Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

‘Yet another Rustock analysis ...’

Lukasz Kwiatek and Stanislaw Litawa take a detailed look at Rustock.C.

Read more  

Fast flux trojan author to plead guilty

Nugache author enters plea bargain.

Read more  

New best practices for ISPs

MAAWG produces two new sets of ISP best practices.

Read more  

Reversing Python modules

The object-oriented programming language Python can be used for many kinds of software development – potentially including malware development. Aleksander Czarnowski believes in being prepared and here he provides a brief overview of how to reverse…

Read more  

Spear phishing – on the rise?

Paul Baccas (Sophos)

Paul Baccas looks at the recent rise in targeted phishing campaigns alongside a decline in the profitability of more traditional phishing methods.

Read more  

The road less truvelled: W32/Truvel

By the addition of a relocation table, Vista executables can be configured to use a dynamic image base. That essentially turns them into executable DLLs. Now a virus has come along that has made a ‘breakthrough’ by infecting these executables - or it…

Read more  

Sunbelt Software VIPRE Antivirus + Antispyware

John Hawes gets his hands on a beta copy of Sunbelt's VIPRE - a genuinely new anti-malware product emerging from the anti-spyware boom.

Read more  

Advertising database poisoning

Adware programs have variously been dressed up as providing anti-phishing protection, intrusion detection capabilities as well as the ‘benefit’ of targeted advertising, but their presence is still a considerable nuisance to many. Here, Lysa Myers…

Read more  

A commitment to quality and reliability

'The purpose of the VB100 is to provide a regular measure of the competence, reliability and credibility of software vendors in the security field.' John Hawes, Virus Bulletin.

Read more  

New memory persistence threats

Eric Filiol describes a set of computer memory weaknesses that could enable the theft of sensitive data via malware attacks.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.