Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

A deeper look into the ZeroAccess clickbot

Click fraud has been one of the biggest concerns for online advertisers for many years, and as researchers invest effort into developing pattern recognition and detection mechanisms to identify the fraudulent patterns, so the attackers tweak and…

Read more  

Java security in the era of BYOD

Aleksander Czarnowski (AVET Information and Network Security)

‘It concerns me that my daughter’s favourite game requires access to Wi‑Fi, contacts, the operating system, etc.’ Aleksander Czarnowski, AVET.

Read more  

It’s mental static!

We have seen viruses with binary components, viruses with script components, and viruses with binary components that drop script components. Now comes a virus whose binary component executes its script component directly in memory by using a binary…

Read more  

What are browser exploit kits up to? A look into Sweet Orange and ProPack

Blackhole has been the major player in the exploit kit market for a while now, but the Sweet Orange and ProPack kits have recently entered the market and are rapidly gaining in popularity. Aditya Sood and colleagues take a look at advancements in the…

Read more  

The evolution of Zortob

Zortob didn't make big headlines when it first appeared a little over a year ago, but a new generation of the malware hitting the lab's honeypots prompted Dong Xie to take a closer look.

Read more  

Yesterday’s solutions to today’s problems

Martin Lee (Symantec)

‘The collection of detailed statistics, their interpretation and analysis, combined with the desire to improve society, resolved many of the problems of the industrial revolution. The same approaches can be used today to end the high-risk work…

Read more  

Australia signs cybercrime treaty

Australia becomes latest country to sign the Council of Europe’s Convention on Cybercrime.

Read more  

Cybersecurity centre for Arab region launched

Oman hosts region's cybersecurity hub.

Read more  

Convicted cybercriminal hacks prison's computer systems

Epic fail as convicted hacker enrolls in IT class for inmates.

Read more  

Shellcoding ARM: part 2

In the first part of this series Aleksander Czarnowski covered the background information needed to understand the principles of ARM shellcoding. In this follow-up article he moves on to dissect some previously crafted shellcode.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.