make their VB Conference debut during VB2018, giving delegates the opportunity to learn the basics of kernel-level malware analysis, Android reverse-engineering and artificial intelligence.

Read more  

New article: Through the looking glass: webcam interception and protection in kernel mode

Posted by   Martijn Grooten on   Sep 27, 2018

Today we publish a short article by Ronen Slavin and Michael Maltsev, researchers at Reason Software Company, who dive into the video capturing internals on Windows, and explain how this can be used by a malicious actor to steal images recorded by a computer's webcam.

Read more  

VB2018 preview: The botnet landscape - live threats and steps for mitigation (Small Talk)

Posted by   Martijn Grooten on   Sep 27, 2018

In a Small Talk at VB2018, Spamhaus's Simon Forster will present the organization's research into the botnet landscape and will discuss with the audience topics such as how the rise of anonymzation techniques and the hosting of botnets on well-regarded cloud providers have changed the landscape.

Read more  

VB2018 Threat Intelligence Summit: survey on threat intel usage

Posted by   Virus Bulletin on   Sep 26, 2018

Virus Bulletin is proud to host the first Threat Intelligence Summit as an integral part of VB2018 next week. In a bid to help collect as much current data as possible, we'd like to ask anyone generating or consuming threat intelligence to fill in a very short survey.

Read more  

VB2018 preview: Anatomy of an attack: detecting and defeating CRASHOVERRIDE

Posted by   Martijn Grooten on   Sep 26, 2018

In today's blog post, we preview the VB2018 paper by Dragos Inc.'s Joe Slowik, who looks at the CRASHOVERRIDE malware, the first (publicly known) malware designed to impact electric grid operations.

Read more  

Search blog

November issue released

The Virus Bulletin November issue is on its way.
The Virus Bulletin November issue is on its way. It's that time of the month again... If you are a subscriber to Virus Bulletin, you should be receiving your November issue… https://www.virusbulletin.com/blog/2004/10/november-issue-released/

Spam gets the sniffles

Spammers seize the opportunity to cash in on the US flu vaccine problem.
Spammers seize the opportunity to cash in on the US flu vaccine problem. Not only has the shortage of flu vaccine been something of a political hot potato in the run up to the US… https://www.virusbulletin.com/blog/2004/10/spam-gets-sniffles/

Sender ID specification revised

Microsoft has another stab at getting its email authentication protocol approved.
Microsoft has another stab at getting its email authentication protocol approved. Microsoft has revised its Sender ID email authentication protocol and resubmitted it to the… https://www.virusbulletin.com/blog/2004/10/sender-id-specification-revised/

Trial of virus writer postponed

Sasser author made to wait.
Sasser author made to wait. The trial of self-confessed virus writer Sven Jaschan has been postponed until next year. The 18-year-old, who confessed earlier this year to… https://www.virusbulletin.com/blog/2004/10/trial-virus-writer-postponed/

RSS activated

Virus Bulletin RSS feeds revamped and live again.
Virus Bulletin RSS feeds revamped and live again. Although RSS feeds have been available from VB for some time, today we have revamped them and made them accessable to all. You… https://www.virusbulletin.com/blog/2004/10/rss-activated/

Action plan on spam

15 countries sign up to international action plan on spam.
15 countries sign up to international action plan on spam. A total of 15 countries have signed up to the London Action Plan - an international action plan designed to encourage… https://www.virusbulletin.com/blog/2004/10/action-plan-spam/

Online 'museum' displays collection of the finest spam...

