An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Chandra Prakash describes the step-by-step operational characteristics of Rustock.C in kernel mode from its startup to the point at which its spambot code (botdll) is activated in user mode.
Read moreOctober 2008 saw the annual three-day work-rest-and-play marathon (without so much of the rest) that is the VB conference. A slowly recovering Helen Martin reports on VB2008.
Read morePeter Ferrie reaches the last in the collection of viruses created by the writer ‘fakemnded’ in the EOF-rRlf-DoomRiderz virus zine.
Read moreHannah Mariner shares her thoughts on how allowing people from diverse professional backgrounds to enter the AV industry can help strengthen, prolong and add direction to the industry as a whole.
Read more'We are left with the alarming question as to whether privacy should be put before global security.’ Abhilash Sonwane, Cyberoam.
Read moreVB's testing team put 24 anti-malware products to the test on the server version of Microsoft's latest iteration of the Windows platform: Windows Server 2008. John Hawes has all the details on which products managed to secure a VB100 award and which…
Read morePeter Ferrie continues a series of analyses of viruses contained in the long-delayed (and probably last of its kind) EOF-rRlf-DoomRiderz virus zine. The second in the series of analyses is that of W32/Harumf.
Read moreMary Landesman looks at the less obvious threats posed by malicious website compromise.
Read morePolice decide not to investigate BT and Phorm over secretive information-gathering trials.
Read moreStudy shows users concentrate on getting rid of pop-up boxes as soon as possible rather than reading their contents.
Read more