Category: blog

  • VB2018 Small Talk: An industry approach for unwanted software criteria and clean requirements

    The constantly evolving threat landscape poses challenges for security vendors. But an equally big, if less reported, challenge is that posed by the kind of software that lives on the border between what is acceptable, and what isn’t. A number of vendors have recently got together in an attempt to align industry approaches and to…

  • VB2018 call for last-minute papers opened

    Virus Bulletin has opened the call for last-minute papers for VB2018. The VB2018 programme already boasts some 40 talks, with a few more exciting things to be added very soon (watch this space!). But neither threats nor research stop the moment we publish the conference programme, which means that there will be a lot of…

  • VB2018 call for last-minute papers opened

    Virus Bulletin has opened the call for last-minute papers for VB2018. The VB2018 programme already boasts some 40 talks, with a few more exciting things to be added very soon (watch this space!). But neither threats nor research stop the moment we publish the conference programme, which means that there will be a lot of…

  • VB2017 paper and update: Browser attack points still abused by banking trojans

    At VB2017 in Madrid, ESET researcher Peter Kálnai presented a paper he wrote together with his colleague Michal Poslušný, in which they looked at how banking malware interacts with browsers. Today, not only do we publish the paper (in HTML and PDF format) and the video recording of their presentation, but we also publish a…

  • VB2017 paper and update: Browser attack points still abused by banking trojans

    At VB2017 in Madrid, ESET researcher Peter Kálnai presented a paper he wrote together with his colleague Michal Poslušný, in which they looked at how banking malware interacts with browsers. Today, not only do we publish the paper (in HTML and PDF format) and the video recording of their presentation, but we also publish a…

  • New paper: Does malware based on Spectre exist?

    The discovery of the Spectre and Meltdown attacks in January cast a long shadow over the year, with many of the issued security patches having their own problems and several new variants of the two attacks having been discovered. Yet many questions about the attacks remain unanswered. In a presentation at the inaugural Pass the…

  • New paper: Does malware based on Spectre exist?

    The discovery of the Spectre and Meltdown attacks in January cast a long shadow over the year, with many of the issued security patches having their own problems and several new variants of the two attacks having been discovered. Yet many questions about the attacks remain unanswered. In a presentation at the inaugural Pass the…

  • More VB2018 partners announced

    The Virus Bulletin Conference has always been about bringing the security community together, and in this spirit, this year we are referring to the organizations that support VB2018 as our event ‘partners’ rather than ‘sponsors’. Earlier in the year, we announced Platinum partners adaware , Comodo , ESET and Tencent , Silver partner Reason Software…

  • More VB2018 partners announced

    The Virus Bulletin Conference has always been about bringing the security community together, and in this spirit, this year we are referring to the organizations that support VB2018 as our event ‘partners’ rather than ‘sponsors’. Earlier in the year, we announced Platinum partners adaware , Comodo , ESET and Tencent , Silver partner Reason Software…

  • Malware authors’ continued use of stolen certificates isn’t all bad news

    A malware campaign has been using code-signing certificates stolen from Taiwanese companies to sign its samples, ESET researcher and regular VB conference speaker Anton Cherepanov writes . Malware signed with stolen certificates isn’t a new phenomenon. Stuxnet famously used stolen certificates, also from Taiwanese companies, and in 2016 Symantec wrote about a malware campaign that…