VB Blog

Security-conscious processors

Posted by   Virus Bulletin on   Jan 12, 2004

AMD and Intel prep technology to prevent buffer overflows at the hardware level.

Read more  

Weekend round-up

Posted by   Virus Bulletin on   Jan 12, 2004

Narrowband blues, 2004 predictions, VeriSign scuttles Symantec, Dloader/Xombie

Read more  

US and UK spam legislation in place

Posted by   Virus Bulletin on   Dec 29, 2003

Anti-spam legislation in place.

Read more  

Number crunching

Posted by   Virus Bulletin on   Dec 19, 2003

Calculating the average cost of a virus attack - estimates or guesstimates?

Read more  

SAS - the SysAsmin Service?

Posted by   Virus Bulletin on   Dec 18, 2003

Computer security experts prepare to become special constables.

Read more  

SpamCop snapped up

Posted by   Virus Bulletin on   Dec 1, 2003

IronPort Systems to purchase SpamCop

Read more  

Seasonal spamming

Posted by   Virus Bulletin on   Dec 1, 2003

Increase in spam in lead up to holiday season.

Read more  

VB2004 call for papers

Posted by   Virus Bulletin on   Nov 15, 2003

Virus Bulletin calls for all speakers papers.

Read more  

The menace within

Posted by   Virus Bulletin on   Nov 4, 2003

Is BitDefender really staffed by Romanian vampire hackers...?

Read more  

Unanimous vote for CAN-SPAM Act

Posted by   Virus Bulletin on   Nov 1, 2003

US Senate approves federal anti-spam legislation.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.