Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Techniques for evading automated analysis

Abhishek Singh looks at some of the techniques that are commonly used by malware to bypass analysis in a virtualized environment.

Read more  

Anti-virus: last rites, or rites of passage?

David Harley (ESET)

While some are claiming that AV is so far past its best before date that it should only be used when given away free, David Harley asks on what basis this judgement has been made, and whether the reality is that anti-virus is simply no longer the…

Read more  

A(C)ES high

Intel introduced a new set of CPUs in 2009 that included hardware support for the Advanced Encryption Standard (AES) in the instruction set. These have not attracted much interest from virus writers - until now. Peter Ferrie describes the W32/Brotinn…

Read more  

Please Help!

Raul Alvarez looks into the execution path of malware that resembles a piece of shellcode inside a help file.

Read more  

Breaking down barriers for cybersecurity: where's the first-mover advantage?

The topic of cybersecurity and international cooperation usually involves difficult discussions about cross border jurisdiction issues, the need for cooperation between very different actors, and privacy. Wout de Natris considers the issues and asks:…

Read more  

Targeted attacks: what's in store?

Kurt Baumgartner (Kaspersky Lab)

‘The general level of insight into network infiltration around the globe is becoming more informed.' Kurt Baumgartner, Kaspersky Lab.

Read more  

VB2014: location, location, location

Details of VB2014 announced.

Read more  

Results of cybersecurity exercise published

Report finds knowledge of procedures and information flows is crucial.

Read more  

Dutch disclosure guidelines

Dutch government attempts to encourage responsible disclosure of vulnerabilities.

Read more  

Shellcoding ARM

With recent studies reporting a dramatic increase in the usage of mobile devices, a decrease in sales of PCs and notebooks, and ‘BYOD’ being the hot trend of the moment, it is no longer possible to ignore non-x86 architectures. Aleksander Czarnowski…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.