An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Peter Ferrie likens W32/Satevis to a viral version of a mix tape - a virus that is essentially made up of a collection of routines taken from other viruses.
Read moreW32/Zekneol appears to be a complicated virus, but in his full analysis Peter Ferrie shows that looks can be deceiving.
Read moreMartijn Grooten (Virus Bulletin)
This month’s anti-spam comparative review saw another increase in the field of competitors with 14 products taking their place on the test bench. Martijn Grooten has all the details.
Read moreMicrosoft Security Essentials, the long-awaited replacement for the Windows Live OneCare package, is finally with us. VB's test team put Microsoft's new free home-user package through its paces, declaring it to be pretty decent overall.
Read moreJosh Attenberg and colleagues describe the hashing trick as an effective method for collaborative spam filtering.
Read moreKen Dunham (iSIGHT Partners)
'Social engineering threats are a notable concern for mobile device users and are always escalated during the holiday period.' Ken Dunham, iSIGHT Partners.
Read moreIn this three-part series Florent Marceau studies the use and advantages of full virtualization in the security field. Following an introduction to full virtualization in part one, this part looks at the limitations of the technology.
Read moreAlisa Shevchenko and Dmitry Oleksiuk decided to find out whether anti-virus software has learned to cope successfully with Mebroot and MBR infectors in general a few years after the first appearance of this type of malware.
Read moreNigerian government clamps down on advance fee fraud.
Read more