An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
MATLAB may not be the first platform that comes to mind when talking about viruses, but with its vast collection of mathematical functions it lends itself to all kinds of problem-solving mischief. Peter Ferrie details the MLS/Mifeve virus.
Read moreCollaboration aims to promote the benefits of formal cybersecurity training and certification.
Read moreDamballa reports on stealth techniques used by six malware families to evade detection.
Read moreIn early February, a new security project known as DMARC (Domain-Based Message Authentication, Reporting and Conformance) hit the headlines. The project involves some of the best known companies on the Internet and attempts to reduce email-based…
Read moreDroidDream is a fully fledged mobile bot once a mobile device is rooted, with the ability to install applications of choice, navigate to websites, add bookmarks to the browser, manipulate text and voice messages, and communicate with a remote command…
Read moreMorton Swimmer reports from Europe's premier hacker event.
Read moreMartijn Grooten (Virus Bulletin)
As the migration to IPv6 slowly begins to happen, Martijn Grooten takes a look at the potential security issues that could occur with the switch to IPv6 and encourages the security industry to ready itself for those challenges.
Read moreIt’s not just graphic designers who can do interesting things with the Intel MMX instruction set. Virus writers are finding ways to (ab)use some of the instructions, too. Peter Ferrie has the details of W32/Svar.
Read moreDavid Harley (ESET)
‘Some security commentators suggest inventing answers to [security] questions rather than using real data.' David Harley.
Read moreEven in a mobile world, the principles of malware analysis remain the same. John Foremost takes us through the basic steps in the static analysis of mobile malware.
Read more