Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Not so random

Pseudorandom generators are increasingly becoming an integral component of modern malware. Raul Alvarez shows how Conficker uses a pseudorandom generator to produce random domain names while retaining its ability to communicate with the Command and…

Read more  

Reversing Python objects

As Python has gained popularity with malware writers, new bytecode obfuscation techniques have started to appear. Aleksander Czarnowski describes some of those techniques.

Read more  

EICAR 2011: a 20th anniversary in Austria

Eddy Willems reports on some of the topics, debates and research presented at the EICAR 2011 conference.

Read more  

Digging through the problem of IPv6 and email

Terry Zink (Microsoft)

'Under IPv6, spammers could send out one piece of spam per IPv6 address, discard it and then move on to the next address for the next 10,000 years and never need to re-use a previous address.' Terry Zink explains why mail providers are not thrilled…

Read more  

A browser malware taxonomy

Aditya Sood and Richard Enbody propose a taxonomy of browser malware with the aim to provide a better insight into the techniques and tactics used.

Read more  

Education, education, education

‘In the fight against cybercrime knowledge can be a very powerful weapon.' Helen Martin, Virus Bulletin.

Read more  

New targeted attack via Google Images

A new method of targeted attack has recently been discovered in which the auto preview feature of Google Images is utilized to lure the user into downloading and purchasing fake AV applications. Robert X Wang has the details.

Read more  

Standalone comparatives

New publication schedule for VB100 and VBSpam comparative reviews.

Read more  

Apple adds daily definition checks

Max OS X 10.6 users get daily definition checks with latest security update.

Read more  

Mobile insecurity

Report reveals lax security when it comes to hte use of mobile devices in the workplace.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.