VB Blog

Figures and fluctuations

Posted by   Virus Bulletin on   May 6, 2004

Dips, increases and the cost of dealing with spam

Read more  

NAI reverts to McAfee

Posted by   Virus Bulletin on   May 5, 2004

Network Associates Inc. (NAI) to streamline and adopt (not so) new name.

Read more  

Call for papers: AVAR 2004

Posted by   Virus Bulletin on   May 2, 2004

AVAR calls for papers

Read more  

Symantec vulnerabilities

Posted by   Virus Bulletin on   Apr 20, 2004

eEye reports four new Symantec vulnerabilities

Read more  

Business news

Posted by   Virus Bulletin on   Apr 18, 2004

Acquisitions and new product lines

Read more  

Shrinking violets

Posted by   Virus Bulletin on   Apr 1, 2004

Consolidation in the anti-spam industry

Read more  

No bull?

Posted by   Virus Bulletin on   Apr 1, 2004

Eset vs. BullGuard

Read more  

New sentencing, new legislation

Posted by   Virus Bulletin on   Apr 1, 2004

United States Sentencing Commission gets busy...

Read more  

Patent for Postini

Posted by   Virus Bulletin on   Mar 31, 2004

Postini wins U.S. patent for email filtering

Read more  

Roll up, roll up

Posted by   Virus Bulletin on   Mar 30, 2004

AOL raffles spammer's Porsche

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.