Category: blog

  • Throwback Thursday: Cabirn Fever

    This Throwback Thursday, we turn the clock back to 2004, when the first worm to spread from mobile phone to mobile phone appeared. Since it first appeared almost exactly 11 years ago, mobile malware has broadly followed the same evolutionary path as PC malware — but at a much faster rate. The first piece of…

  • Little sympathy for breached Hacking Team

    Lists of customers, source code and zero-day vulnerabilities made public. The biggest security story of this week, and probably one of the biggest of the year, is the hack of Italian company Hacking Team . The story has been covered widely, for instance by Wired , Ars Technica , The Register and Forbes , as…

  • Throwback Thursday: The Updating Game

    This Throwback Thursday, we turn the clock back to 1997, when automatic updates of AV software were not the norm. We all know that the malware scene has changed almost beyond recognition in the last 25 years — one clear indication of that is the fact that, in 1991, we were being advised by the…

  • Nominations opened for second Péter Ször Award

    ‘Brilliant mind and a true gentleman’ commemorated through annual award for technical security research. During VB2014 in Seattle, we presented the first annual Péter Ször Award to a group of ESET researchers for their work on ‘Operation Windigo’. The award was set up to commemorate of the life and work of security researcher Péter Ször,…

  • Latest spam filter test sees significant drop in catch rates

    Despite a drop in catch rates, 15 products earn a VBSpam award, with four earning a VBSpam+ award. Spam is notoriously volatile and thus, while we like to make the news headlines with our tests as much as anyone, we would warn against reading too much into the fact that the percentage of spam missed…

  • VB2014 paper: Quantifying maliciousness in Alexa top-ranked domains

    Paul Royal looks at malware served through the most popular websites. Though VB2014 took place nine months ago, most of the papers presented during the conference remain very relevant. Paul Royal’s paper ‘Quantifying maliciousness in Alexa top-ranked domains’ is no exception. Large websites serving malware through direct compromises or through compromises of the ad networks…

  • Throwback Thursday: KAOS on the Superhighway?

    This Throwback Thursday, we turn the clock back to 1994, when KAOS4 was discovered on the Internet. A new virus has been found on the Internet — today, this is an unfortunate fact of everyday life, and unless the virus is particularly interesting, not even noteworthy. In July 1994, however, the discovery of KAOS4 on…

  • Steganoprague: a VB2015 competition & puzzle

    Use your obfuscation and deobfuscation skills to win a prize during the VB2015 conference! “It is time for defenders to go on the offence,” wrote Andreas Lindh in Virus Bulletin last year. Indeed, the distinction between defensive and offensive has become increasingly blurred in recent years. Today, we present ‘Steganoprague’: a competition that takes place…

  • Paper: Using .NET GUIDs to help hunt for malware

    Tool to extract identifiers incorporated into VirusTotal. The large number of new malware samples found each day hasn’t made malware analysis an easier task, and researchers could use anything that helps them automate this task. Today, we publish a paper by Cylance researcher Brian Wallace, who looks at two globally unique identifiers (GUIDs) found in…

  • NSA, GCHQ found to target anti-virus products

    Agencies looked for vulnerabilities to exploit and for submitted malware samples. New documents from NSA whistle-blower Edward Snowden have revealed the agency and its British counterpart GCHQ have actively been targeting anti-virus companies, The Intercept reports . The agencies have been found to be looking for weaknesses in anti-virus products and to have obtained intelligence…