An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Andreas Marx (AV-TEST)
Maik Morgenstern (AV-TEST)
While it is easy for a good signature-driven product to find a known sample that has not yet been activated, thanks to rootkit technology it is becoming increasingly challenging for products to detect samples once they are running and trying to hide…
Read moreJose Nazario (Arbor Networks)
'We have tracked tens of thousands of DDoS attacks ... A subset of [them] appear to be politically motivated.’ Jose Nazario, Arbor Networks
Read moreJohn Hawes wipes the sweat from his brow after completing a comparative review of 40 anti-malware products for Vista. With polymorphic trip-ups, false positives and stability issues in the fray it proved to be a tough test for the products involved.
Read moreIncreasing number of legitimate sites hosting malware, compromised sites remaining infected for longer.
Read moreTyler Moore considers the effectiveness of web-based participation in the implementation of anti-phishing mechanisms.
Read moreMorton Swimmer reports on two security conferences of the more hands-on nature: the 24th Chaos Communication Congress in Berlin, Germany, and Black Hat DC in Washington, DC, USA.
Read more'We often hear from VB conference delegates that the networking opportunities at the conference are as valuable to them as the presentations themselves.' Helen Martin, Virus Bulletin
Read moreIn the final part of the series on exepacker blacklisting, Robert Neumann takes a look at how all the processing and analysis techniques are put into practice in a real-life situation.
Read more