Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Your computer is now stoned (...again!)

Mebroot - the MBR rootkit - is one of the most advanced and stealthiest malware seen to date. It operates in the lowest levels of the operating system, uses many undocumented tricks and relies heavily on unexported functions and global variables. In…

Read more  

Anti-stealth fighters: testing for rootkit detection and removal

Andreas Marx (AV-TEST)
Maik Morgenstern (AV-TEST)

While it is easy for a good signature-driven product to find a known sample that has not yet been activated, thanks to rootkit technology it is becoming increasingly challenging for products to detect samples once they are running and trying to hide…

Read more  

Political DDoS around the world

Jose Nazario (Arbor Networks)

'We have tracked tens of thousands of DDoS attacks ... A subset of [them] appear to be politically motivated.’ Jose Nazario, Arbor Networks

Read more  

VB100 April 2008 - Windows Vista Business Edition SP1

John Hawes wipes the sweat from his brow after completing a comparative review of 40 anti-malware products for Vista. With polymorphic trip-ups, false positives and stability issues in the fray it proved to be a tough test for the products involved.

Read more  

Sullied site stats

Increasing number of legitimate sites hosting malware, compromised sites remaining infected for longer.

Read more  

Chinese mobile spam investigated

200 million Chinese mobile users spammed.

Read more  

AVG Internet Security 8

John Hawes gets his hands on a preview version of the latest offering from AVG - AVG Internet Security 8.

Read more  

Is your spam filter really adaptive? (Probably not)

Jonathan Zdziarski describes adaptive parsing - a technique that can be applied to a spam classifier’s parser to allow it to learn the most effective way to parse a corpus of mail.

Read more  

Black Hat DC and CCC 24C3

Morton Swimmer reports on two security conferences of the more hands-on nature: the 24th Chaos Communication Congress in Berlin, Germany, and Black Hat DC in Washington, DC, USA.

Read more  

Home (page) renovations

'We often hear from VB conference delegates that the networking opportunities at the conference are as valuable to them as the presentations themselves.' Helen Martin, Virus Bulletin

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.