VB Blog

419 ringleader arrested

Posted by   Virus Bulletin on   Aug 9, 2006

Scammer made $2m, now behind bars in Lagos.

Read more  

AOL hands out security software

Posted by   Virus Bulletin on   Aug 9, 2006

Web giant provides free Kaspersky AV to all.

Read more  

JFK spam scam

Posted by   Virus Bulletin on   Aug 9, 2006

419ers try conspiracy tactic.

Read more  

F-Secure and Symbian row over hype

Posted by   Virus Bulletin on   Aug 9, 2006

Commwarrior alert reignites battle over mobile malware danger.

Read more  

Badware blacklist comes into force at Google

Posted by   Virus Bulletin on   Aug 8, 2006

Search engine starts flagging suspect sites.

Read more  

South African bank gives away Trend software

Posted by   Virus Bulletin on   Aug 8, 2006

More online customers get free protection.

Read more  

Spammers target phones

Posted by   Virus Bulletin on   Aug 7, 2006

Text message spam on the rise.

Read more  

BlackHat shows off yet more holes

Posted by   Virus Bulletin on   Aug 7, 2006

As conference highlights security issues, MS dares hackers to find more.

Read more  

More vulns in AV products

Posted by   Virus Bulletin on   Aug 7, 2006

eTrust, PC Tools suffer security bugs.

Read more  

Norton scares vicars

Posted by   Virus Bulletin on   Aug 4, 2006

Sermon software spyware, says Symantec.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.