VB Blog

IETF accepts DKIM specification as proposed standard

Posted by   Virus Bulletin on   May 23, 2007

Email authentication system moves to approval stage.

Read more  

New OpenOffice proof-of-concept widely noted

Posted by   Virus Bulletin on   May 23, 2007

Odd payload, not spreading danger, brings attention to cross-platform worm.

Read more  

Overflows hit NOD32

Posted by   Virus Bulletin on   May 23, 2007

Vulnerabilities disclosed after patching.

Read more  

Norton FP trashes Chinese systems

Posted by   Virus Bulletin on   May 21, 2007

Vital DLLs flagged as malware disable Windows XP across China.

Read more  

New spam-fighting system for France

Posted by   Virus Bulletin on   May 18, 2007

Junk mail blacklisting project goes live.

Read more  

Zango sues PC Tools for $35 million

Posted by   Virus Bulletin on   May 18, 2007

'Reformed' adware shippers upset by detection and removal.

Read more  

Estonian websites suffer wave of DoS attacks

Posted by   Virus Bulletin on   May 17, 2007

Baltic republic accuses Russia of cyber-warfare.

Read more  

Verizon acquires Cybertrust

Posted by   Virus Bulletin on   May 16, 2007

ICSA Labs parent company subsumed.

Read more  

Symantec files 8 piracy suits

Posted by   Virus Bulletin on   May 16, 2007

Symantec pursues distributors of counterfeit software.

Read more  

Phishing techniques and technology revealed

Posted by   Virus Bulletin on   May 11, 2007

Serious software used to analyse phished data, and a phisher talks.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.