VBSpam VB100

In this month's VBSpam test, spam catch rates were high, but false positives were still an issue for some products - two of which failed to achieve a VBSpam award. The introduction of a slightly modified formula for calculating products' final scores has made achieving a VBSpam+ award a little harder - yet four products managed to do so. | Read more...


For the first time, this test saw a clean sweep of certification passes, with all products reaching the required standard for a VB100 badge, and most also doing well in terms of stability. | Read more...


Features
  • VBSpam certification report January 2014

    The full VBSpam test report provides detailed performance analysis, detection rates and the testing team's thoughts on user experience for each product. The report can now be purchased as a standalone item priced at $19.95.

  • VB100 certification report on Ubuntu Server 12.04LTS

    The full VB100 test report provides detailed performance analysis, detection rates and the testing team's thoughts on user experience for each product. The report can now be purchased as a standalone item priced at $19.95.

  • VB100 RAP Quadrant Aug 2013 - Feb 2014

    VBSpam Quadrant March 2014


  • Have NSA leaks given us our cyber-Chernobyl?

    It has often been said that the reason the general public does not take IT security seriously is that there has not been a sufficiently serious IT security disaster to make them take notice. But have leaks about the NSA given us the ‘cyber-Chernobyl’ that will make the public start taking information security seriously? Lysa Myers looks at changing public opinions on security.

    Read more...

  • Threat intelligence sharing: tying one hand behind our backs (s)

    ‘We will need to collaborate and implement standardized threat data sharing.' Chad Loeven

    Read more...

  • In search of a secure operating system

    Over the last decade or so, security has steadily become more of an issue for OS vendors due to the changing threat environment. Mark Fioravanti and Richard Ford look to the past in search of a secure operating system.

    Read more...

  • Inside an iframe injector: a look into NiFramer

    Running an iframe injector on a compromised virtual hosting server can easily result in the infection of hundreds of web servers in just a few seconds. Aditya Sood and colleagues look at the design of a basic injector: NiFramer.

    Read more...

  • The curse of Necurs, part 1 (s)

    The Necurs rootkit is composed of a kernel-mode driver and a user-mode component. The rootkit makes use of some very powerful techniques, but fortunately it also has some chinks in its armour. Peter Ferrie describes its strengths and weaknesses.

    Read more...

  • Tofsee botnet (s)

    The spam botnet Tofsee can be divided into three components: loader, core module and plug-ins. Ryan Mi describes how the components communicate with the C&C server, and how they work with one another.

    Read more...

  • Back to VBA (s)

    Last month’s issue of Virus Bulletin featured a detailed analysis of the Polarbot (a.k.a. Solarbot) trojan. The article covered just about everything you could ever want to know about it – except for one thing: how does a computer end up being infected with this creation? Gabor Szappanos fills the gap by detailing one of the infiltration methods that was used extensively in the attack.

    Read more...
  • VB100 certification report on Ubuntu Server 12.04LTS

    The full VB100 test report provides detailed performance analysis, detection rates and the testing team's thoughts on user experience for each product. The report can now be purchased as a standalone item priced at $19.95.

  • VB100 RAP Quadrant Aug 2013 - Feb 2014

    VBSpam Quadrant March 2014


  • Have NSA leaks given us our cyber-Chernobyl?

    It has often been said that the reason the general public does not take IT security seriously is that there has not been a sufficiently serious IT security disaster to make them take notice. But have leaks about the NSA given us the ‘cyber-Chernobyl’ that will make the public start taking information security seriously? Lysa Myers looks at changing public opinions on security.

    Read more...

  • Threat intelligence sharing: tying one hand behind our backs (s)

    ‘We will need to collaborate and implement standardized threat data sharing.' Chad Loeven

    Read more...

  • In search of a secure operating system

    Over the last decade or so, security has steadily become more of an issue for OS vendors due to the changing threat environment. Mark Fioravanti and Richard Ford look to the past in search of a secure operating system.

    Read more...

  • Inside an iframe injector: a look into NiFramer

    Running an iframe injector on a compromised virtual hosting server can easily result in the infection of hundreds of web servers in just a few seconds. Aditya Sood and colleagues look at the design of a basic injector: NiFramer.

    Read more...

  • The curse of Necurs, part 1 (s)

    The Necurs rootkit is composed of a kernel-mode driver and a user-mode component. The rootkit makes use of some very powerful techniques, but fortunately it also has some chinks in its armour. Peter Ferrie describes its strengths and weaknesses.

    Read more...

  • Tofsee botnet (s)

    The spam botnet Tofsee can be divided into three components: loader, core module and plug-ins. Ryan Mi describes how the components communicate with the C&C server, and how they work with one another.

    Read more...

  • Back to VBA (s)

    Last month’s issue of Virus Bulletin featured a detailed analysis of the Polarbot (a.k.a. Solarbot) trojan. The article covered just about everything you could ever want to know about it – except for one thing: how does a computer end up being infected with this creation? Gabor Szappanos fills the gap by detailing one of the infiltration methods that was used extensively in the attack.

    Read more...
  • VBSpam certification report January 2014

    The full VBSpam test report provides detailed performance analysis, detection rates and the testing team's thoughts on user experience for each product. The report can now be purchased as a standalone item priced at $19.95.


Calendar
Date Event Location
April 22 - 24 ICS Cyber Security London, UK
April 29 - 30 Counter Terror Expo London, UK
April 29 - May 01 Infosecurity Europe London, UK
April 29 - May 02 U.S. Cyber Crime Conference Washington, DC, USA
May 12 - 16 AusCERT2014 Gold Coast, Australia
May 14 - 16 15th Annual National Information Security Conference (NISC) Glasgow, Scotland
May 15 - 16 CARO 2014 - the 8th Internatinal CARO Workshop Melbourne, FL, USA
May 15 - 16 IFILTRATE Miami, FL, USA
Sept 24 - 26 VB2014 Seattle, WA, USA
Sept 30 - Oct 02 VB2015 Prague, Czech Republic

VB Conference

VB2014 Seattle, 24-26 Sept 2014: Covering the global threat landscape The VB conference is a major highlight of the anti-malware calendar, with many of its regular attendees citing it as the anti-malware event of the year. The 24th Virus Bulletin International Conference (VB2014) takes place 24-26 September 2014 at the Westin Seattle hotel, Seattle, WA, USA.

‘One of the best conferences I have ever attended in every aspect.’

VB Conference

Quick Links

Poll
Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 24 comments

SMI Oil and Gas Cyber Security 2014

VB2014
VB2014 VB2014 will take place 24 - 26 September 2014 at the Westin Seattle hotel, Seattle, WA, USA.

Virus Bulletin currently has 231,338 registered users.