Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Obama pledges security education from boardroom to classroom

President Obama announces multi-billion-dollar cybersecurity effort.

Read more  

Beware of searching for lyrics

McAfee research identifies riskiest Internet search terms.

Read more  

Phisher gets 8.5 years

Phisher sentenced to eight and a half years in prison for phishing scams that netted him approximately $700,000.

Read more  

Where is Waledac?

Terry Zink (Microsoft)

Win32/Waledac is a trojan that is used to send spam. It also has the ability to download and execute arbitrary files, harvest email addresses from the local machine, perform denial of service attacks, proxy network traffic and sniff passwords. Scott…

Read more  

Trend makes new acquisition

Trend snaps up Third Brigade.

Read more  

Archive material

Six AV companies suffer archive processing vulnerabilities.

Read more  

Mail authentication with Domain Keys Identified Mail – part two

John Levine discusses the ways in which a DKIM-authenticated domain fits into a mail-handling system, and looks at related technologies that build on DKIM to help recognize good mail senders and deter phishing.

Read more  

Anti-spam comparative review May 2009

Martijn Grooten (Virus Bulletin)

After months of consideration, internal and external discussion, trials and retrials, the results of VB's first live anti-spam comparative review are in. Martijn Grooten has the details.

Read more  

Indictment for university spammers

Spammers whose campaign targeted over 2,000 educational institutions face up to ten years imprisonment.

Read more  

Case study: the TDSS rootkit

The TDSS modular downloader is known for its ability to bypass active protection, for its outstanding persistence and its rootkit functions. Alisa Shevchenko presents a detailed case study.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.