Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Spear phishing – on the rise?

Paul Baccas (Sophos)

Paul Baccas looks at the recent rise in targeted phishing campaigns alongside a decline in the profitability of more traditional phishing methods.

Read more  

The road less truvelled: W32/Truvel

By the addition of a relocation table, Vista executables can be configured to use a dynamic image base. That essentially turns them into executable DLLs. Now a virus has come along that has made a ‘breakthrough’ by infecting these executables - or it…

Read more  

VB100 June 2008 - Ubuntu Linux 8.04LTS Server Edition

John Hawes dusts off his Linux skills for a comparative review of anti-malware products on the Ubuntu Server platform. Check out which of the 15 products were awarded VB100 status and which failed to make the grade.

Read more  

EICAR 2008, c’était merveilleux!

Eddy Willems provides a roundup of this year's EICAR conference in Laval, France.

Read more  

Metafile art class

Like its predecessor the Windows Metafile Format, the Enhanced Metafile Format has proven to be susceptible to misappropriation. Dennis Elser provides an in-depth description of a recent remotely exploitable file format vulnerability within the…

Read more  

AusCERT delegates get more than they bargained for

Red faces all round as infected USB sticks handed out.

Read more  

Could do better all round

EU information security body says European countries need to improve information security; annual report card shows US federal agencies don't all comply with security rules.

Read more  

Strike me down, and I shall become more powerful!

Aditya Kapoor (McAfee)

The rootkit that has been dubbed one of the stealthiest ever seen in the wild is back – with improved defences and new stealth code. Aditya Kapoor and Rachit Mathur look at recent developments in the MBR rootkit.

Read more  

System cleaning: getting rid of malware from infected PCs

Andreas Marx (AV-TEST)
Maik Morgenstern (AV-TEST)

Maik Morgenstern and Andreas Marx argue the importance of testing the system cleaning capabilities of anti-malware products and describe how it can be done.

Read more  

The good, the bad and the blurring boundaries

'The reality is that the distinction between legitimate and malicious software is an ever blurring line.’ Greg Day, McAfee

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.