Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Anti-stealth fighters: testing for rootkit detection and removal

Andreas Marx (AV-TEST)
Maik Morgenstern (AV-TEST)

While it is easy for a good signature-driven product to find a known sample that has not yet been activated, thanks to rootkit technology it is becoming increasingly challenging for products to detect samples once they are running and trying to hide…

Read more  

Political DDoS around the world

Jose Nazario (Arbor Networks)

'We have tracked tens of thousands of DDoS attacks ... A subset of [them] appear to be politically motivated.’ Jose Nazario, Arbor Networks

Read more  

VB100 April 2008 - Windows Vista Business Edition SP1

John Hawes wipes the sweat from his brow after completing a comparative review of 40 anti-malware products for Vista. With polymorphic trip-ups, false positives and stability issues in the fray it proved to be a tough test for the products involved.

Read more  

Sullied site stats

Increasing number of legitimate sites hosting malware, compromised sites remaining infected for longer.

Read more  

Chinese mobile spam investigated

200 million Chinese mobile users spammed.

Read more  

How wise are crowds when assessing phishing websites?

Tyler Moore considers the effectiveness of web-based participation in the implementation of anti-phishing mechanisms.

Read more  

Black Hat DC and CCC 24C3

Morton Swimmer reports on two security conferences of the more hands-on nature: the 24th Chaos Communication Congress in Berlin, Germany, and Black Hat DC in Washington, DC, USA.

Read more  

Home (page) renovations

'We often hear from VB conference delegates that the networking opportunities at the conference are as valuable to them as the presentations themselves.' Helen Martin, Virus Bulletin

Read more  

Exepacker blacklisting part 3

In the final part of the series on exepacker blacklisting, Robert Neumann takes a look at how all the processing and analysis techniques are put into practice in a real-life situation.

Read more  

Botherders herded

Botherder arrests, court appearances and convictions.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.