Posted by Virus Bulletin on Sep 15, 2014
23 out of 29 tested products earn VB100 award.
Read morePosted by Virus Bulletin on Sep 12, 2014
Call to use end-to-end encryption and to deploy DNSSEC.
Read morePosted by Virus Bulletin on Sep 12, 2014
FireEye researchers show a large attack vector for Apple's mobile operating system.
Read morePosted by Virus Bulletin on Sep 11, 2014
Trick shows that spammers still try to beat content-based filters.
Read morePosted by Virus Bulletin on Sep 11, 2014
Aditya K. Sood and Rohit Bansal study the malware's behaviour when ran on a physical machine.
Read morePosted by Virus Bulletin on Sep 10, 2014
Use of single XOR key leaves ransomware open to known-plaintext attack.
Read morePosted by Virus Bulletin on Sep 9, 2014
Richard Ford and Marco Carvalho present an idea for how to test products that claim to detect the unknown.
Read morePosted by Virus Bulletin on Sep 5, 2014
Hot topics to be covered at VB2014 conference in Seattle.
Read morePosted by Virus Bulletin on Sep 3, 2014
Aditya K. Sood and Rohit Bansal dissect botnet primarily used for financial fraud.
Read morePosted by Virus Bulletin on Sep 2, 2014
Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware.
Read more