Category: blog

  • Throwback Thursday: The malware battle: reflections and forecasts

    “Another year has come to its end and the malware battle still rages on. It seems to be a never-ending uphill struggle to secure digital information.” This could have been written just weeks ago, but in fact comes from an article written 13 years ago, in which Jamz Yaneza reflected on the year just ended and…

  • Ransomware would be much worse if it wasn’t for email security solutions

    Many experts believe that ransomware is set to become an even worse problem in 2017 than it was in 2016 — which is rather bad news, given the damage it has already done. Still, the problem could be much worse: a test of security products performed by Virus Bulletin in November/December 2016 showed that at least…

  • Throwback Thursday: The malware battle: reflections and forecasts

    “Another year has come to its end and the malware battle still rages on. It seems to be a never-ending uphill struggle to secure digital information.” This could have been written just weeks ago, but in fact comes from an article written 13 years ago, in which Jamz Yaneza reflected on the year just ended and…

  • VB2016 paper: Open Source Malware Lab

    Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…

  • VB2016 paper: Open Source Malware Lab

    Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…

  • A Christmas present for the security community

    A botnet of Internet-connected cameras causing the largest DDoS ever; the ransomware threat that appears to get worse every day; a state-sponsored hacker group that attempted to influence a foreign election. 2016 has been quite a year for computer security. But that’s only half of the story. 2016 also saw many researchers analysing the threats,…

  • A Christmas present for the security community

    A botnet of Internet-connected cameras causing the largest DDoS ever; the ransomware threat that appears to get worse every day; a state-sponsored hacker group that attempted to influence a foreign election. 2016 has been quite a year for computer security. But that’s only half of the story. 2016 also saw many researchers analysing the threats,…

  • Paper: Spreading techniques used by malware

    Malware infections usually start with a user opening an attachment, visiting a link, or simply accessing an infected site with a vulnerable browser. But once malware has infected an endpoint, it often looks for other devices in order to spread further, or at least to include the files on those devices in its malicious encryption…

  • Paper: Spreading techniques used by malware

    Malware infections usually start with a user opening an attachment, visiting a link, or simply accessing an infected site with a vulnerable browser. But once malware has infected an endpoint, it often looks for other devices in order to spread further, or at least to include the files on those devices in its malicious encryption…

  • VB2016 video: On the StrongPity waterhole attacks targeting Italian and Belgian encryption users

    Last week, Microsoft published a paper on two attack groups, dubbed PROMETHIUM and NEODYMIUM, that targeted individuals in Europe and that both used the then unknown and unpatched vulnerability CVE-2016-4117 in Abobe Flash Player . However, Microsoft wasn’t the first company to write about the PROMETHIUM group and the Truvasys malware it used. At VB2016 in Denver, Kaspersky…