Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

In memoriam: Péter Ször 1970-2013

The untimely death of security researcher Péter Ször sent shockwaves across anti-malware community last month. Some of those who knew him best pay tribute to a brilliant mind and a true gentleman.

Read more  

EICAR 2013: Data protection <> data security?

Eddy Willems presents a round up of the 22nd EICAR Conference, held in Hannover last month.

Read more  

Hands in the cookie JAR

Viruses for Java are relatively rare, and parasitic viruses for Java are even rarer. The Java/Handjar virus infects Java applications by placing its virus code inside a JAR file and including a reference to the virus class file. Peter Ferrie has the…

Read more  

Fake KakaoTalk security plug-in

The Android/FakeKakao trojan monitors incoming and outgoing SMS messages, sends SMS spam and gathers sensitive information as well as incorporating anti-debugging and anti-emulator tricks and disabling some security software. Zhe Li and Dong Xie take…

Read more  

Governments seek to boost cyber defences & skills

UK starts recruitment for Cyber Reserve Unit; India plans to increase number of reverse engineering professionals.

Read more  

Finnish government breach

Finnish Ministry of Foreign affairs breached over four-year period.

Read more  

Employee awareness and security budgets still found lacking

Only 17% of respondents in Ernst & Young survey say their company’s information security function fully meets the needs of their organization.

Read more  

Greetz from academe: Monkey vs. Python

Python obfuscation is relatively rare. In the latest of his ‘Greetz from academe’ series, highlighting some of the work going on in academic circles, John Aycock takes a look at a research paper in which the authors reverse engineered a 'hardened'…

Read more  

Neurevt bot analysis

Neurevt is a relatively new HTTP bot that already has a lot of functionalities along with an extendable and flexible infrastructure. Zhongchun Huo takes a detailed look at its infrastructure, communication protocol and encryption scheme.

Read more  

Another tussle with Tussie

When one has a nice idea – such as a tricky method for encoding data – it is common to take that idea and improve on it. It is rare to see someone take such an idea and degenerate it, but that’s exactly what we see in W32/Tussie.B. Peter Ferrie…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.