Posted by Virus Bulletin on Sep 12, 2014
Call to use end-to-end encryption and to deploy DNSSEC.
Read morePosted by Virus Bulletin on Sep 11, 2014
Trick shows that spammers still try to beat content-based filters.
Read morePosted by Virus Bulletin on Sep 11, 2014
Aditya K. Sood and Rohit Bansal study the malware's behaviour when ran on a physical machine.
Read morePosted by Virus Bulletin on Sep 10, 2014
Use of single XOR key leaves ransomware open to known-plaintext attack.
Read morePosted by Virus Bulletin on Sep 9, 2014
Richard Ford and Marco Carvalho present an idea for how to test products that claim to detect the unknown.
Read morePosted by Virus Bulletin on Sep 5, 2014
Hot topics to be covered at VB2014 conference in Seattle.
Read morePosted by Virus Bulletin on Sep 3, 2014
Aditya K. Sood and Rohit Bansal dissect botnet primarily used for financial fraud.
Read morePosted by Virus Bulletin on Sep 2, 2014
Hong Kei Chan and Liang Huang describe the various aspects and the evolution of point-of-sale malware.
Read morePosted by Virus Bulletin on Aug 29, 2014
Thibault Reuille and Dhia Mahjoub use particle physics to shows clusters of malicious domains.
Read morePosted by Virus Bulletin on Aug 28, 2014
Malware possibly still in the 'brewing' stage.
Read more