Virus Bulletin issue archive
The Bulletin is an indispensable source of reference for anyone concerned with the prevention, detection and removal of computer threats, including but not limited to malware and spam.
Between 1989 and 2014, VB published the monthly, subscriber-based Virus Bulletin magazine. The Bulletin is a continuation of that publication, but with more frequent releases - the Bulletin is available free of charge and requires no registration.
Virus Bulletin - December 2010
Commercial 'malware' production (comment); Android SMS trojans: new platform, 'old' tricks (malware analysis); Case study: the Ibank trojan (malware analysis); What's the deal with sender authentication? Part 5 (feature); VB 'securing your organization in the age of cybercrime' Seminar (conference report); VB2011 Barcelona (call for papers); VBSpam comparative review December 2010 (comparative review); VB100 comparative review on Windows 7 Professional (comparative review)
Virus Bulletin - November 2010
Worldwide anti-botnet initiatives (comment); Vancouver expedition (conference report); Deelaed learning (malware analysis); Exploit identification (tutorial); Anti-unpacker tricks - part fourteen (technical feature); Letters to the editor (letters);
Virus Bulletin - October 2010
Changing times (comment); It's just spam, it can't hurt, right? (malware analysis); Rooting about in TDSS (malware analysis); Anti-unpacker tricks - part thirteen (technical feature); On the relevance of spam feeds (feature); Things to come (review feature); VB100 comparative review on Windows Server 2003 (comparative review)
Virus Bulletin - September 2010
Breaking the habit (comment); The missing LNK (malware analysis); Injection as a way of life (malware analysis); Chim Chymine: a lucky sweep? (malware analysis); Anti-unpacker tricks - part eleven (technical feature); What's the deal with sender authentication? Part 4 (feature); VBSpam comparative review September 2010 (comparative review)
Virus Bulletin - August 2010
Apple pie order? (comment); Anti-unpacker tricks - part eleven (technical feature); Advanced exploit framework lab set-up (tutorial) HTML structure-based proactive phishing detection (feature); What's the deal with sender authentication? Part 3 (feature); VB100 - Windows Vista Business Edition Service Pack 2 (comparative review)
Virus Bulletin - July 2010
The dawn of the 'rogue AV testers' (comment); Hacking koobface (malware analysis); Anti-unpacker tricks - part ten (technical feature); The Indian subcontinent: part II (feature) What's the deal with sender authentication? Part 2 (feature); PC Tools Internet Security 2010 (product review); VBSpam comparative review (comparative review)
Virus Bulletin - June 2010
PWN2KILL, EICAR and AV: scientific and pragmatic research (comment); Anti-unpacker tricks - part nine (technical feature); MBR rootkit: beginnings (malware analysis); What's the deal with sender authentication? Part 1 (feature); EICAR 2010: rainy days in Paris (conference report); VB100 - Windows Server 2008 R2 (comparative review)
Virus Bulletin - May 2010
The best of... (comment); Anti-unpacker tricks - part eight (technical feature); TDSS infections - quarterly report (feature); Adapting to TxF (feature); Exploit kit explosion - part two: vectors of attack (tutorial); VBSpam comparative review (comparative review)
Virus Bulletin - April 2010
Are takedowns an exercise in futility? (comment); Evasions in Intrusion Prevention/Detection Systems (feature); Botnets, politics and hacktivism - an interesting partnership (feature); 'Signatures are dead.' 'Really? And what about pattern matching?' (feature); Exploit kit explosion - part one (tutorial); VB100 comparative review on Windows XP (comparative review)
Virus Bulletin - March 2010
Why flash web pages are like collateralized debt obligations (comment); Doin' the eagle rock (malware analysis); BackDoor.Tdss.565 and its modifications (aka TDL3) (malware analysis); The 26C3 Congress of the Chaos Computer Club (conference report); Memory analysis - examples (tutorial); CA Internet Security Suite Plus 2010 (product review); VBSpam comparative review (comparative review)
Virus Bulletin - February 2010
SSL certificate warnings - nuisance or value? (comment); Cut the Cutwail (malware analysis); Data tainting for malware analysis - part three (feature); Introduction to advanced memory analysis (tutorial); Novell SUSE Linux Enterprise Server 11 (comparative review)
Virus Bulletin - January 2010
The web of darkness (comment); It's a bird, it's a plane, it's Fooperman (malware analysis); Social science meets computer science (book review); AMTSOlutely fabulous (spotlight); The top ten spam, malware and e-security stories of 2009 (feature); Alwil avast! 5 (product review); VBSpam comparative review (comparative review)
Latest articles:
Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.
TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…
Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…
In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…
Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…