Category: blog

  • VB2014 paper: Duping the machine – malware strategies, post sandbox detection

    James Wyke looks at malware that takes extra steps to frustrate researchers. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Duping the machine – malware strategies, post sandbox detection’ by Sophos researcher James…

  • Microsoft no longer publishes advance notifications for its Patch Tuesdays

    Company unhappy with Google going full disclosure on privilege escalation vulnerability. Tomorrow is the second Tuesday of the month and, as most people reading this blog will know, this means Microsoft will release security updates for its software products. But this “Patch Tuesday” will be slightly different from previous ones, as the company has stopped…

  • VB2014 Paper: Attack surface analysis of Tizen devices

    Irfan Asrar looks at the security of the operating system used in many IoT devices. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Attack surface analysis of Tizen devices’ by Irfan Asrar, a…

  • New VB100 and VBSpam test results published

    See which anti-malware and anti-spam solutions achieved certification. Shortly before the Christmas holidays, we published a new VB100 anti-malware test report as well as a new VBSpam test report. VB100 – clean sweep John Hawes and his team put 29 anti-malware solutions through their paces on Windows Server 2008 and, for the first time ever…

  • VB2014 paper: Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing

    Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘ Unveiling the kernel: rootkit discovery using selective…

  • Virus Bulletin wishes you a great 2015

    See you in Prague – and on the Internet! 2014 was an exciting year for Virus Bulletin: we made all of our content free , ran a successful and well-attended conference in Seattle, and added some new members to our team . In 2015, you can expect to see lots more of the regular research…

  • Conference review: Botconf 2014

    Second edition of ‘botnet fighting conference’ another great success. I had been looking forward to the second edition of the Botconf conference ever since I came back from the first one last year, and being given a speakers’ slot was the icing on the cake. The conference, which saw 200 security researchers travel to Nancy,…

  • Call for Papers: VB2015 Prague

    VB seeks submissions for the 25th Virus Bulletin Conference. Virus Bulletin is seeking submissions from those wishing to present papers at VB2015 , which will take place 30 September to 2 October 2015 at the Clarion Congress Hotel in Prague, Czech Republic. Originally started as an annual gathering of anti-virus experts, the VB conference has…

  • Book review: Countdown to Zero Day

    Kim Zetter’s book on Stuxnet is a must-read for anyone interested in malware – or in 21st century geopolitics. There is a tendency among the media to call every hack ‘advanced’, to blame every attack on a nation state, and to label every industrial failure as ‘cyber’. It is good to approach such stories with…

  • Virus Bulletin announces platinum sponsors for VB2015

    More sponsorship opportunities available. While the opening of VB2015 in Prague is still more than nine months away, we have already started with the preparations for what will be the 25th Virus Bulletin conference. And we’re not the only ones looking forward to the conference: several companies have already been eager to associate themselves with…