Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Beware of searching for lyrics

McAfee research identifies riskiest Internet search terms.

Read more  

Phisher gets 8.5 years

Phisher sentenced to eight and a half years in prison for phishing scams that netted him approximately $700,000.

Read more  

Where is Waledac?

Terry Zink (Microsoft)

Win32/Waledac is a trojan that is used to send spam. It also has the ability to download and execute arbitrary files, harvest email addresses from the local machine, perform denial of service attacks, proxy network traffic and sniff passwords. Scott…

Read more  

Anti-unpacker tricks – part seven

New anti-unpacking tricks continue to be developed as the older ones are constantly being defeated. In this series of articles Peter Ferrie describes some tricks that might become common in the future, along with some countermeasures. This article…

Read more  

Mail authentication with Domain Keys Identified Mail – part two

John Levine discusses the ways in which a DKIM-authenticated domain fits into a mail-handling system, and looks at related technologies that build on DKIM to help recognize good mail senders and deter phishing.

Read more  

Anti-spam comparative review May 2009

Martijn Grooten (Virus Bulletin)

After months of consideration, internal and external discussion, trials and retrials, the results of VB's first live anti-spam comparative review are in. Martijn Grooten has the details.

Read more  

Indictment for university spammers

Spammers whose campaign targeted over 2,000 educational institutions face up to ten years imprisonment.

Read more  

Case study: the TDSS rootkit

The TDSS modular downloader is known for its ability to bypass active protection, for its outstanding persistence and its rootkit functions. Alisa Shevchenko presents a detailed case study.

Read more  

Anti-unpacker tricks – part six

New anti-unpacking tricks continue to be developed as the older ones are constantly being defeated. In this series of articles Peter Ferrie describes some tricks that might become common in the future, along with some countermeasures. This article…

Read more  

One man's spam

'The most troublesome category of messages – that requires the most thought – are those that occupy the awkward grey area between ham and spam.' Helen Martin, Virus Bulletin

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.