Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Obama pledges security education from boardroom to classroom

President Obama announces multi-billion-dollar cybersecurity effort.

Read more  

Beware of searching for lyrics

McAfee research identifies riskiest Internet search terms.

Read more  

Phisher gets 8.5 years

Phisher sentenced to eight and a half years in prison for phishing scams that netted him approximately $700,000.

Read more  

Where is Waledac?

Terry Zink (Microsoft)

Win32/Waledac is a trojan that is used to send spam. It also has the ability to download and execute arbitrary files, harvest email addresses from the local machine, perform denial of service attacks, proxy network traffic and sniff passwords. Scott…

Read more  

One man's spam

'The most troublesome category of messages – that requires the most thought – are those that occupy the awkward grey area between ham and spam.' Helen Martin, Virus Bulletin

Read more  

Comodo Internet Security

Comodo's Internet Security suite leaves an overall favourable impression on the VB test team.

Read more  

Russian state award for Kaspersky

Eugene Kaspersky honored with highest Russian state award.

Read more  

Trend makes new acquisition

Trend snaps up Third Brigade.

Read more  

Archive material

Six AV companies suffer archive processing vulnerabilities.

Read more  

Mail authentication with Domain Keys Identified Mail – part two

John Levine discusses the ways in which a DKIM-authenticated domain fits into a mail-handling system, and looks at related technologies that build on DKIM to help recognize good mail senders and deter phishing.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.