Virus Bulletin issue archive
The Bulletin is an indispensable source of reference for anyone concerned with the prevention, detection and removal of computer threats, including but not limited to malware and spam.
Between 1989 and 2014, VB published the monthly, subscriber-based Virus Bulletin magazine. The Bulletin is a continuation of that publication, but with more frequent releases - the Bulletin is available free of charge and requires no registration.
Virus Bulletin - December 2006
What is anti-virus software? (comment); Leaps and bounds (analysis); What next? Trojan.Linkoptimizer (analysis); Trojan crimeware - is it worth all the fuss? (feature); Windows XP x64 (comparative review); VB2007 Vienna (call for papers)
Virus Bulletin - November 2006
SoftICE, security and the future (comment); A fortune fox hunter (analysis); I'm OK, you're not OK (opinion); Humour at Symantec's expense (letter); Corrections to Windows 2000 Server comparative (erratum); Montreal in the fall (conference report); F-Secure Internet Security 2007 (product review)
Virus Bulletin - October 2006
DDoS: the rise from obscurity (comment); Chamber of horrors (analysis); AV testing SANS creation (opinion); Scanning embedded objects in Word XML files (feature); Windows 2000 Server (comparative review)
Virus Bulletin - September 2006
Respecting the testing (comment); Gatt got your tongue? (virus analysis); Raising the bar: Rustock and advances in rootkits (rootkit analysis); The world of botnets (feature); War of the words (book review); I spy (book review); Kaspersky Internet Security 6.0 (product review)
Virus Bulletin - August 2006
The great Mac debate (comment); Malicious Yahooligans (virus analysis); Star what? (virus analysis); Dial M for malware (feature); Novell NetWare 6.5 (comparative review)
Virus Bulletin - July 2006
Less is more (comment); Tumours and polips (virus analysis); Malware, the new driver of PC sales (feature); Fixing 'the virus problem'? (opinion)
Virus Bulletin - June 2006
From the bedroom to the bank - IT threats evolve (comment); Math baloney: yet another first (virus analysis); Inside the PE file format (technical feature); EICAR 2006 in a nutshell (conference report); Windows XP (comparative review)
Virus Bulletin - May 2006
Don't bring a knife to a gunfight (comment); Regional threats (feature); Malware Penetration Index: a new virus metric (technical feature); A different look at the rootkit installation process (technical feature); eTrust Internet Security Suite (product review)
Virus Bulletin - April 2006
Problems for AV vendors: some thoughts (comment); A small step for Mac OS X (virus analysis); Not a feeble attempt (virus analysis); Stories from the DRM world: the Settec case (feature); Red Hat Linux 9 (comparative review)
Virus Bulletin - March 2006
View from the cheap seats (comment); Proxies for the underworld: I-Worm.Locksky.AS (virus analysis); IM_a nuisance - W32.Imav.A (virus analysis); How can a web filter add proactive security? (feature); Improving proactive detection of packed malware (feature); Changes to the VB test sets (comparative update); Solving the metamorphic puzzle (technical feature)
Virus Bulletin - February 2006
What threats may come (comment); Not worthy (virus analysis); Inside the Windows Meta File format (technical feature); Learning from Sony: an external perspective (opinion); Signature updates vs BCP (feature); Windows NT 4 Workstation (comparative review)
Virus Bulletin - January 2006
Ally in our defences (comment); Inside the Microsoft script encoder (feature); Cooperative heuristics (feature); What is out there? (feature); AVAR 2005: wired to wireless, hacker to cyber-criminal? (conference report); The real reason for the decline of the macro virus (opinion); VB2006 - Montréal (call for papers); Windows OneCare Live Beta (build 0.8.0794.44) (product review)
Latest articles:
Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.
TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…
Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…
In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…
Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…