An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
All kinds of amazing things can be done in JavaScript, especially when the size is constrained. However, when you take size-optimization techniques, combine them with structure and variable-name obfuscations and cram in every malicious action that…
Read moreAditya Sood and colleagues discuss the details and design of the Styx exploit pack.
Read moreNeo Tan (Fortinet)
A new version of the Andromeda bot was recently spotted in the wild with strengthened self-defence mechanisms and novel methods for keeping its process hidden and running persistently. Moreover, its communication data structure and encryption scheme…
Read moreThe Android threat BadNews has been spreading through both Google Play and other app download sites, affecting 30 or more apps and with an estimated two to nine million devices having downloaded the affected apps. John Foremost looks at the ongoing…
Read moreKyle Yang (Fortinet)
ZeroAccess has evolved steadily in recent years, taking control of millions of compromised computers around the world. Chao Chen and Kyle Yang take a look at three of the ways in which it generates income: browser redirection, click fraud and Bitcoin…
Read moreCan the principles of logic be applied to the daily task of file analysis? Mircea Ciubotariu gives it a go.
Read more‘I had a sneaking regard for the graphical payloads some of the virus writers were building into their creations.' Graham Cluley.
Read moreIn the latest of his 'Greetz from Academe' series, highlighting some of the work going on in academic circles, John Aycock looks at malware detection using NX responses.
Read moreUS mulls idea of offering financial benefits for businesses who super charge their digital defences.
Read moreMPs feel Britain is too complacent about the war against Internet crime.
Read more