Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Your filters are bypassed: Rustock.C in the kernel

Chandra Prakash describes the step-by-step operational characteristics of Rustock.C in kernel mode from its startup to the point at which its spambot code (botdll) is activated in user mode.

Read more  

The Ottawa rules

October 2008 saw the annual three-day work-rest-and-play marathon (without so much of the rest) that is the VB conference. A slowly recovering Helen Martin reports on VB2008.

Read more  

XXX racted

Peter Ferrie reaches the last in the collection of viruses created by the writer ‘fakemnded’ in the EOF-rRlf-DoomRiderz virus zine.

Read more  

Broadly speaking: skill diversification in the AV community

Hannah Mariner shares her thoughts on how allowing people from diverse professional backgrounds to enter the AV industry can help strengthen, prolong and add direction to the industry as a whole.

Read more  

The cost of online anonymity

'We are left with the alarming question as to whether privacy should be put before global security.’ Abhilash Sonwane, Cyberoam.

Read more  

VB100 October 2008 - Windows Server 2008

VB's testing team put 24 anti-malware products to the test on the server version of Microsoft's latest iteration of the Windows platform: Windows Server 2008. John Hawes has all the details on which products managed to secure a VB100 award and which…

Read more  

Whither the Harumf?

Peter Ferrie continues a series of analyses of viruses contained in the long-delayed (and probably last of its kind) EOF-rRlf-DoomRiderz virus zine. The second in the series of analyses is that of W32/Harumf.

Read more  

The hidden cost of compromise

Mary Landesman looks at the less obvious threats posed by malicious website compromise.

Read more  

No Phormal investigation

Police decide not to investigate BT and Phorm over secretive information-gathering trials.

Read more  

Pop-up warnings ineffective?

Study shows users concentrate on getting rid of pop-up boxes as soon as possible rather than reading their contents.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.