Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Letter to the editor: The strange case of Julie Amero

'As things currently stand, anyone who has pornographic images appearing on their screen as a result of malware on their PC, or being trapped in a continuous pop-up loop, is at risk of conviction if there are minors in the vicinity.' Alex Shipp,…

Read more  

AEC TrustPort Workstation

John Hawes takes an indepth look at AEC's TrustPort Workstation.

Read more  

Darknet monitoring

Jose Nazario (Arbor Networks)

'Monitoring darknet traffic yields great visibility into what threats are present.’ Jose Nazario, Arbor Networks.

Read more  

Hidan and dangerous

The latest edition to the W32/Chiton family is a malicious plug-in for one of the most popular tools of the anti-malware trade: the IDA disassembler and debugger. Peter Ferrie provides the details.

Read more  

Peerbot: catch me if you can

In early 2007, Trojan.Peacomm (a.k.a. the ‘Storm trojan’) demonstrated that legitimate P2P protocols can be used effectively to coordinate virus networks. Elia Florio and Mircea Ciubotariu explain how.

Read more  

OSBF-Lua

One of the top performers in the TREC 2006 spam filter evaluation was OSBF-Lua. Here, its creator Fidelis Assis describes the technology behind it.

Read more  

Cain and Abul

As the decline in file-infecting viruses continues, it is perhaps fitting that the newest virus for the 64-bit platform, W64/Abul, is less advanced than the one that came before it. Despite this, though, Abul implements some new features that make it…

Read more  

The malware epidemic

'I still believe that education is one of the best defences against any problem.' Eric Kedrosky, Nortel.

Read more  

VB comparative review: Microsoft Windows Vista Business Edition (32-bit)

John Hawes has a busy month with VB's first test of AV products on the long-awaited Microsoft Vista. Find out which products really are ready for Vista.

Read more  

Defeating IRC bots on the internal network

Fuelled by financial incentives and readily available source code, malware authors pursue aggressively the development of newer bot modules and the exploitation of code into these bots. Vinoo Thomas and Nitin Jyoti describe how an IRC honeypot can be…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.