VB Blog

MSNBC's spam boob

Posted by   Virus Bulletin on   Feb 25, 2005

News channel sends spam message as 'breaking news'

Read more  

Virus alerts for UK computer users

Posted by   Virus Bulletin on   Feb 24, 2005

Government launches IT security website

Read more  

US spammers arrested

Posted by   Virus Bulletin on   Feb 18, 2005

Airport arrest for 18-year-old spammer, and felony charge for SMS election spammer

Read more  

Phish Report Network announced

Posted by   Virus Bulletin on   Feb 15, 2005

Microsoft, eBay, PayPal and Visa join forces

Read more  

Microsoft and Pfizer join forces to slam spam

Posted by   Virus Bulletin on   Feb 14, 2005

Two giants unite in the courtroom

Read more  

Latest VGrep

Posted by   Virus Bulletin on   Feb 10, 2005

The latest version of the virus name lookup tool - VGrep, is now available.

Read more  

India to curb SMS spam

Posted by   Virus Bulletin on   Feb 8, 2005

Supreme Court urges government to crack down on mobile spam

Read more  

Microsoft acquires Sybari

Posted by   Virus Bulletin on   Feb 8, 2005

Microsoft announces another AV acquisition

Read more  

University of Calgary teaches spam

Posted by   Virus Bulletin on   Feb 8, 2005

Learnt how to create viruses? Now learn how to create spam and spyware

Read more  

New Zealand to curb spam

Posted by   Virus Bulletin on   Feb 3, 2005

Anti-spam codes of conduct for SMS and email

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.