An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
A diverse range of products was submitted for this month’s 64-bit comparative review. John Hawes has the details of how they all fared.
Read moreJeffrey Aboud investigates the buzz surrounding trojan crimeware.
Read moreThe Linkoptimizer trojan raised alarms in the AV industry signalling that there are other ingenious ways besides advanced rootkits to make the lives of both users and security providers difficult. Mircea Ciubotariu has the full details of…
Read moreIn last month's VB John Graham-Cumming reported on the rise and rise of image spam. Here, Catalin Cosoi describes a technique for dealing with this form of spam.
Read more'My feeling is that we are unlikely to see an open source replacement for SoftICE any time soon.' Aleksander Czarnowski, Avet.
Read moreUpdates and corrections to last month's Windows 2000 Server comparative review.
Read moreKaoru Hayashi has the details of Infostealer.Snifula - a trojan that spies on Firefox.
Read more'I believe the humour used in my [VB2006] presentation at the expense of Symantec was justified, but it was unfair to fail to acknowledge the dedication, intellect and ingenuity of the many people Symantec employs.' Randy Abrams, ESET.
Read moreThe VB conference drew to a close in Montréal last month after three packed days of presentations, panel discussions, meetings, birds of a feather sessions and lively debate, with a fair amount of eating, drinking, music and acrobatics thrown in for…
Read moreJohn Graham-Cumming charts the rise of image-based spam.
Read more