Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Web server botnets and hosting farms as attack platforms

Web server malware may be used to establish a foothold for the general exploitation of the infected server, or to compromise the server for specific purposes ranging from DDoS to spamming. Some more advanced uses include the construction of botnet…

Read more  

Do the macarena

OSX/Macarena is the first parasitic infector of Mach-O files. Peter Ferrie has all the details.

Read more  

The great prepender: W32/Nubys-A

W32/Nubys-A looked, at first glance, like a trojan downloader. However, most samples contained not one, but several legitimate PE files in the appended data. Samples with one appended executable would have suggested a prepending virus, but why…

Read more  

The real motive behind Stration

Just as it seemed that mass-mailers were dying away, a new breed emerged: Stration (aka Warezov, or Strat). Ivan Macalintal investigates the motives of the Stration gang.

Read more  

Sophos Enterprise Security

John Hawes takes an in-depth look at the latest version of Sophos's full cross-platform, multi-component suite, Sophos Enterprise Security.

Read more  

Déjà vu all over again

'The malware research community [is] the authority with regard to assisting newcomers in the adoption of safe practices.' Ryan Hicks, Earthlink.

Read more  

From immunology to heuristics

David Harley looks back over 17 years in the AV industry and describes his life before AV.

Read more  

The TREC 2006 Spam Filter Evaluation Track

The 15th Text Retrieval Conference (TREC 2006) took place in November 2006. For the second time, TREC included a spam track, whose purpose was to create realistic standardized benchmarks to measure spam filter effectiveness in a laboratory setting.…

Read more  

Trojan crimeware - is it worth all the fuss?

Jeffrey Aboud investigates the buzz surrounding trojan crimeware.

Read more  

What next? Trojan.Linkoptimizer

The Linkoptimizer trojan raised alarms in the AV industry signalling that there are other ingenious ways besides advanced rootkits to make the lives of both users and security providers difficult. Mircea Ciubotariu has the full details of…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.