Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Search engines in research and vulnerability assessment

'Search engines are free, powerful and efficient tools that can be used to find vulnerabilities and hacked sites on the web, and even in your own organization.' Alex Eckelberry, Sunbelt Software.

Read more  

ESET Smart Security

The latest offering from ESET is a multifunction home-user product. John Hawes was given the chance to take a look at ESET Smart Security just days before its official release - and found a product which promises to be formidable competition for the…

Read more  

Malware storms: a global climate change

Andrew Lee (ESET)
Pierre-Marc Bureau (ESET)

Pierre-Marc Bureau and Andrew Lee examine the evolution of W32/Nuwar, the 'Storm worm', from its rather humble beginnings as a minor malware threat into one of the most bleeding-edge malware technologies currently affecting systems across the globe.

Read more  

Boosting email anti-spam filters using an ensemble of SVM classifiers

Ángela Blanco and Manuel Martín-Merino describe how anti-spam filters can be boosted by using an ensemble of SVM classifiers.

Read more  

Gateway scanning is not enough!

'Why is the number of malicious attachments decreasing - and why shouldn't I be happy about it?' Paul Dickens, Institute of Physics Publishing.

Read more  

VB comparative review: Novell NetWare 6.5

John Hawes puts 10 anti-malware products through their paces on Novell NetWare 6.5.

Read more  

Exepacker blacklisting

The blacklisting of exepackers by AV products is a controversial subject with opinions among the AV community varying widely. Gabor Szappanos takes a balanced view and discusses the pros and cons of exepacker detection.

Read more  

The need for an in-house SMTP honeypot

By blocking port 25 at the firewall, an organization can prevent a mass-mailer from spreading. However, by blindly blocking outgoing SMTP traffic, valuable data is lost on threats that use port 25. Vinoo Thomas and Nitin Jyoti discuss the benefits of…

Read more  

OpenOffice security and viral risk – part two

In the conclusion of his two-part article presenting an up-to-date evaluation of the security of OpenOffice, Eric Filiol looks at security issues in OpenOffice integrity management and draws conclusions about the overall security of OpenOffice.

Read more  

Oh, Vienna!

Helen Martin reports on three packed days of presentations, networking, a little bit of gambling and a lot of fun at VB2007 in Vienna.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.