Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Rogue Code

Paul Baccas reviews the third novel in Mark Russinovich's Jeff Aiken series.

Read more  

Sinowal banking trojan

With a modular architecture and sophisticated functionality, Sinowal is a multi-component banking trojan targeted at various web browsers which threatens users of online banking systems around the globe. Chao Chen delves into the inner workings of…

Read more  

Wapomi

Wapomi is a virus with trojan-like behaviour. It was originally detected as long as a couple of years ago, yet it is still very active in the wild. Raul Alvarez takes a look at some of the malware’s functionalities in an attempt to shed light on its…

Read more  

Share and share alike

‘We hope soon to be able to provide a better reflection of the growing diversity of the security solution market.’ John Hawes

Read more  

Fuzzing everything in 2014 for 0-day vulnerability disclosure

As indicated by the considerable payouts we see being made for valid security vulnerabilities, finding valuable 0-days is not an easy task. Fuzzing – the most common approach to bug hunting – is technologically and scientifically well developed and…

Read more  

Greetz from academe: Will research for food

In the last of his ‘Greetz from academe’ series, highlighting some of the work going on in academic circles, John Aycock looks at change in the form of Android update flaws, as well as spare change under the guise of academic funding.

Read more  

Malware adds invisible skimmers to Macanese ATMs

Martijn Grooten (Virus Bulletin)

Malware was capable of reading PINs and data of the cards inserted into ATMs.

Read more  

A grown-up industry

Martijn Grooten (Virus Bulletin)

‘We plan to increase our scope further and look even more at other areas of IT security.’ Martijn Grooten

Read more  

On cyber investigations. Case study: a money transfer system robbery

The current information landscape is pretty lacking when it comes to information about cyber investigations. Most reports on cybercrime cover only the results of an investigation, omitting the process, the investigative techniques and the specific…

Read more  

Greetz from academe: film at eleven

In the latest of his ‘Greetz from Academe’ series, highlighting some of the work going on in academic circles, John Aycock looks at PREC: practical root exploit containment for Android devices.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.