Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Android security perceptions challenged

Google presents data to suggest Android devices are a lot less susceptible to malware than commonly believed.

Read more  

In search of a secure operating system

Richard Ford (Florida Institute of Technology)

Over the last decade or so, security has steadily become more of an issue for OS vendors due to the changing threat environment. Mark Fioravanti and Richard Ford look to the past in search of a secure operating system.

Read more  

Doin’ the eagle rock... again!

Peter Ferrie revisits W32/Lerock and its so-called ‘virtual code’ - which, despite some updates and tweaks still lends itself to simple detection by anti virus software.

Read more  

Same Zeus, different features

We have seen hundreds, if not thousands, of variations of Zeus in the wild. The main goal of the malware does not vary, yet different functionalities have been added over time. Raul Alvarez takes a detailed look at some of those functionalities and…

Read more  

Nedsym spamming

Despite recent declines, spam still accounts for more than 70% of all email sent. Why does this happen? He Xu exposes the tip of the iceberg by analysing a recent spambot which is driven by the Andromeda botnet: Win32/Nedsym.G.

Read more  

Fans like Pro, too

All kinds of amazing things can be done in JavaScript, especially when the size is constrained. However, when you take size-optimization techniques, combine them with structure and variable-name obfuscations and cram in every malicious action that…

Read more  

Styx exploit pack: insidious design analysis

Aditya Sood and colleagues discuss the details and design of the Styx exploit pack.

Read more  

Is cybersecurity by fiat DOA?

Stephen Cobb (ESET)

‘Government-sponsored efforts to improve cybersecurity are underway ... but will they accomplish their goals?' Stephen Cobb, ESET.

Read more  

Greetz from academe: On motivation

In the latest of his 'Greetz from Academe' series, highlighting some of the work going on in academic circles, John Aycock looks at academic focus on hackers.

Read more  

UK gets Cyber Academy

UK's information security skills receive a boost.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.