An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Lukasz Kwiatek and Stanislaw Litawa take a detailed look at Rustock.C.
Read moreThe object-oriented programming language Python can be used for many kinds of software development – potentially including malware development. Aleksander Czarnowski believes in being prepared and here he provides a brief overview of how to reverse…
Read morePaul Baccas (Sophos)
Paul Baccas looks at the recent rise in targeted phishing campaigns alongside a decline in the profitability of more traditional phishing methods.
Read moreBy the addition of a relocation table, Vista executables can be configured to use a dynamic image base. That essentially turns them into executable DLLs. Now a virus has come along that has made a ‘breakthrough’ by infecting these executables - or it…
Read moreJohn Hawes gets his hands on a beta copy of Sunbelt's VIPRE - a genuinely new anti-malware product emerging from the anti-spyware boom.
Read moreAdware programs have variously been dressed up as providing anti-phishing protection, intrusion detection capabilities as well as the ‘benefit’ of targeted advertising, but their presence is still a considerable nuisance to many. Here, Lysa Myers…
Read more'The purpose of the VB100 is to provide a regular measure of the competence, reliability and credibility of software vendors in the security field.' John Hawes, Virus Bulletin.
Read moreEric Filiol describes a set of computer memory weaknesses that could enable the theft of sensitive data via malware attacks.
Read more