Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Botnets, politics and hacktivism – an interesting partnership

Terry Zink (Microsoft)

Terry Zink looks at the increasingly common phenomenon of hacktivism and details three recent cyber warfare attacks.

Read more  

Are takedowns an exercise in futility?

‘There is often little incentive for domain registrars or hosting providers to make it more difficult for criminals to obtain services.’ Mary Landesman, ScanSafe

Read more  

VB100 – Windows XP SP3

In VB's largest ever comparative review, a total of 60 products are put to the test on Windows XP. John Hawes has all the details.

Read more  

Evasions in Intrusion Prevention/Detection Systems

Abhishek Singh and colleagues look at some of the more common methods of evading IDS/IPS detection and the ways in which solutions can counter these evasive techniques.

Read more  

Exploit kit explosion - part one

In the first of a two-part series introducing exploit kits, Mark Davis outlines the basic details of the dime-a-dozen kits used in drive-by browser-based attacks.

Read more  

VB2010 programme announced

Security conference programme revealed.

Read more  

All star superstars

List of security bright sparks announced.

Read more  

Dangerous places to be online

Research reveals most dangerous places for cybercrime in the US and Canada.

Read more  

‘Signatures are dead.’ ‘Really? And what about pattern matching?’

While accepting the increasing importance of behavioural analysis and detection, Gyozo Papp looks at how current detection technologies, from the simplest to the most complex, can be backed up by pattern matching, proving that it is a mature…

Read more  

Memory analysis - examples

Ken Dunham (iSIGHT Partners)

Following last month's introduction to memory analysis, Ken Dunham walks through the process using Haxdoor as an example.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.