Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Phighting cybercrime together

Martijn Grooten (Virus Bulletin)

Martijn Grooten presents a round-up of the first annual APWG eCrime Researchers Sync-Up.

Read more  

Hiding in plain sight

Raul Alvarez takes a look at a lesser known stealth technology - the alternate data stream.

Read more  

No mail for Alisons, Alberts, Algernons...

McAfee glitch prevents addresses starting with the letter 'A' from receiving mail.

Read more  

Old breach rears its head

Two years on, stolen card details from Heartland breach still being used.

Read more  

Sender authentication – practical implementations

Terry Zink (Microsoft)

Previously Terry Zink has looked at how SMTP works, email headers, SPF, SenderID and DKIM. But what about some practical realities? How well do these technologies work in real life? Can we use them to solve actual problems? Here he describes a real…

Read more  

Defeating mTANs for profit – part one

Kyle Yang (Fortinet)
Axelle Apvrille (Fortinet)

Until recently, malware on mobile devices had not been used for organized crime involving large amounts of money. This changed when the infamous Zeus gang, known for targeting online banking, started to show a clear interest in infecting mobile…

Read more  

A nice drop of Cocoa

Mac security in general attracts a lot of attention these days, and with this in mind David Harley reviews a book that aims to help Mac developers build security into their apps from the beginning of the development process.

Read more  

What next for rogue AVs?

Dmitry Bestuzhev (Kaspersky Lab)

'The issue facing even the most experienced users is how to distinguish between fake and legitimate antivirus solutions before installing them on a computer.' Dmitry Bestuzhev, Kaspersky Lab

Read more  

China starts to clean up its act

China slides down the rankings of top spam-producing countries.

Read more  

Messaging anti-abuse award

MAAWG introduces memorial award to honour the behind-the-scenes contributors who make the Internet safer for all.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.