An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
While not technically a new virus (being modelled on the almost ancient Tenrobot family), W32/Virtu does introduce some interesting changes and new techniques. Víctor Álvarez and Mario Ballano describe this polymorphic file infector that also behaves…
Read more'The use of trojans to gather evidence has previously been proposed by law enforcers in Sweden, the Netherlands, Denmark and the USA ... However, there is something of an obstacle for all magic lantern projects: the anti-malware industry has the…
Read moreIn this month's VB100 test we put 16 AV products through their paces on SUSE Linux. John Hawes has the details of how each of them fared.
Read moreThe recent Julie Amero court case has raised a number of concerns regarding computer security, investigation and liability. Who is responsible when a person uses a computer that is infected with malicious software? Can the user be liable even when…
Read moreThe Wanuk worm, written for the Solaris platform, was unusual in that its author paid a lot of attention to detail with his creation, and even included error checks at each step - however, at least one bug slipped through. Costin Ionescu has the full…
Read moreRichard Ford (Florida Institute of Technology)
What lies ahead for anti-virus testing programmes with the introduction of new protection schemes that move away from scanner-based detection? Richard Ford and Attila Ondi look to the future of AV testing.
Read moreMartin Overton revisits the topic of 419 scams, cataloguing some of the changes seen over the last few years.
Read moreJohn Hawes takes an indepth look at AEC's TrustPort Workstation.
Read moreJose Nazario (Arbor Networks)
'Monitoring darknet traffic yields great visibility into what threats are present.’ Jose Nazario, Arbor Networks.
Read moreThe latest edition to the W32/Chiton family is a malicious plug-in for one of the most popular tools of the anti-malware trade: the IDA disassembler and debugger. Peter Ferrie provides the details.
Read more