Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Why flash web pages are like collateralized debt obligations

‘We're wasting more time than ever dealing with malware that is more hostile than ever.’ John Levine, Taughannock Networks.

Read more  

Doin’ the eagle rock

If a file contains no code, can it be executed? Can arithmetic operations be malicious? In W32/Lerock we have a file that contains no code, and no data in any meaningful sense. All it contains is a block of relocation items. Peter Ferrie untangles…

Read more  

Memory analysis - examples

Ken Dunham (iSIGHT Partners)

Following last month's introduction to memory analysis, Ken Dunham walks through the process using Haxdoor as an example.

Read more  

HMRC addresses security

Security to be prioritized to prevent future data losses.

Read more  

Microsoft tackles Waledac

Software giant wins court order to take down botnet command and control centres.

Read more  

Mcafee growth plan unveiled

Three to four acquisitions planned per year.

Read more  

The 26C3 Congress of the Chaos Computer Club

Morton Swimmer (Trend Micro)

Morton Swimmer reports on the information fest at the 26th Congress of the Chaos Computer Club.

Read more  

CA Internet Security Suite Plus 2010

The VB test team took a closer look at CA's latest product for the home market. John Hawes has the details.

Read more  

Introduction to advanced memory analysis

Ken Dunham (iSIGHT Partners)

Advanced memory analysis allows for rapid assessment of potentially hostile executables in memory. Ken Dunham takes us through the three phases of operation in detail: triage, capture and analysis.

Read more  

SSL certificate warnings – nuisance or value?

Chester Wisniewski (Sophos)

‘[SSL certificate] warnings are a nuisance for the same reason they may help.’ Chester Wisniewski, Sophos

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.