Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Malware gets terms of use

Malware package distributed with EULA.

Read more  

Grand theft personal information

Scammers exploit release of Grand Theft Auto IV.

Read more  

Algorithms for grouping similar samples in malware analysis

Malware researchers are frequently faced with huge collections of files that must be analysed to determine whether or not they are malware. In such situations, grouping the files according to their binary similarity can save time and effort. Víctor…

Read more  

Blended malware defence

It's a well known problem in the security industry that the time taken to get a sample to the vendor, through analysis and finally to distribute detection updates to clients, can still be much longer than it takes for the malware itself to spread.…

Read more  

Online banking call to arms

'Banking organizations have failed to pledge that they will stop sending emails that add to the confusion.' Helen Martin, Virus Bulletin

Read more  

New home for The Spammers’ Compendium

Spammers' trick repository moves to VB.

Read more  

eEye Digital Security Blink Professional 4.0

John Hawes takes an in-depth look at the security features of eEye Digital Security's Blink Professional and finds a solid package with impressive breadth of power.

Read more  

Delivering reliable protection against phishing websites

Sorin Mustaca describes the creation of an automated URL filtering system for protecting against phishing websites.

Read more  

Metamorphic authorship recognition using Markov models

Andrew Walenstein (University of Louisiana at Lafayette)
Arun Lakhotia (University of Louisiana at Lafayette)

Automated code morphing techniques can make malware recognition difficult. In this article researchers at the University of Lafayette propose a method that can be used to decide whether a binary is a variant of a known item of metamorphic malware by…

Read more  

Your computer is now stoned (...again!)

Mebroot - the MBR rootkit - is one of the most advanced and stealthiest malware seen to date. It operates in the lowest levels of the operating system, uses many undocumented tricks and relies heavily on unexported functions and global variables. In…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.