Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Things to come

New anti-malware companies and products seem to be springing up with increasing frequency at the moment, many reworking existing detection engines into new forms, adding new functions, as well as several that are working on their own detection…

Read more  

Injection as a way of life

Injecting code into a process is not a new technology, but it is still used by most prevalent malware today. Raul Alvarez dissects two examples of recent prevalent malware and shows how they inject their code into a running process.

Read more  

ISP in hot water with ICO

TalkTalk incurs the wrath of the ICO after covert trials of a new anti-malware system.

Read more  

RAP rap?

Calling all budding anti-malware rappers...

Read more  

What’s the deal with sender authentication? Part 4

Terry Zink (Microsoft)

Sender authentication is a hot topic in the world of email. It has a number of uses and a number of suggested uses. Which ones work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to…

Read more  

The missing LNK

LNK files are everywhere in Windows, so ubiquitous that they are rarely even recognized for what they are. Overall, LNK files do not pose a direct threat, but then there are the LNK files produced by W32/Stuxnet, which allow the execution of…

Read more  

Anti-unpacker tricks – part twelve

Last year, a series of articles described some tricks that might become common in the future, along with some countermeasures. Now, the series continues with a look at tricks that are specific to debuggers and emulators.

Read more  

Chim Chymine: a lucky sweep?

David Harley (ESET)

Apart from generating detection for Stuxnet, ESET also started to detect its approach heuristically and it wasn't long before new malware families appeared, experimenting with LNK files. David Harley has the details.

Read more  

Breaking the habit

‘Why doesn’t Windows tell me when that very important signature has been tampered with?' Roel Schouwenberg, Kaspersky Lab

Read more  

Advanced exploit framework lab set-up

Any researcher serious about regularly researching exploit frameworks needs a special lab set-up to work with the PHP, MySQL and web server components commonly found in such kits. Mark Davis documents how to create LAMP and WAMP servers and how to…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.