Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Congrats

VB congratulates the winner of a hat trick of blogging awards.

Read more  

Twinkle, twinkle little star

Peter Ferrie likens W32/Satevis to a viral version of a mix tape - a virus that is essentially made up of a collection of routines taken from other viruses.

Read more  

Prescription medicine

W32/Zekneol appears to be a complicated virus, but in his full analysis Peter Ferrie shows that looks can be deceiving.

Read more  

Anti-spam comparative review

Martijn Grooten (Virus Bulletin)

This month’s anti-spam comparative review saw another increase in the field of competitors with 14 products taking their place on the test bench. Martijn Grooten has all the details.

Read more  

Microsoft Security Essentials

Microsoft Security Essentials, the long-awaited replacement for the Windows Live OneCare package, is finally with us. VB's test team put Microsoft's new free home-user package through its paces, declaring it to be pretty decent overall.

Read more  

Collaborative spam filtering with the hashing trick

Josh Attenberg and colleagues describe the hashing trick as an effective method for collaborative spam filtering.

Read more  

Happy holidays: mobile maliciousness

Ken Dunham (iSIGHT Partners)

'Social engineering threats are a notable concern for mobile device users and are always escalated during the holiday period.' Ken Dunham, iSIGHT Partners.

Read more  

Data tainting for malware analysis – part two

In this three-part series Florent Marceau studies the use and advantages of full virtualization in the security field. Following an introduction to full virtualization in part one, this part looks at the limitations of the technology.

Read more  

Detecting bootkits

Alisa Shevchenko and Dmitry Oleksiuk decided to find out whether anti-virus software has learned to cope successfully with Mebroot and MBR infectors in general a few years after the first appearance of this type of malware.

Read more  

Nigeria takes steps to clean up its act

Nigerian government clamps down on advance fee fraud.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.