VB Blog

FTC shuts down spammers

Posted by   Virus Bulletin on   Sep 18, 2006

Four spam companies hit by CAN-SPAM rulings.

Read more  

Several backdoors in PDF revealed

Posted by   Virus Bulletin on   Sep 18, 2006

Researcher lists security issues with document format.

Read more  

Google embarrassed by phishing demo

Posted by   Virus Bulletin on   Sep 18, 2006

Fake Gmail site served by Google itself.

Read more  

Spamhaus fined $11.7 million for blocking spam

Posted by   Virus Bulletin on   Sep 15, 2006

US judgement meaningless, says UK anti-spam project.

Read more  

Symantec hit by vulnerabilities

Posted by   Virus Bulletin on   Sep 15, 2006

Two flaws in alert handling unveiled.

Read more  

Chain letter email reaps addresses

Posted by   Virus Bulletin on   Sep 15, 2006

Fake research a harvesting trick by spammers.

Read more  

Vulnerability reported in IE

Posted by   Virus Bulletin on   Sep 15, 2006

ActiveX flaw opens another hole in MS browser.

Read more  

Sony DRM/AOL combo breaks computers

Posted by   Virus Bulletin on   Sep 14, 2006

Anti-spyware tool attacks rootkit, kills CD drive.

Read more  

ISP wins $11 million from spammers

Posted by   Virus Bulletin on   Sep 14, 2006

Judgement in EarthLink lawsuit grants heavy payout.

Read more  

Barclays phish spammed widely

Posted by   Virus Bulletin on   Sep 13, 2006

64% of recent phishes targeting global brand.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.