An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Luis Corrons (Panda Security)
Having spent a lot of time thoroughly analysing how bots work – studying the overall bot ‘ecosystem’ as well as the individual files, Luis Corrons has noted that they've achieved a certain level of autonomy, in such a way that they almost have a life…
Read moreEric Filiol and Jean-Paul Fizaine report on the security weaknesses of the OpenOffice suite.
Read moreJohn Hawes takes an in-depth look at BitDefender's latest home-user offering, BitDefender Total Security 2008.
Read moreAndrew Lee (ESET)
VB sent roving reporters (aka anti-virus miscreants) Andrew Lee and David Perry to the Nevada desert for five days of non-stop hardcore computer security at the Black Hat Briefings and hacker convention DEFCON 15. Andrew Lee reports on Black Hat, and…
Read more'Both the disease and the cure now differ significantly from their original forms.' David Emm, Kaspersky Lab.
Read moreChief Security Officer for Bit9, Ian Poynter continues the conversation started last month by Dr Vesselin Bontchev about whitelisting as an endpoint security technology, and explores some of the questions he raised.
Read moreTobias Eggendorfer describes how both SMTP and HTTP tar pits offer interesting ways of helping to get rid of spam.
Read more'Anyone who writes even one example of a piece of malware, exploit or rootkit feels qualified to call himself a security researcher.' Aleksander Czarnowski, AVET, Poland.
Read moreWindows Vista x64 provided a rough terrain for AV products in the latest round of VB100 comparative testing. John Hawes has the full details of the products that made the grade and those that fell short.
Read moreInstrumenting binaries is a technique that is rapidly gaining popularity among security researchers. Profiling the binary beforehand can provide a lot of important information about the target, as Aleksander Czarnowksi explains.
Read more