Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

The problem of backscatter – part 2

Terry Zink (Microsoft)

In the previous part of this series, Terry Zink introduced the problem of backscatter spam, describing what it is and why it is such a problem. He also looked at why it is so difficult to stop. Fortunately, the situation is not hopeless and this…

Read more  

Lavasoft Ad-Aware 2008

Having started up focusing on unwanted tracking behaviour, Lavasoft's Ad-Aware has gradually branched out to cover adware, spyware and now with the integration of a full anti-malware engine, the gamut of trojans, viruses and worms, with a selection…

Read more  

Evading CAPTCHA

Martin Overton looks at the use of CAPTCHAs in web security and at how cybercriminals are making increasing attempts to evade them.

Read more  

The case for AV for Linux: Linux/Rst-B

A high prevalence of Linux/Rst-B seen recently on hacked Linux boxes is not due to ingenious spreading mechanisms or Linux users swapping binaries, but due to a proliferation of infected hacking tools. Billy McCourt has the details of this real,…

Read more  

Prolific spammer jailed

Robert Soloway to remain behind bars for 47 months.

Read more  

The secret life of old malware

'It may even come to pass that an entire class of malware gets forgotten because they are rarely heard of any longer.' Kurt Wismer.

Read more  

VB100 August 2008 - Windows XP Service Pack 3

With a new set of samples to measure detection against, a new platform on new hardware and a selection of new products in the mix, John Hawes had his work cut out in this comparative review on Windows XP SP3.

Read more  

Improving heuristics

Heuristic detection can provide valuable assistance to help security analysts in achieving zero-day malware detection. Newaz Rafiq and Yida Mao discuss a novel heuristic detection technique with a high level of accuracy and a high level of…

Read more  

Neosploit business wound up

Infection kit no longer profitable.

Read more  

Security companies splash out

New acquisitions for Sophos and Aladdin.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.