VB Blog

VB2014 paper: OPSEC for security researchers

Posted by   Virus Bulletin on   Jan 19, 2015

Vicente Diaz teaches researchers the basics of OPSEC.

Read more  

WhatsApp spam on the rise

Posted by   Virus Bulletin on   Jan 16, 2015

End-to-end encryption makes spam filtering more difficult.

Read more  

What would Cameron's 'anti-terrorism' proposals mean for the UK?

Posted by   Virus Bulletin on   Jan 15, 2015

Proposals could cause serious damage to business and the economy, and are unlikely to stop terrorism.

Read more  

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

Posted by   Virus Bulletin on   Jan 13, 2015

James Wyke looks at malware that takes extra steps to frustrate researchers.

Read more  

Microsoft no longer publishes advance notifications for its Patch Tuesdays

Posted by   Virus Bulletin on   Jan 12, 2015

Company unhappy with Google going full disclosure on privilege escalation vulnerability.

Read more  

VB2014 Paper: Attack surface analysis of Tizen devices

Posted by   Virus Bulletin on   Jan 8, 2015

Irfan Asrar looks at the security of the operating system used in many IoT devices.

Read more  

New VB100 and VBSpam test results published

Posted by   Virus Bulletin on   Jan 6, 2015

See which anti-malware and anti-spam solutions achieved certification.

Read more  

VB2014 paper: Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing

Posted by   Virus Bulletin on   Jan 6, 2015

Ahmed Zaki and Benjamin Humphrey describe a system they built for the automated detection of rootkit behaviour.

Read more  

Virus Bulletin wishes you a great 2015

Posted by   Virus Bulletin on   Jan 5, 2015

See you in Prague - and on the Internet!

Read more  

Conference review: Botconf 2014

Posted by   Virus Bulletin on   Dec 22, 2014

Second edition of 'botnet fighting conference' another great success.

Read more  

Search blog

New paper: A review of the evolution of Andromeda over the years

The Andromeda botnet (aka Gamarue or Wauchos) has plagued Internet users for more than half a decade but, following a takedown effort and the arrest of the suspected botnet owner in December 2017, it is likely we have seen the end of it. In a new paper by…
In December last year, a joint operation involving law enforcement agencies and many security firms led to the dismantling of the Andromeda botnet, also known as Gamarue or… https://www.virusbulletin.com/blog/2018/02/new-paper-review-evolution-andromeda-over-years/

VB2014 paper: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at malware that takes extra steps to frustrate researchers.
James Wyke looks at malware that takes extra steps to frustrate researchers.Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference… https://www.virusbulletin.com/blog/2015/01/paper-duping-machine-malware-strategies-post-sandbox-detection/

VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods.
James Wyke looks at four difference decoy methods.In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that… https://www.virusbulletin.com/blog/2014/08/preview-duping-machine-malware-strategies-post-sandbox-detection/

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.