An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
As is well documented, the Internet offers many opportunities for viral spread. However, it also provides mechanisms for anti-virus spread – in 1996, VB took a brief look at the world of downloadable anti-virus software.
Read moreDridex is a descendent of the Cridex malware. Its initial spread occurred in late 2014 via spam and the malware is still active in the wild today. Meng Su describes its working mechanism and how it gathers information and communicates with the C&C…
Read moreIn June 2004 the first worm arrived that spreads from mobile phone to mobile phone: SymbOS/Cabir. Fortunately, due to the fact that the worm used a specific user-interface component, it was restricted to Series 60-based mobile phones. Peter Ferrie…
Read moreVB's technical editor Jakub Kaminski considers the issue of anti-virus updates, writing 'With the number of viruses still growing (in the case of macro viruses, at an exorbitant speed), giving users access to daily updates is becoming a necessity for…
Read more'While Sophos issued 226 security patches for a single anti-virus program in 2002, Microsoft issued only 72 updates that same year for all of its products combined. Where will it all end?' Rob Rosenberger considers the ever increasing number and…
Read moreDuring a long-term investigation, Brian Wallace discovered two forensic artefacts - both GUIDs - which can be used to determine whether multiple malware samples are from the same Visual Studio project, effectively identifying the family, and to…
Read moreIn the wake of KAOS4 having been released on the Internet, VB reviews some of the risks associated with Internet access.
Read moreThe KAOS4 virus gained notoriety through its posting to the Internet newsgroup alt.binaries.pictures.erotica. Although, as a result of this method of distribution, KAOS4 became widespread, it was actually a relatively simple, non-resident COM and EXE…
Read moreBeta BEP appears to be the latest exploit kit in development. After finding their way into a Beta BEP C&C panel, Aditya Sood and Rohit Bansal were able to gather intelligence about the structure and working of the exploit pack. Here they share their…
Read moreMelissa caused havoc across the globe and hit the news headlines. Ian Whalley's full analysis cuts through the hype and reveals a rather ordinary Class-style infector.
Read more