An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Raul Alvarez takes a close look at a recently discovered piece of malware that infects documents and executable files at the same time.
Read moreW32/Frilly decodes itself using a subtle side effect of multiple instructions – the state of the CPU flags. Peter Ferrie has all the details.
Read moreHaving enjoyed exponential growth over the last year, social media site Pinterest has also become a popular target amongst scammers for making money quickly and easily through various scams. Hardik Shah describes some of them.
Read moreNeo Tan (Fortinet)
MIB banking trojan URLZone dates back to 2009, and unlike other botnets it still uses a centralized communication system. Although less flexible than other P2P botnets, its refined method of injection, old-fashioned centralized topology and a…
Read more‘The vendor has no choice but to prioritize resources towards ... keep[ing] up with existing malware families.' Chad Loeven, Silicium Security.
Read moreWout de Natris looks at the state of international cooperation on cybercrime and considers the need for a global treaty on online threats.
Read moreSecurity firm reports an almost 400% increase in targeted attacks against companies in the last year.
Read moreRussian company fined by UK regulator for distributing apps containing premium rate dialler.
Read moreIn the first part of this tutorial series Aleksander Czarnowski described some fundamental differences between the 32- and 64-bit Windows PE+ file format and looked at using the Bochs IDA plug-in to find the original entry point of a file. In part…
Read moreThere are multiple ways to hide the decoder, such as by forcing Windows to apply a relocation delta, or by using obscure instruction side effects. Now, W32/Tussie shows us a way to hide the encoded data. Peter Ferrie has the details.
Read more