Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Greetz from academe: ethical quandaries

In the latest of his ‘Greetz from Academe’ series, highlighting some of the work going on in academic circles, John Aycock looks at the thorny issue of ethics in academic security research.

Read more  

No more Linux for Avira

Vendor shelves Linux products to focus on Windows and Mac.

Read more  

Academic Centres of Excellence

UK government recognizes excellence in cybersecurity research.

Read more  

Alipime makes a comeback with Fujacks.CB

The Alipime trojan was very active in China in 2011, before vanishing for a period of time, but recently a new Alipime threat has been discovered, being shipped with the W32.Fujacks.CB worm. Ke Zhang takes a look at the trojan that monitors web…

Read more  

Apktool set-up for Android lab

With a wide variety of e-crime-related threats being discovered every day for Android, the analysis of suspect Android packages is becoming an ever more important task for security researchers. John Foremost introduces Apktool, a very powerful…

Read more  

Unlocking LockScreen

Kyle Yang (Fortinet)

During their analysis of LockScreen, Walter Kong and Kyle Yang found that this piece of malware uses more anti-debug tricks than a lot of other the malware. Here, they will detail the anti‑debug tricks before shedding light on the communication…

Read more  

Not drowning, WAV-ing

The W32/Mammer virus attempts to record ambient sound as a source of true random numbers. Peter Ferrie explains how it does so – and why the implementation is flawed.

Read more  

Who's bad? NgrBot or SkyBot?

Christy Chung (Fortinet)
Neo Tan (Fortinet)
Kyle Yang (Fortinet)

The SkyBot and NgrBot worms have very similar methods of spreading. However, the two are very distinct in terms of the channels they use for distribution. Neo Tan and colleagues take a detailed look at the two IM worms – from their hijack methods and…

Read more  

On the cusp of evolutionary change

‘A series of new factors ... are placing unprecedented evolutionary pressure on the virus/anti virus/operating system triad.' Catalin Cosoi, Bitdefender.

Read more  

Bitcoin mining: Investing in the future of the underground market

Micky Pun (Fortinet)

The exchange rate of the digital currency Bitcoin (BTC) passed the US$200/BTC1 mark earlier this year – a fact that has not escaped the attention of cybercriminals. Micky Pun takes a look at one of the latest Bitcoin-mining malware families.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.