An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Terry Zink (Microsoft)
Sender authentication is a hot topic in the world of email. It has a number of uses and a number of suggested uses. Which ones work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to…
Read morePartial success in the takedown of Bredolab; m00p gang member enters guilty plea.
Read moreOver a period of around three months, new virus writer hh86 produced a handful of viruses using some new techniques - then disappeared without a word. Peter Ferrie details her creations.
Read moreThe 20th VB conference drew to a close last month in the beautiful city of Vancouver. Helen Martin reports on the presentations, games, awards, birthday cakes, and the buzzword of the event: Stuxnet.
Read moreLast year, a series of articles described some tricks that might become common in the future, along with some countermeasures. In this final article of the series we look at anti-unpacking by anti-emulating.
Read more‘Germany was the first country to launch a large-scale malware-cleaning project backed by the government.’ Sorin Mustaca, Avira
Read moreIn previous articles Mark Davis introduced exploit frameworks such as Fragus, Tornado, and others, and described how to analyse them using LAMP/WAMP servers. Here, he walks through a Tornado kit, start to finish, showing the process required to…
Read more