Virus Bulletin issue archive
The Bulletin is an indispensable source of reference for anyone concerned with the prevention, detection and removal of computer threats, including but not limited to malware and spam.
Between 1989 and 2014, VB published the monthly, subscriber-based Virus Bulletin magazine. The Bulletin is a continuation of that publication, but with more frequent releases - the Bulletin is available free of charge and requires no registration.
Virus Bulletin - December 2008
Public liability insurance for computer intrusion (comment); Anti-unpacker tricks - part one (technical feature); Repercussions of dynamic testing (opinion); Frame4: in the picture (spotlight); VB100 on Windows Vista x64 (comparative review)
Virus Bulletin - November 2008
Co-operation is the only way (comment); XXX racted (malware analysis); Your filters are bypassed: Rustock.C in the kernel (malware analysis); Family matters (opinion) The Ottawa rules (conference report); DriveSentry Desktop 3.1/3.2 & GoAnywhere 1.0.2/2.0 (product review)
Virus Bulletin - October 2008
The cost of online anonymity (comment); Wither the Harumf (malware analysis); The hidden cost of compromise (feature); Broadly speaking: skill diversification in the AV community (opinion) Windows Server 2008 (comparative review)
Virus Bulletin - September 2008
Does the punishment fit the crime? (comment); Prophet and loss (malware analysis); All your MP3s are belong to us (malware analysis); VB2008 call for last-minute papers (call for papers); Il buono, il brutto, il cattivo (book review); Malware teaching considered harmful? (opinion); Lavasoft Ad-Aware 2008 (product review)
Virus Bulletin - August 2008
The secret life of old malware (comment); 'Yet another Rustock analysis...' (rootkit analysis); The case for AV for Linux: Linux/Rst-B (feature); Improving heuristics (feature); VB100 on Windows XP SP3 (comparative review)
Virus Bulletin - July 2008
A commitment to quality and reliability (comment); The road less truvelled: W32/Truvel (virus analysis); New memory persistence threats (feature); Reversing Python modules (feature); Advertising database poisoning (feature); Sunbelt Software VIPRE Antivirus + Antispyware (product review)
Virus Bulletin - June 2008
The good, the bad and the blurring boundaries (comment); Metafile art class (feature); Strike me down, and I shall become more powerful! (feature); System cleaning: getting rid of malware from infected PCs (feature); EICAR 2008, c'était merveilleux! (conference report); VB100: Ubuntu Linux 8.04LTS Server Edition (comparative review)
Virus Bulletin - May 2008
Online banking call to arms (comment); Algorithms for grouping similar samples in malware analysis (feature); Metamorphic authorship recognition using Markov models (feature); Blended malware defence (opinion); eEye Digital Security Blink Professional 4.0 (product review)
Virus Bulletin - April 2008
Political DDoS around the world (comment); Your computer is now stoned (...again!) (malware analysis); Anti-stealth fighters: testing for rootkit detection and removal (feature); Windows Vista Business Edition SP1 (comparative review)
Virus Bulletin - March 2008
Home (page) renovations (comment); Pandex: the botnet that could (feature); Exepacker blacklisting part 3 (feature); Black Hat DC and CCC 24C3 (conference report); AVG Internet Security 8 (product review)
Virus Bulletin - February 2008
Malware vs. anti-malware: (how) can we all survive? (comment); Crimea river (virus analysis); How to disable WFP using physical disk information (virus analysis); Assessment war: Windows services (feature); VB2008 Ottawa (call for papers); Windows Server 2003 (comparative review)
Virus Bulletin - January 2008
A richer, but more dangerous web (comment); Botnet monitoring (feature); Rule-driven malware identification and classification (feature); Inside rogue Flash ads (feature); VB2008 Ottawa (call for papers); Agnitum Outpost Security Suite Pro 2008 (product review)
Latest articles:
Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.
TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…
Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…
In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…
Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…