Friday, September 28, 2007
|
|
Thursday, September 27, 2007
|
|

The new layout includes a comment system:

Comments are currently moderated during the Helsinki day shift, be patient.
We've added navigation options:

For example – the
FSLABS TUBE button will take you to our YouTube Channel:

Post titles will now link to the
individual pages we created a couple of weeks ago. We have also added additional navigation options to these pages.
The archive indexes remain in place for those that prefer that layout. (And to maintain legacy support, e.g. anchored links are still valid…)
We'll be adjusting the rss feed next week to point to the individual post pages. The
ABOUT US button contains our contact information.
Signing off,
Kamil
Wednesday, September 26, 2007
|
|

Mika is the author of one of our analysis tools called
Mstrings. The tool is part of the automation that assists us in identifying malware as Banking Trojans. His presentation,
The Trojan Money Spinner, provides details on the nature of Banking Trojans and their function.
PDF files are available —
Virus Bulletin Conference September 2007
The Trojan Money Spinner and
Presentation SlidesLegal Stuff –
Copyright is held by Virus Bulletin Ltd, but is made available on this site for personal use free of charge by permission of Virus Bulletin.There is also a
video excerpt available on our YouTube
Channel.
Monday, September 24, 2007
|
|
Wednesday, September 19, 2007
|
|
Vienna |
Posted by Sean @ 16:41 GMT |
|
Monday, September 17, 2007
|
|
Sunday, September 16, 2007
|
|
Friday, September 14, 2007
|
|
Wednesday, September 12, 2007
|
|

These updates involve applications including Visual Studio, Windows Services for UNIX, Subsystem for UNIX-based application, MSN Messenger, and Windows Live Messenger. All of these could allow remote code execution and one allows an elevation of privileges.
For more details on these updates, here's the link to
Microsoft's Security Bulletin.
BE SURE to update!
Monday, September 10, 2007
|
|
Sunday, September 9, 2007
|
|


What's interesting is that the website they want you to visit doesn't contain exploit code anymore. To become infected you have to click on one of the links or on the picture (they all point to the same file –
tracker.exe) and run the file. Still, this can change at any moment so don't click on any links you receive in these e-mails.
Thursday, September 6, 2007
|
|

Clicking on the button in that web page will download a malicious file called
tor.exe onto the system. This file is already detected as
Email-Worm:W32/Zhelatin.IL.
Do note that the real TOR application is hosted on http://tor.eff.org/. For those unfamiliar with it, it's a system designed to enable its users to communicate anonymously over the Internet.
Wednesday, September 5, 2007
|
|
Tuesday, September 4, 2007
|
|
Saturday, September 1, 2007
|
|
3D Spam |
Posted by Mikko @ 08:18 GMT |
|