Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Anti-unpacker tricks – part eleven

Last year, a series of articles described some tricks that might become common in the future, along with some countermeasures. Now, the series continues with a look at tricks that are specific to debuggers and emulators.

Read more  

Apple pie order?

David Harley (ESET)

‘Over 40% [of computer users] think [that Macs are] only “somewhat” vulnerable.’ David Harley, ESET

Read more  

VB100 – Windows Vista Business Edition Service Pack 2

With another epic haul of 54 products to test this month, the VB test team could have done without the bad behaviour of a number of products: terrible product design, lack of accountability for activities, blatant false alarms in major software,…

Read more  

VB Seminar

VB unveils one-day seminar in central London, November 2010.

Read more  

All change

Yet another flurry of security acquisitions.

Read more  

HTML structure-based proactive phishing detection

Marius Tibeica describes a solution for protection at browser level by providing an automated method of detecting phishing based on the tag structure of the HTML.

Read more  

What’s the deal with sender authentication? Part 3

Terry Zink (Microsoft)

Sender authentication is a hot topic in the world of email. It has a number of uses and a number of suggested uses. Which ones work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to…

Read more  

Cybercrime case studies used to educate businesses

Autralian anti-money laundering and counter terrorism financing regulator uses case studies to educate businesses about potential risks.

Read more  

What’s the deal with sender authentication? Part 2

Terry Zink (Microsoft)

Sender authentication is a hot topic in the world of email. It has a number of uses and a number of suggested uses. Which ones work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to…

Read more  

The Indian subcontinent: part II

In 1997, Virus Bulletin published an overview of virus activity in the Indian subcontinent. The piece ended with a series of predictions. Andrew Lee now picks up where that article left off and examines where the predictions were borne out, and where…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.