VB Blog

China calculates cost of spam

Posted by   Virus Bulletin on   Apr 1, 2006

Lost productivity costs dear.

Read more  

Largest can-spam fine to be paid

Posted by   Virus Bulletin on   Apr 1, 2006

Internet marketing firm makes $900,000 settlement.

Read more  

Code of practice for Australia's ISPs

Posted by   Virus Bulletin on   Apr 1, 2006

Legislative code to come into force.

Read more  

More updating woes

Posted by   Virus Bulletin on   Apr 1, 2006

Another troublesome month for security vendors.

Read more  

Spy couple sentenced

Posted by   Virus Bulletin on   Apr 1, 2006

Trojan peddlers get their comeuppance.

Read more  

'Real' computer virus

Posted by   Virus Bulletin on   Apr 1, 2006

Digital life form.

Read more  

Dutch police arrest Nigerian scammers

Posted by   Virus Bulletin on   Mar 1, 2006

419 scamming ring uncovered

Read more  

China to crack down on spam

Posted by   Virus Bulletin on   Mar 1, 2006

China toughens up its anti-spam regulations

Read more  

Vigilant staff avert phishing scam

Posted by   Virus Bulletin on   Mar 1, 2006

Scammers halted in their tracks

Read more  

Hotbar adware dispute settled

Posted by   Virus Bulletin on   Mar 1, 2006

Symantec settles adware case

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.