Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Black Hat DC and CCC 24C3

Morton Swimmer reports on two security conferences of the more hands-on nature: the 24th Chaos Communication Congress in Berlin, Germany, and Black Hat DC in Washington, DC, USA.

Read more  

Home (page) renovations

'We often hear from VB conference delegates that the networking opportunities at the conference are as valuable to them as the presentations themselves.' Helen Martin, Virus Bulletin

Read more  

Exepacker blacklisting part 3

In the final part of the series on exepacker blacklisting, Robert Neumann takes a look at how all the processing and analysis techniques are put into practice in a real-life situation.

Read more  

Botherders herded

Botherder arrests, court appearances and convictions.

Read more  

29A folds

Virus writers hang up their hats.

Read more  

Pandex: the botnet that could

Pandex has attracted very little attention from the media and generated little discussion between malware researchers and among the general populace. Chandra Prakash and Adam Thomas provide an overview of the Pandex operation and take an in-depth…

Read more  

Malware vs. anti-malware: (how) can we still survive?

Andreas Marx (AV-TEST)

‘Well executed and comprehensive tests will light the way to better products.’ Andreas Marx, AV-Test.org

Read more  

VB comparative review: Windows Server 2003

John Hawes reports on the VB100 successes and failures of 27 anti-malware products tested on Windows 2003 Server.

Read more  

Crimea river

Peter Ferrie describes Crimea, a Linux virus that integrates its code with the host code, making it hard to find.

Read more  

How to disable WFP using physical disk information

Recently, a threat has appeared which obtains a file’s physical disk location information with the aid of the Windows system APIs, then proceeds to infect the corresponding system file. Ha Young Yang describes exactly how physical disk information is…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.