Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

F-Secure Internet Security 2007

John Hawes tries out F-Secure's latest release: F-Secure Internet Security 2007.

Read more  

I'm OK, you're not OK

David Harley shares some of his thoughts on public perceptions of the anti-malware industry.

Read more  

Chamber of horrors

W32/Chamb is the first virus to infect compiled HTML (CHM) files parasitically. Peter Ferrie has the details.

Read more  

DDoS: the rise from obscurity

'The cost of a DDoS attack can be substantial – they can last hours, weeks and even months, and are capable of bringing unprotected organizations to a grinding halt.' Danny McPherson, Arbor Networks.

Read more  

AISK – a different approach

Mariusz Kozlowski describes the use of his anti-spam filter which is based on pattern recognition and artificial intelligence techniques.

Read more  

VB Comparative: Windows 2000 Server - October 2006

John Hawes serves up another VB comparative - this month, he puts 26 AV products through their paces on Windows 2000 Server and finds 18 of them worthy of a VB 100%.

Read more  

Scanning embedded objects in Word XML files

Christoph Alme looks at the embedding of arbitrary objects into Word 2003 XML files and shows why finding them and passing them onto the virus scanner is not such a 'walk in the park' as one might expect.

Read more  

AV Testing SANS virus creation

David Harley writes to the director of research at the SANS Institute to express his concerns about Consumer Reports' AV testing methodology.

Read more  

I spy

David Harley reviews Combating Spyware in the Enterprise.

Read more  

The world of botnets

Alan Solomon and Gadi Evron take a look into the world of botnets.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.