VB Blog

Spam printing proof-of-concept revealed

Posted by   Virus Bulletin on   Jan 14, 2008

Lack of security allows websites to send spammish content to network printers.

Read more  

Hundreds of legitimate websites being hacked into

Posted by   Virus Bulletin on   Jan 14, 2008

New mass infection leaves security researchers puzzled.

Read more  

SQL attack hacks wide range of sites

Posted by   Virus Bulletin on   Jan 8, 2008

CA among victims of major attack linking sites to malware.

Read more  

Batch of Dutch MP3 players ships with malware

Posted by   Virus Bulletin on   Jan 8, 2008

Worm included as unwanted extra for music lovers.

Read more  

Usual fare for holiday season

Posted by   Virus Bulletin on   Jan 8, 2008

Storm ecards and social site spyware mark unsurprising year end.

Read more  

Mortgage spam rockets

Posted by   Virus Bulletin on   Jan 1, 2008

Spammers take note of US interest rate cuts.

Read more  

All in the name

Posted by   Virus Bulletin on   Jan 1, 2008

Grisoft becomes AVG.

Read more  

No taste for spam?

Posted by   Virus Bulletin on   Jan 1, 2008

ICANN takes steps to combat domain tasting.

Read more  

Anti-malware school

Posted by   Virus Bulletin on   Jan 1, 2008

F-Secure launches malware analysis course at Helsinki University.

Read more  

FTC notes malicious spam on the rise

Posted by   Virus Bulletin on   Jan 1, 2008

FTC reports on a decade of spam fighting.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.