VB Blog

Probation for Magold author

Posted by   Virus Bulletin on   Jul 25, 2004

Magold author sentenced, Finnish Lasku author arrested.

Read more  

Spammer to pay $40,000

Posted by   Virus Bulletin on   Jul 22, 2004

Spam King agrees to settlement with NY State.

Read more  

McAfee plans move to Ireland

Posted by   Virus Bulletin on   Jul 21, 2004

Emerald Isle lures another AV firm.

Read more  

Two victories, a settlement and a reduction in spam

Posted by   Virus Bulletin on   Jul 21, 2004

Despite there currently being no US laws regarding SMS spam.

Read more  

Virus in your pocket

Posted by   Virus Bulletin on   Jul 20, 2004

Latest proof-of-concept virus affects Pocket PC.

Read more  

Court victory for Microsoft

Posted by   Virus Bulletin on   Jul 16, 2004

Spammer ordered to pay $4 million damages to Microsoft.

Read more  

Bumper quarter for Symantec

Posted by   Virus Bulletin on   Jul 15, 2004

Profits more than doubled since last year.

Read more  

AOL employee colludes with spammers

Posted by   Virus Bulletin on   Jul 8, 2004

AOL victim of inside job.

Read more  

The world from an email marketer's point of view

Posted by   Virus Bulletin on   Jul 7, 2004

Anti-virus and security related articles provided by independent anti-virus advisors, Virus Bulletin

Read more  

UN to curb spam within two years

Posted by   Virus Bulletin on   Jul 7, 2004

UN aims to bring spam under control by 2007.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.