Category: blog

  • VB2016 Call for Papers – Frequently Asked Questions

    The call for papers for VB2016 , the 26th Virus Bulletin conference, which takes place 5 to 7 October in Denver, CO, USA, is currently open. We’ve had some excellent presentations at recent VB conferences, and we are never short of high-quality submissions to fill the schedule. Nevertheless, we’re always on the look out for…

  • Throwback Thursday: Hash Woes

    Just last week, VB Editor Martijn Grooten addressed an audience at the RSA Conference in San Francisco on the topic of cryptographic protocols that have supposedly been broken in recent years, including the SHA-1 hash function which is considered all but broken. Back in 2004, the entire crypto community was abuzz with the astonishing news that a…

  • VB2015 paper: Mobile Banking Fraud via SMS in North America: Who’s Doing it and How

    While SMS has been declared dead many times, the service remains frequently used – and abused. In a paper presented at VB2015 in Prague, Adaptive Mobile researcher Cathal Mc Daid looked at fraudulent SMS campaigns, in particular those targeting banking users in North America. He showed how these campaigns tend to target specific banks and…

  • Throwback Thursday: Viruses on the Internet

    This Throwback Thursday VB heads back to 1996 when VB published a report on the state of viruses on the Internet. In the mid-1990s, long before the days of driveby downloads and exploit kits, the main source of viruses on the Internet was virus sites – indeed, in 1995, the NCSA, together with a number…

  • RSA and BSides San Francisco

    Next week, almost everyone with a stake in or an opinion on IT security will be in San Francisco for the annual RSA Conference . I will be there as well, and although Virus Bulletin doesn’t have a booth at the event, I am looking forward to meeting old and new friends and discussing our…

  • Virus Bulletin publishes first web filter test report

    Virus Bulletin has been testing security products for more than 18 years, and in recent years, we have had many requests from product developers asking us to test their web security products. After all, whether malicious software is downloaded directly from websites or through sneaky drive-by downloads, the web remains an important infection vector. In…

  • VB2015 paper: Will Android Trojans, Worms or Rootkits Survive in SEAndroid and Containerization?

    Google ‘s Android operating system may have a bit of a bad reputation when it comes to security, but it’s worth noting that recent versions of the operating system have been hardened a lot. In a paper presented at VB2015, Sophos researchers Rowland Yu and William Lee look at two recent security enhancements, Security Enhancements…

  • First six VB2016 sponsors announced

    While VB2016, the 26th Virus Bulletin conference, is still more than nine months away, preparations for the event are well under way. Hopefully you will already have seen the call for papers – some interesting proposals are coming in, but there’s plenty of room for more, so make sure you get your submission in before…

  • VB2015 paper: Sizing cybercrime: incidents and accidents, hints and allegations

    How big is cybercrime? Various attempts have been made to measure the size of cybercrime around the world, or in individual countries, but how reliable are the methodologies used, and what do they actually measure? In the paper ” Sizing cybercrime: incidents and accidents, hints and allegations ” presented at VB2015 in Prague, ESET researcher…

  • Throwback Thursday: The Thin Blue Line

    This Throwback Thursday, VB heads back to 1994 when UK Fraud Squad detectives started making inroads into the most puzzling ‘Whodunnit’ since the Great Train Robbery. Had an outbreak of computer crime swept Britain? No, it was all part of a police training program. Last year, a total of 400 people from 16 nations participated…