Category: blog

  • VB2016 video: Getting duped: piggybacking on webcam streams for surreptitious recordings

    If you are going to be at RSA in San Francisco next week, we highly recommend you attend Patrick Wardle’s talk on OS X malware in 2016 – not just because it is important for Mac users to know that they too can fall victim to malware, but also because Patrick is an excellent speaker. We…

  • We shouldn’t forget those most vulnerable in our digital world

    The new UK government has passed a far-reaching surveillance law . The new US government has stripped privacy rights from non-citizens. Surely, those who have warned about the threat of Western intelligence agencies have a reason to feel vindicated. In the post-Snowden era of IT security, many improvements to technology have made it a lot…

  • Throwback Thursday: A troubled world

    In early 1991, the world was a troubled place – President George H. W. Bush had just announced the start of military Operation Desert Storm and conflict and violence were being reported globally on a daily basis. With this as a backdrop, the world of “indiscriminate” computer viruses which “victimise in a random and unpredictable manner”…

  • We shouldn’t forget those most vulnerable in our digital world

    The new UK government has passed a far-reaching surveillance law . The new US government has stripped privacy rights from non-citizens. Surely, those who have warned about the threat of Western intelligence agencies have a reason to feel vindicated. In the post-Snowden era of IT security, many improvements to technology have made it a lot…

  • Throwback Thursday: A troubled world

    In early 1991, the world was a troubled place – President George H. W. Bush had just announced the start of military Operation Desert Storm and conflict and violence were being reported globally on a daily basis. With this as a backdrop, the world of “indiscriminate” computer viruses which “victimise in a random and unpredictable manner”…

  • VB2016 video: Nymaim: the Untold Story

    Every year, the Virus Bulletin conference programme includes a number of ‘last-minute’ papers: presentations on topics that are so hot, they are added to the programme only a few weeks before the start of the conference. While the short time frame means there isn’t enough time to add an accompanying written paper to the conference…

  • VB2016 video: Nymaim: the Untold Story

    Every year, the Virus Bulletin conference programme includes a number of ‘last-minute’ papers: presentations on topics that are so hot, they are added to the programme only a few weeks before the start of the conference. While the short time frame means there isn’t enough time to add an accompanying written paper to the conference…

  • The Living Dead Anti-Virus

    A former director of testing at AV-TEST and a one-time VB conference speaker , security consultant Hendrik Pilz is passionate about the quality of security products. In a guest blog for Virus Bulletin, he explains why he doesn’t think anti-virus products should be disabled. Just recently, security expert Robert O’Callahan (a former developer at Mozilla ) published…

  • The Living Dead Anti-Virus

    A former director of testing at AV-TEST and a one-time VB conference speaker , security consultant Hendrik Pilz is passionate about the quality of security products. In a guest blog for Virus Bulletin, he explains why he doesn’t think anti-virus products should be disabled. Just recently, security expert Robert O’Callahan (a former developer at Mozilla ) published…

  • Paper: The journey and evolution of God Mode in 2016: CVE-2016-0189

    While avoiding the use of Flash is good advice for helping to fend off exploit kits, some of the vulnerabilities exploited by these kits actually target the browsers themselves. An important example of this is CVE-2016-0189, which affects Microsoft ‘s Internet Explorer browser versions 9 through 11. First discovered in the wild in targeted attacks…