Posted by Virus Bulletin on Mar 2, 2015
Use of email authentication technique unlikely to bring any advantage.
Read morePosted by Virus Bulletin on Mar 2, 2015
Dénes Óvári explains how to store code in lossily compressed JPEG data.
Read morePosted by Virus Bulletin on Feb 27, 2015
Micky Pun and Neo Tan analyse the banking trojan that is best known for spreading through Skype.
Read morePosted by Virus Bulletin on Feb 27, 2015
Subject may make many feel uncomfortable, but it is essential that we know how to deal with it.
Read morePosted by Virus Bulletin on Feb 26, 2015
Malware remains present on infected machines; 2012 Virus Bulletin paper worth studying.
Read morePosted by Virus Bulletin on Feb 26, 2015
As emails were sent to wrong servers, DNSSEC might be worth looking into.
Read morePosted by Virus Bulletin on Feb 25, 2015
Each discovered vulnerability is actually a good news story.
Read morePosted by Virus Bulletin on Feb 24, 2015
Users easily tricked, but plenty of opportunity for the malware to be blocked.
Read morePosted by Virus Bulletin on Feb 20, 2015
Shared root certificate makes for easy man-in-the-middle attacks.
Read morePosted by Virus Bulletin on Feb 16, 2015
Grace period added for vulnerabilities that are about to be patched.
Read more