An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
‘We're wasting more time than ever dealing with malware that is more hostile than ever.’ John Levine, Taughannock Networks.
Read moreIf a file contains no code, can it be executed? Can arithmetic operations be malicious? In W32/Lerock we have a file that contains no code, and no data in any meaningful sense. All it contains is a block of relocation items. Peter Ferrie untangles…
Read moreKen Dunham (iSIGHT Partners)
Following last month's introduction to memory analysis, Ken Dunham walks through the process using Haxdoor as an example.
Read moreSoftware giant wins court order to take down botnet command and control centres.
Read moreMorton Swimmer (Trend Micro)
Morton Swimmer reports on the information fest at the 26th Congress of the Chaos Computer Club.
Read moreThe VB test team took a closer look at CA's latest product for the home market. John Hawes has the details.
Read moreKen Dunham (iSIGHT Partners)
Advanced memory analysis allows for rapid assessment of potentially hostile executables in memory. Ken Dunham takes us through the three phases of operation in detail: triage, capture and analysis.
Read moreChester Wisniewski (Sophos)
‘[SSL certificate] warnings are a nuisance for the same reason they may help.’ Chester Wisniewski, Sophos
Read more