Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Russian state award for Kaspersky

Eugene Kaspersky honored with highest Russian state award.

Read more  

Trend makes new acquisition

Trend snaps up Third Brigade.

Read more  

Archive material

Six AV companies suffer archive processing vulnerabilities.

Read more  

Mail authentication with Domain Keys Identified Mail – part two

John Levine discusses the ways in which a DKIM-authenticated domain fits into a mail-handling system, and looks at related technologies that build on DKIM to help recognize good mail senders and deter phishing.

Read more  

The new iBotnet

Mario Ballano Barcena and Alfredo Pesoli take a detailed look at what appears to be the first real attempt to create a Mac botnet.

Read more  

Ghostly goings on

Researchers uncover significant cyber espionage network.

Read more  

Internet fraud complaints rise

Internet fraud complaints registered in 2008 rise by 33%.

Read more  

Your PC is infected

Rogue anti-malware applications have been around for several years, conning and causing confusion among users as well as posing problems for anti‑malware vendors. Gabor Szappanos takes a look at a piece of anti‑virus scamware.

Read more  

Anti-unpacker tricks – part five

New anti-unpacking tricks continue to be developed as the older ones are constantly being defeated. In this series of articles Peter Ferrie describes some tricks that might become common in the future, along with some countermeasures. This month's…

Read more  

Mail authentication with Domain Keys Identified Mail – part one

Message authentication is a promising technique that can be used to help separate wanted email from unwanted email, and Domain Keys Identified Mail (DKIM) is an authentication technique that seems likely to gain wide acceptance. John Levine looks at…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.