Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Phighting cybercrime together

Martijn Grooten (Virus Bulletin)

Martijn Grooten presents a round-up of the first annual APWG eCrime Researchers Sync-Up.

Read more  

Hiding in plain sight

Raul Alvarez takes a look at a lesser known stealth technology - the alternate data stream.

Read more  

No mail for Alisons, Alberts, Algernons...

McAfee glitch prevents addresses starting with the letter 'A' from receiving mail.

Read more  

Old breach rears its head

Two years on, stolen card details from Heartland breach still being used.

Read more  

Sender authentication – practical implementations

Terry Zink (Microsoft)

Previously Terry Zink has looked at how SMTP works, email headers, SPF, SenderID and DKIM. But what about some practical realities? How well do these technologies work in real life? Can we use them to solve actual problems? Here he describes a real…

Read more  

Canada’s new anti-spam law

With the passage of bill C-28 in December, Canada became the last of the G-8 countries to make spamming illegal. John Levine, who was involved in the development of the bill, outlines the new law and its implications.

Read more  

Flibi night

Drawing on some parallels with molecular biology, the W32/Flibi virus attempts to evolve new behaviours in order to evade detection. Peter Ferrie has the details.

Read more  

Defeating mTANs for profit – part one

Kyle Yang (Fortinet)
Axelle Apvrille (Fortinet)

Until recently, malware on mobile devices had not been used for organized crime involving large amounts of money. This changed when the infamous Zeus gang, known for targeting online banking, started to show a clear interest in infecting mobile…

Read more  

A nice drop of Cocoa

Mac security in general attracts a lot of attention these days, and with this in mind David Harley reviews a book that aims to help Mac developers build security into their apps from the beginning of the development process.

Read more  

What next for rogue AVs?

Dmitry Bestuzhev (Kaspersky Lab)

'The issue facing even the most experienced users is how to distinguish between fake and legitimate antivirus solutions before installing them on a computer.' Dmitry Bestuzhev, Kaspersky Lab

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.