VB Blog

Spammer sues spammed

Posted by   Virus Bulletin on   Jan 19, 2005

The tables are turned

Read more  

Man behind web cam virus arrested

Posted by   Virus Bulletin on   Jan 19, 2005

Spanish authorities detain 37-year-old

Read more  

Explosion in SMS spam

Posted by   Virus Bulletin on   Jan 17, 2005

Korean cell phone users suffer onslaught of spam

Read more  

Texas sues for millions

Posted by   Virus Bulletin on   Jan 14, 2005

Two spammers sued by the state of Texas

Read more  

Sybari sets terms of IPO

Posted by   Virus Bulletin on   Jan 14, 2005

3.35 million common shares for sale

Read more  

McAfee sells Research assets

Posted by   Virus Bulletin on   Jan 13, 2005

SPARTA Inc. to become the lucky new owner

Read more  

FTC granted restraining order against porn spammers

Posted by   Virus Bulletin on   Jan 12, 2005

'Sexually explicit' labelling rule violated

Read more  

Tsunami scamming begins

Posted by   Virus Bulletin on   Jan 6, 2005

FBI warns donors of tsunami disaster relief fraud

Read more  

Microsoft reveals anti-spyware beta and malware removal tool

Posted by   Virus Bulletin on   Jan 6, 2005

Anti-virus imminent?

Read more  

'Spam King' agrees to hold fire

Posted by   Virus Bulletin on   Jan 5, 2005

For the time being at least...

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.