An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Web server malware may be used to establish a foothold for the general exploitation of the infected server, or to compromise the server for specific purposes ranging from DDoS to spamming. Some more advanced uses include the construction of botnet…
Read moreJohn Hawes takes an in-depth look at the latest version of Sophos's full cross-platform, multi-component suite, Sophos Enterprise Security.
Read more'The malware research community [is] the authority with regard to assisting newcomers in the adoption of safe practices.' Ryan Hicks, Earthlink.
Read moreDavid Harley looks back over 17 years in the AV industry and describes his life before AV.
Read moreThe 15th Text Retrieval Conference (TREC 2006) took place in November 2006. For the second time, TREC included a spam track, whose purpose was to create realistic standardized benchmarks to measure spam filter effectiveness in a laboratory setting.…
Read moreOSX/Macarena is the first parasitic infector of Mach-O files. Peter Ferrie has all the details.
Read moreW32/Nubys-A looked, at first glance, like a trojan downloader. However, most samples contained not one, but several legitimate PE files in the appended data. Samples with one appended executable would have suggested a prepending virus, but why…
Read moreJust as it seemed that mass-mailers were dying away, a new breed emerged: Stration (aka Warezov, or Strat). Ivan Macalintal investigates the motives of the Stration gang.
Read morePeter Ferrie describes a virus that comes in both 32-bit and 64-bit versions and which uses an entrypoint obscuring technique that no one has used before: W32/Bounds and W64/Bounds!AMD64.
Read more'As security companies we must provide multiple layers of defence to protect our users properly.' Robert Sandilands, Authentium.
Read more