VB Blog

Touchy mail blocker upsets Gay

Posted by   Virus Bulletin on   May 2, 2007

Content filter berates woman for using own name in mails.

Read more  

Botnet DoS no longer profitable

Posted by   Virus Bulletin on   May 2, 2007

Extortion attacks fall as herders find easier money elsewhere.

Read more  

Erratum: VB100 Linux comparative

Posted by   Virus Bulletin on   May 1, 2007

Dr.Web results corrected.

Read more  

Massive lawsuit brought against spam harvesters

Posted by   Virus Bulletin on   May 1, 2007

Harvesting detection project aims to prosecute address abusers.

Read more  

May issue of VB published

Posted by   Virus Bulletin on   May 1, 2007

The May issue of Virus Bulletin is now available for subscribers to download.

Read more  

DoS attacks support political unrest

Posted by   Virus Bulletin on   May 1, 2007

Estonia rioting backed up by attacks on government websites.

Read more  

VB100 procedure review

Posted by   Virus Bulletin on   May 1, 2007

Test procedures clarified.

Read more  

Google advert exploit attack analysed

Posted by   Virus Bulletin on   May 1, 2007

Video demonstrates malware infiltration via ads for legitimate sites.

Read more  

A new generation of Panda

Posted by   Virus Bulletin on   May 1, 2007

Panda sells majority shareholding.

Read more  

Websense snaps up SurfControl

Posted by   Virus Bulletin on   May 1, 2007

$400m for British web-filtering company.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.