Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Turn off your PC

Tomer Honen explains why being mugged at gunpoint could cost you less than being the target of the next multi-stage phishing attack.

Read more  

Regional threats

Kaoru Hayashi examines the increase in attacks that are targeted at specific geographic regions or languages.

Read more  

Problems for AV vendors: some thoughts

'I see drowning in new malware as one of the main issues facing the AV industry today.’ Eugene Kaspersky, Kaspersky Lab.

Read more  

VB Comparative: Red Hat Linux 9 - April 2006

The main competition amongst products this month seemed to be as to which could have the least useful documentation – find out which products redeemed themselves by achieving a VB 100%.

Read more  

Not a feeble attempt

Viktor Johasz details Worm.Feebs.AF.

Read more  

A small step for Mac OS X

Glyn Kennington has the details of OSX/Leap-A.

Read more  

Stories from the DRM world: the Settec case

Months after Sony got into trouble for using rootkit functionality in the DRM protection of audio media, the word 'rootkit' is still hitting the headlines. This time the trouble comes in the form of DVD movies containing DRM software from Settec.…

Read more  

Why is PayPal phishing ... a serious business?

It is no longer unusual to receive a PayPal phishing email, but over recent months the phenomenon has become increasingly serious as the fake emails and websites set up by those behind the scams have become harder to distinguish from the genuine…

Read more  

Proxies for the underworld: I-Worm.Locksky.AS

The Locksky email worm first appeared in October 2005. Its aim is to install proxies on victims' machines, which can then be sold. Ferenc Laszlo Nagy has the details.

Read more  

Solving the metamorphic puzzle

Metamorphic viruses have posed a challenge for the anti-virus industry for quite some time. This article focuses on a number of metamorphic techniques and highlights different methods for detecting them.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.