An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Costin Raiu (Kaspersky Lab)
‘Some of the new testing labs that have appeared recently mimic the tactics of rogue AV products.’ Costin Raiu, Kaspersky Lab
Read moreThe Koobface web server component has vulnerabilities that are remotely exploitable. Joey Costoya discusses the vulnerabilities, and explores the possibility of taking over the Koobface botnet.
Read moreStudy reveals legitimate sites serving malware far outnumber infected adult websites.
Read moreAutralian anti-money laundering and counter terrorism financing regulator uses case studies to educate businesses about potential risks.
Read moreTerry Zink (Microsoft)
Sender authentication is a hot topic in the world of email. It has a number of uses and a number of suggested uses. Which ones work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to…
Read moreVB's lab team battled with inconsistencies and unreliable behaviours in this month's VB100 test, but eventually managed to pull together some meaningful results. John Hawes names and shames the badly behaved products and reveals this month's VB100…
Read moreThe latest in a flurry of activity in acquisitions and mergers in the security field.
Read moreTerry Zink (Microsoft)
Sender authentication is a hot topic in the world of email. It has a number of uses and a number of suggested uses. Which ones work in real life? Which ones don’t quite measure up? Can we use authentication to mitigate spoofing? Can we use it to…
Read more