An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Jeffrey Aboud investigates the buzz surrounding trojan crimeware.
Read moreThe Linkoptimizer trojan raised alarms in the AV industry signalling that there are other ingenious ways besides advanced rootkits to make the lives of both users and security providers difficult. Mircea Ciubotariu has the full details of…
Read moreIn last month's VB John Graham-Cumming reported on the rise and rise of image spam. Here, Catalin Cosoi describes a technique for dealing with this form of spam.
Read morePeter Ferrie describes a virus that comes in both 32-bit and 64-bit versions and which uses an entrypoint obscuring technique that no one has used before: W32/Bounds and W64/Bounds!AMD64.
Read moreJohn Graham-Cumming charts the rise of image-based spam.
Read moreJohn Hawes tries out F-Secure's latest release: F-Secure Internet Security 2007.
Read moreDavid Harley shares some of his thoughts on public perceptions of the anti-malware industry.
Read more'My feeling is that we are unlikely to see an open source replacement for SoftICE any time soon.' Aleksander Czarnowski, Avet.
Read moreUpdates and corrections to last month's Windows 2000 Server comparative review.
Read moreKaoru Hayashi has the details of Infostealer.Snifula - a trojan that spies on Firefox.
Read more