An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
'Anyone who writes even one example of a piece of malware, exploit or rootkit feels qualified to call himself a security researcher.' Aleksander Czarnowski, AVET, Poland.
Read moreWindows Vista x64 provided a rough terrain for AV products in the latest round of VB100 comparative testing. John Hawes has the full details of the products that made the grade and those that fell short.
Read moreSorin Mustaca provides a roundup of this year's EU Spam Symposium.
Read moreJohn Graham-Cumming has the details of France's new national anti-spam service, Signal Spam.
Read moreJohn Hawes takes a detailed look at Avira's home-user internet security setup.
Read more'The WildList is more pertinent than ever - particularly given today's threat landscape.' Mary Landesman, About.com.
Read morePeter Ferrie describes TIOS/Tigraa, a virus that runs on Texas Instruments calculators.
Read moreAndrew Walenstein (University of Louisiana at Lafayette)
Arun Lakhotia (University of Louisiana at Lafayette)
Michael Venable and colleagues explain how program-matching techniques can help in triage, in-depth malware analysis and signature generation.
Read moreJessica Baumgart, an active blogger since April 2003, has contributed to a variety of weblogs on at least seven different platforms, helps lead a support group for bloggers, and eagerly deletes spam. In this article she describes the lesser-known,…
Read more