Notice

Virus Bulletin's blog

The latest Blog posts from the VB team
  1. Test your technical and mental limits in the VB2017 foosball tournament
    As has become tradition, VB2017 will once again see a security industry table football tournament. Register your team now for some great fun and adrenaline-filled matches in between sessions in Madrid!

    Read more
  2. The case against running Windows XP is more subtle than we think it is
    Greater Manchester Police is one of many organizations still running Windows XP on some of its systems. This is bad practice, but the case against running XP is far more subtle than we often pretend it is.

    Read more
  3. Hot FinSpy research completes VB2017 programme
    Researchers from ESET have found a new way in which the FinSpy/FinFisher 'government spyware' can infect users, details of which they will present at VB2017 in Madrid.

    Read more
  4. Transparency is essential when monitoring your users' activities
    Activity monitoring by security products in general, and HTTPS traffic inspection in particular, are sensitive issues in the security community. There is a time and a place for them, VB's Martijn Grooten argues, but only when they are done right.

    Read more
  5. VB2017 preview: Android reverse engineering tools: not the usual suspects
    We preview the VB2017 paper by Fortinet researcher Axelle Apvrille, in which she looks at some less obvious tools for reverse engineering Android malware.

    Read more
  6. Malicious CCleaner update points to a major weakness in our infrastructure
    Researchers from Cisco Talos have found that a recent version of the widely used CCleaner tool installed malware on the machine.

    Read more
  7. Despite the profitability of ransomware there is a good reason why mining malware is thriving
    Though ransomware is far more profitable than using a compromised PC to mine bitcoins, the global distribution of malware means that there are many botnets for which mining is the most efficient way to extract money out of a PC.

    Read more
  8. VB2017 preview: Crypton - exposing malware's deepest secrets
    We preview the VB2017 paper by Julia Karpin and Anna Dorfman (F5 networks), in which they present a tool to decrypt encrypted parts of malware.

    Read more
  9. VB2017 preview: Hacktivism and website defacement: motivations, capabilities and potential threats
    We preview the VB2017 paper by Marco Romagna and Niek Jan van den Hout (The Hague University of Applied Sciences), in which they thoroughly analyse the motivations and modus operandy of hacktivists.

    Read more
  10. Three questions to ask about security product bypasses
    Proof-of-concepts for bypasses of security products always sound scary, but how seriously should we take them? VB Editor Martijn Grooten lists three questions one should ask about any such bypass to determine how serious a threat it represents.

    Read more