An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
The VB test team took a closer look at CA's latest product for the home market. John Hawes has the details.
Read moreNew BackDoor.Tdss rootkits are sophisticated pieces of malware. Alexey Tkachenko and Artem Baranov detail the BackDoor.Tdss.565 rootkit - which presented surprises within minutes of the start of its analysis.
Read more‘We're wasting more time than ever dealing with malware that is more hostile than ever.’ John Levine, Taughannock Networks.
Read moreIf a file contains no code, can it be executed? Can arithmetic operations be malicious? In W32/Lerock we have a file that contains no code, and no data in any meaningful sense. All it contains is a block of relocation items. Peter Ferrie untangles…
Read moreKen Dunham (iSIGHT Partners)
Following last month's introduction to memory analysis, Ken Dunham walks through the process using Haxdoor as an example.
Read moreSoftware giant wins court order to take down botnet command and control centres.
Read moreAfter the last mammoth VB100 test on Windows 7, this month sees a smaller field of competitors for the less well supported Linux platform. John Hawes reports on a mixed bag of results.
Read moreKyle Yang (Fortinet)
After playing the cat-and-mouse game with AV companies for several months, the author(s) of Pushdo/Cutwail finally decided to change their advanced installer, in doing so changing the communication mechanism between the servers and bots. Kyle Yang…
Read more