VB Blog

Email worm spams global war news

Posted by   Virus Bulletin on   Nov 9, 2006

Bush and Putin still alive, no nuclear war ahead.

Read more  

Google blog spreads Kama Sutra worm

Posted by   Virus Bulletin on   Nov 9, 2006

MyWife variant mailed to 50,000 video blog watchers.

Read more  

AOL ICQ vulnerability revealed

Posted by   Virus Bulletin on   Nov 9, 2006

Chat program remote execution flaw patched.

Read more  

US way ahead in phishing and spam

Posted by   Virus Bulletin on   Nov 7, 2006

PhishTank, Sophos stats put US at top of lists.

Read more  

XMLHTTP zero-day exploit

Posted by   Virus Bulletin on   Nov 7, 2006

ActiveX vulnerability in use by attackers.

Read more  

FBI busts phishing gang

Posted by   Virus Bulletin on   Nov 6, 2006

Arrests made in Poland and US, more expected.

Read more  

Adware costs Zango $3 million

Posted by   Virus Bulletin on   Nov 6, 2006

Cash and promises settle deceptive practices case.

Read more  

IE7 causing McAfee update problems

Posted by   Virus Bulletin on   Nov 3, 2006

New browser version blocking install and updates.

Read more  

Wikipedia spam points to malware

Posted by   Virus Bulletin on   Nov 3, 2006

Emails used archive function to lend authenticity.

Read more  

New OSX parasitic virus found

Posted by   Virus Bulletin on   Nov 3, 2006

Symantec report proof-of-concept file infector for Mac.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.