As if you haven't already seen enough...
As if you haven't already seen enough... A British man has set up his own Museum of Spam. Considering spam to be 'as much a part of contemporary culture as just about anything… https://www.virusbulletin.com/blog/2004/10/online-museum-displays-collection-finest-spam/

Top ten security urban legends revealed

Most common cyber security myths unveiled as part of Cyber Security Month.
Most common cyber security myths unveiled as part of Cyber Security Month. Secure Computing has revealed the 'top ten cyber security urban legends' as part of Cyber Security… https://www.virusbulletin.com/blog/2004/10/top-ten-security-urban-legends-revealed/

FTC sues spyware outfit

US government begins crack down on spyware.
US government begins crack down on spyware. The US Federal Trade Commission (FTC) has filed a law suit in New Hampshire against an alleged spyware operation.The FTC filed the… https://www.virusbulletin.com/blog/2004/10/ftc-sues-spyware-outfit/

Conference photos

Take a look at the VB2004 conference photos
Take a look at the VB2004 conference photos The VB2004 conference photos are now online and available for viewing.If you would like to contribute a selection of your VB2004… https://www.virusbulletin.com/blog/2004/10/conference-photos/

Another successful VB conference

With over 330 delegates and a collection of interesting and informative speakers, VB2004 was a great success.
With over 330 delegates and a collection of interesting and informative speakers, VB2004 was a great success. This year's VB conference, held in the beautiful city of Chicago,… https://www.virusbulletin.com/blog/2004/10/another-successful-vb-conference/

MessageLabs teams up with Symantec

Companies collaborate to provide anti-spam services.
Companies collaborate to provide anti-spam services. Email security firm MessageLabs and security company Symantec have announced that they will combine their anti-spam… https://www.virusbulletin.com/blog/2004/10/messagelabs-teams-symantec/

October

Anti-virus and security related news provided by independent anti-virus advisors, Virus Bulletin
https://www.virusbulletin.com/blog/2004/10/

Symantec to block phishing

Symantec announces new service to help stop phishing scams
Symantec announces new service to help stop phishing scams Anti-virus and anti-spam vendor Symantec has announced a new service to help identify and block phishing scams. The… https://www.virusbulletin.com/blog/2004/09/symantec-block-phishing/

Governments urged to do more to combat cybercrime

The Council of Europe's 2001 Cybercrime Convention has been signed by 30 countries, but is only law in eight of these.
The Council of Europe's 2001 Cybercrime Convention has been signed by 30 countries, but is only law in eight of these. The message at a conference organized by the Council of… https://www.virusbulletin.com/blog/2004/09/governments-urged-do-more-combat-cybercrime/

IETF rejects sender ID

The Internet Engineering Task Force has rejected Microsoft's preferred anti-spam specification.
The Internet Engineering Task Force has rejected Microsoft's preferred anti-spam specification. The Internet Engineering Task Force (IETF) has rejected Microsoft's preferred… https://www.virusbulletin.com/blog/2004/09/ietf-rejects-sender-id/

Correction

VB regrets that an error slipped through the editorial net in the August 2004 Netware comparative review.
VB regrets that an error slipped through the editorial net in the August 2004 Netware comparative review. VB regrets that an error slipped through the editorial net in the August… https://www.virusbulletin.com/blog/2004/09/correction/

Increase in infections for chinese

87.9% Thats the number of malware infected computer users in China, according to their Minister of Public Security.
87.9% Thats the number of malware infected computer users in China, according to their Minister of Public Security. According to China's Ministry of Public Security, 87.9 per… https://www.virusbulletin.com/blog/2004/09/increase-infections-chinese/

The bounty hunters are here

US Federal Trade Commission says the US government must be generous with its rewards if it decides to encourage 'bounty hunters' to track down email spammers
US Federal Trade Commission says the US government must be generous with its rewards if it decides to encourage 'bounty hunters' to track down email spammers In a report to… https://www.virusbulletin.com/blog/2004/09/bounty-hunters-are-here/

Symantec Buys Again

The AV company that never seems to stop buying, reveals its latest purchase.
The AV company that never seems to stop buying, reveals its latest purchase. Symantec, the AV company that never seems to stop shopping, has revealed its latest purchase: digital… https://www.virusbulletin.com/blog/2004/09/symantec-buys-again/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.