VB Blog

Zango not guilty on spyware charges

Posted by   Virus Bulletin on   Sep 8, 2006

Spyware bad, adware OK, says court.

Read more  

Spyware firms charged $2 million

Posted by   Virus Bulletin on   Sep 7, 2006

FTC takes cash, bans from future naughtiness.

Read more  

'Magic Quadrant' study unveiled

Posted by   Virus Bulletin on   Sep 7, 2006

AV industry future revealed - must do better.

Read more  

MS sues UK spammer

Posted by   Virus Bulletin on   Sep 7, 2006

Civil action avoids spam law technicalities.

Read more  

Nine years for spam felon

Posted by   Virus Bulletin on   Sep 6, 2006

Tough sentence upheld despite free-speech claims.

Read more  

Word zero-day exploited

Posted by   Virus Bulletin on   Sep 6, 2006

Trojan uses unpatched hole in office software.

Read more  

Subliminal message hidden in spam

Posted by   Virus Bulletin on   Sep 6, 2006

Mail campaign aims to sneak into readers' subconscious minds.

Read more  

Phishing on the rise

Posted by   Virus Bulletin on   Sep 5, 2006

One in three malicious emails a phish, says MessageLabs.

Read more  

Gromozon mystery clearing

Posted by   Virus Bulletin on   Sep 5, 2006

Cleaner tool aims to remove sophisticated attack.

Read more  

New New Zealand spam laws to allow spam

Posted by   Virus Bulletin on   Sep 4, 2006

Adjustments to laws may let 'non-commercial' spam continue.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.