An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Free anti-virus continues to be all the rage, with more and more firms jumping on the bandwagon. John Hawes takes a look at one of the latest offerings: the free version of Agnitum’s Outpost Security Suite, and finds that you can get quite a lot for…
Read more‘... with the facts laid bare, the cross-border cyber enforcement issues between nations will be discussed differently.' Wout de Natris, De Natris Consult
Read moreThe Flibi virus demonstrated that a virus can carry its own ‘genetic code’, and if the building blocks of that code are mutated in some way, then interesting behaviours can arise. In this article Peter Ferrie demonstrates how some of Flibi's…
Read moreMartijn Grooten (Virus Bulletin)
Hackers gain access to server providing DNS for legitimate domains.
Read moreWin32/Unruy.AD conceals its code at a low level and infects the Master Boot Record so that it will be loaded before the operating system (and any security solutions installed by the user) have a chance to kick in. Robert Lipovský and Peter Hlavatý…
Read morePaul Baccas (Sophos)
VB usually reserves book reviews for factual books dedicated to the subject of information security. This month, however, we break away from tradition to review a piece of fiction written by renowned Windows systems internals expert and Microsoft…
Read moreMartijn Grooten (Virus Bulletin)
Martijn Grooten presents a round-up of the first annual APWG eCrime Researchers Sync-Up.
Read moreRaul Alvarez takes a look at a lesser known stealth technology - the alternate data stream.
Read moreMcAfee glitch prevents addresses starting with the letter 'A' from receiving mail.
Read more