Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Chemical industry targeted

Martijn Grooten (Virus Bulletin)

Symantec reports of targeted attack on companies in the chemical industry.

Read more  

Investigating the abuse of search engines to promote illicit online pharmacies

Unauthorized online pharmacies that sell prescription drugs without requiring a prescription have been a fixture of the web for many years. By gathering the top web search results for 218 drug-related Internet queries daily over nine months, Tyler…

Read more  

Viva Barcelona!

Helen Martin reports on a sunny week in Spain at the 21st Virus Bulletin International Conference.

Read more  

Figures show importance of patching

Study finds that 99.8% of malware infections caused by commercial exploit kits could be avoided if just six software packages are kept up to date.

Read more  

Drop in vulnerability disclosures

IBM reports decrease in vulnerability disclosures and drop in web application vulnerabilities, but flaws affecting mobile devices are on the rise.

Read more  

Okay, so you are a Win32 emulator…

There has already been extensive research into the plethora of tricks used by contemporary malware and executable protectors with the purpose of breaking debuggers and emulators. Unfortunately malware authors are aware of such research efforts and…

Read more  

Asynchronous Harakiri++

The generic retro-malware features of ZeroAccess, combined with its advanced rootkit features, makes it one of the most difficult rootkits to deal with, while newer variants of the malware also support 64-bit Windows systems. Peter Ször and Rachit…

Read more  

Why there’s no one test to rule them all

‘Because every product has strengths and weaknesses, having a variety of different tests is essential.’ Lysa Myers, West Coast Labs

Read more  

Hard disk woes

It is uncommon these days to find malware whose sole purpose is to cause damage, but W32.VRBAT does just that (and only that) - using ATA disk security to render hard disks useless. Jorge Lodos and his colleagues have the details.

Read more  

A new BIOS rootkit spreads in China

The BIOS rootkit is the most complex type of rootkit researchers have come across so far. It is hardware dependent, and an attacker must have extensive knowledge of the computer – including software and hardware – in order to create one. Until now…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.