An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
'Search engines are free, powerful and efficient tools that can be used to find vulnerabilities and hacked sites on the web, and even in your own organization.' Alex Eckelberry, Sunbelt Software.
Read moreThe latest offering from ESET is a multifunction home-user product. John Hawes was given the chance to take a look at ESET Smart Security just days before its official release - and found a product which promises to be formidable competition for the…
Read moreAndrew Lee (ESET)
Pierre-Marc Bureau (ESET)
Pierre-Marc Bureau and Andrew Lee examine the evolution of W32/Nuwar, the 'Storm worm', from its rather humble beginnings as a minor malware threat into one of the most bleeding-edge malware technologies currently affecting systems across the globe.
Read moreÁngela Blanco and Manuel Martín-Merino describe how anti-spam filters can be boosted by using an ensemble of SVM classifiers.
Read more'Why is the number of malicious attachments decreasing - and why shouldn't I be happy about it?' Paul Dickens, Institute of Physics Publishing.
Read moreJohn Hawes puts 10 anti-malware products through their paces on Novell NetWare 6.5.
Read moreThe blacklisting of exepackers by AV products is a controversial subject with opinions among the AV community varying widely. Gabor Szappanos takes a balanced view and discusses the pros and cons of exepacker detection.
Read moreBy blocking port 25 at the firewall, an organization can prevent a mass-mailer from spreading. However, by blindly blocking outgoing SMTP traffic, valuable data is lost on threats that use port 25. Vinoo Thomas and Nitin Jyoti discuss the benefits of…
Read moreIn the conclusion of his two-part article presenting an up-to-date evaluation of the security of OpenOffice, Eric Filiol looks at security issues in OpenOffice integrity management and draws conclusions about the overall security of OpenOffice.
Read moreHelen Martin reports on three packed days of presentations, networking, a little bit of gambling and a lot of fun at VB2007 in Vienna.
Read more