Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

China starts to clean up its act

China slides down the rankings of top spam-producing countries.

Read more  

Messaging anti-abuse award

MAAWG introduces memorial award to honour the behind-the-scenes contributors who make the Internet safer for all.

Read more  

Hackers hacked

Russian cybercrime forum gets taste of its own medicine.

Read more  

DLL hijacking

There are a few good reasons for taking another look at DLL hijacking - including the fact that we don't learn from our mistakes. Aleksander Czarnowski takes an in-depth look at the DLL hijacking story.

Read more  

How much malware is really out there?

‘For most people even a single piece of malware is too much – especially if they are currently affected by it.' Robert Sandilands, Commtouch

Read more  

Introduction to hostile Java analysis

Fraudsters have abused Java to obfuscate attacks, hinder research and response, and maximize profits. Security experts need an understanding of common Java-based attacks and their implications in order to respond to emerging threats in the wild. Ed…

Read more  

Facebook spammers fined

Social network spammers get their comeuppance.

Read more  

The top 10 spam, malware and cybersecurity stories of 2010

Spam, malware and general security topics all hit the headlines in 2010. Terry Zink takes a look back at the biggest newsmakers of the year.

Read more  

‘Cyber army’ formed in Estonia

Volunteer force of programmers, computer scientists and software engineers established.

Read more  

What’s the deal with sender authentication? Part 6

Terry Zink (Microsoft)

Which sender authentication techniques work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to guarantee authenticity? And how do we authenticate email, anyway? Terry Zink concludes his…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.