An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Click fraud has been one of the biggest concerns for online advertisers for many years, and as researchers invest effort into developing pattern recognition and detection mechanisms to identify the fraudulent patterns, so the attackers tweak and…
Read moreAleksander Czarnowski (AVET Information and Network Security)
‘It concerns me that my daughter’s favourite game requires access to Wi‑Fi, contacts, the operating system, etc.’ Aleksander Czarnowski, AVET.
Read moreWe have seen viruses with binary components, viruses with script components, and viruses with binary components that drop script components. Now comes a virus whose binary component executes its script component directly in memory by using a binary…
Read moreBlackhole has been the major player in the exploit kit market for a while now, but the Sweet Orange and ProPack kits have recently entered the market and are rapidly gaining in popularity. Aditya Sood and colleagues take a look at advancements in the…
Read moreZortob didn't make big headlines when it first appeared a little over a year ago, but a new generation of the malware hitting the lab's honeypots prompted Dong Xie to take a closer look.
Read moreMartin Lee (Symantec)
‘The collection of detailed statistics, their interpretation and analysis, combined with the desire to improve society, resolved many of the problems of the industrial revolution. The same approaches can be used today to end the high-risk work…
Read moreAustralia becomes latest country to sign the Council of Europe’s Convention on Cybercrime.
Read moreEpic fail as convicted hacker enrolls in IT class for inmates.
Read moreIn the first part of this series Aleksander Czarnowski covered the background information needed to understand the principles of ARM shellcoding. In this follow-up article he moves on to dissect some previously crafted shellcode.
Read more