An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
‘The industry seems to be surprised when old attacks are repurposed on new systems.’ Tim Armstrong, Kaspersky Lab
Read morePhishing is a global problem, but there are some geographic variances. Sebastien Goutal presents a study of the phishing attacks typically seen in France.
Read moreBy packing their malicious executables, malware authors can be sure that when they are opened in a disassembler they will not show the correct sequence of instructions, thus making malware analysis a more lengthy and difficult process. Abhishek Singh…
Read moreSurvey shows rise in salary and overall job satisfaction for IT security workers.
Read moreUK intelligence agency recognizes eight centres of excellence in cyber security research.
Read moreAditya Sood and Richard Enbody analyse the details of the Google E-Card phishing campaign and its accompanying malicious binary to understand the propagation and distribution of the malware.
Read moreThere are already at least two known 32-bit and 64-bit cross-infectors for Windows, but W32/W64.Amfibee is the first 32/64-bit cross-infector for Windows that is almost entirely a single block of code. Peter Ferrie explains more.
Read moreIn early February, a new security project known as DMARC (Domain-Based Message Authentication, Reporting and Conformance) hit the headlines. The project involves some of the best known companies on the Internet and attempts to reduce email-based…
Read moreDroidDream is a fully fledged mobile bot once a mobile device is rooted, with the ability to install applications of choice, navigate to websites, add bookmarks to the browser, manipulate text and voice messages, and communicate with a remote command…
Read moreThe Dutch National Cyber Security Centre (NCSC) was officially opened in January. Wout de Natris looks at how the Dutch government aims to achieve a safe, open and stable information society, with a focus on public-private cooperation.
Read more