Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Erratum: VBSpam comparative July 2011

Setting the record straight.

Read more  

Phisher gets 12 years+ in jail

Phisher gets his comeuppance after stealing information from more than 38,000 victims.

Read more  

Frankie say relax

The idea of a virus carrying (or calculating) a relocation table allows virus writers to use a high-level language and high-level APIs without having to perform tricks with position dependence. Peter Ferrie details two such viruses, Linux/Relax.A and…

Read more  

Relock-based vulnerability in Windows 7

Through analysis of an old piece of malware, researchers at the University of Verona have found unexpected vulnerabilities in Windows 7 and have demonstrated that with some slight tweaks, W32/Relock will run smoothly on the latest OS.

Read more  

SpyEye bot – aggressive exploitation tactics

As a follow-up to their article on the SpyEye malware infection framework, Aditya Sood and colleagues discuss the SpyEye bot and the tactics it uses for stealing information from victim machines.

Read more  

Toll fraud: SipPhreak

PHP/SipPhreak.A acts like an ancient SMTP open relay scanner, but with a twist: it targets open or vulnerable SIP devices instead of mail servers. Alexis Dorais-Joncas gives a detailed analysis of this threat - which is probably the initial step in a…

Read more  

SpyEye malware infection framework

The SpyEye bot has a sophisticated, modular design and has improved its capabilities over time. In this article, Aditya Sood and colleagues examine SpyEye’s modules and map out how they are initialized and how they interact with each other, providing…

Read more  

Tumblr attacks – what to watch out for

Christopher Boyd (GFI Software)

‘Tumblr is definitely a hot property for scammers, and users should be very careful.' Christopher Boyd, GFI Software.

Read more  

Anti-phishing feature for Gmail

Gmail users get helping hand in avoiding phishing scams.

Read more  

Spam levels take a nose dive

Spamming losing its attraction for criminal operators?

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.