Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Mobile users more vulnerable to phishing

Mobile users reach phishing sites quicker than non-mobile users and more likely to enter personal details.

Read more  

‘Cyber army’ formed in Estonia

Volunteer force of programmers, computer scientists and software engineers established.

Read more  

What’s the deal with sender authentication? Part 6

Terry Zink (Microsoft)

Which sender authentication techniques work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to guarantee authenticity? And how do we authenticate email, anyway? Terry Zink concludes his…

Read more  

Transitions: welcome to the new old world

Andrew Lee takes stock of the anti-malware industry and the world at large as we stand on the cusp of a new decade.

Read more  

Carberp, a new bag of tricks

As in normal business, one of most effective ways for a banker trojan to gain market share is to do things better than its competitors, and if possible, make the migration from competitors to its own business as easy as possible. Carberp does both of…

Read more  

How do we make bigger better?

‘Whilst bigger may not always be better, it is clearly always bigger. And bigness begets bigness.’ Paul Ducklin, Sophos

Read more  

Android SMS trojans: new platform, ‘old’ tricks

Denis Maslennikov (Kaspersky Lab)

August 2010 saw the appearance of the first piece of malware for the Android mobile platform. Denis Maslennikov examines three variants of the FakePlayer SMS trojan.

Read more  

Case study: the Ibank trojan

Alisa Shevchenko sheds some light on the technology of online banking fraud with an indepth analysis of the Ibank trojan which targets a wide variety of Russian online banking technologies.

Read more  

VB ‘securing your organization in the age of cybercrime’ Seminar

Helen Martin reports from the first VB Seminar in London.

Read more  

Commercial ‘malware’ production

Gunter Ollmann (Damballa)

‘The development and application of sophisticated malware ... already exists within the commercial realm.’ Gunter Ollmann, Damballa

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.