An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Malware researchers are frequently faced with huge collections of files that must be analysed to determine whether or not they are malware. In such situations, grouping the files according to their binary similarity can save time and effort. Víctor…
Read moreIt's a well known problem in the security industry that the time taken to get a sample to the vendor, through analysis and finally to distribute detection updates to clients, can still be much longer than it takes for the malware itself to spread.…
Read more'Banking organizations have failed to pledge that they will stop sending emails that add to the confusion.' Helen Martin, Virus Bulletin
Read moreJohn Hawes takes an in-depth look at the security features of eEye Digital Security's Blink Professional and finds a solid package with impressive breadth of power.
Read moreSorin Mustaca describes the creation of an automated URL filtering system for protecting against phishing websites.
Read moreAndrew Walenstein (University of Louisiana at Lafayette)
Arun Lakhotia (University of Louisiana at Lafayette)
Automated code morphing techniques can make malware recognition difficult. In this article researchers at the University of Lafayette propose a method that can be used to decide whether a binary is a variant of a known item of metamorphic malware by…
Read moreMebroot - the MBR rootkit - is one of the most advanced and stealthiest malware seen to date. It operates in the lowest levels of the operating system, uses many undocumented tricks and relies heavily on unexported functions and global variables. In…
Read more