An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Two years after its emergence the Beagle family is still one of the most pervasive families of Internet worms. John Canavan takes a close look at one variant that has made the surprising switch from email to ICQ as its major infection vector.
Read moreThe Locksky email worm first appeared in October 2005. Its aim is to install proxies on victims' machines, which can then be sold. Ferenc Laszlo Nagy has the details.
Read moreMetamorphic viruses have posed a challenge for the anti-virus industry for quite some time. This article focuses on a number of metamorphic techniques and highlights different methods for detecting them.
Read moreDynamic translation is a technique that can be used instead of emulation for decrypting complex malware. Adrian Stepan describes how the technique can also be used to perform generic unpacking.
Read moreVB's product reviewer Matt Ham describes some changes to the test sets used for VB's comparative reviews.
Read moreSteen Pedersen explains how the perimeter defence layer can be enhanced with the use of a web filter.
Read moreMatt Ham fully expected a bumper harvest of VB 100% awards this month, simply due to the familiarity of the Windows NT platform to the developers.
Read moreDan Kaminsky takes a long hard look at the reaction (or lack thereof) of the AV industry to the Sony rootkit incident and assesses the consequences.
Read moreA common criticism of statistical spam filters (such as SpamBayes, DSPAM and POPFile) is that they can be 'poisoned' by inserting random words into spam messages. John Graham-Cumming looks at the evidence and attempts to answer the question: does…
Read more