Welcome to virusbulletin.com

Posted by   Martijn Grooten on   Feb 10, 2016

Virus Bulletin revealed its first website in the spring of 1996, almost 20 years ago. As was common in those days, it was referred to as 'our presence on the "world wide web"' — making me wonder whether millennials even know what www in so many domain names stands for.

Thanks to archive.org, we know that this is what the site looked like:

vbwebsite1997.pngOver the course of 20 years, we have changed the design several times — and have made changes to the back-end of the site just as many times.

But when we asked people what they thought about our website, they often said it was rather cluttered and looked a bit old-fashioned. We agreed.

And, of course, that was only the front-end. The back-end ran on a platform that, according to its Wikipedia page, was retired in August 2009. (We ran our own fork of the platform, which continued to be supported — by us.)

During the past year, we have worked hard on rebuilding and redesigning the website. It has been a fun and at times frustrating project to work on, and I would like to thank my colleague, Lian Sebe, who did most of the work.

Today, the new website goes live. And to honour the occasion, we have also moved our site to a new domain: www.virusbulletin.com. (For the time being we are still using virusbtn.com for email.)

We know enough about IT security to be aware that no site or software is without its flaws and you may occasionally see something that doesn't work. Please let us know about it, or just bear with us as we keep a close eye on the web server's error logs.

And keep watching this space to learn about the new things we're adding to the website. Here's to www.virusbulletin.com!

Martijn Grooten
Editor, Virus Bulletin

 

 Tags

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.