Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

IM_a nuisance – W32.Imav.A

Two years after its emergence the Beagle family is still one of the most pervasive families of Internet worms. John Canavan takes a close look at one variant that has made the surprising switch from email to ICQ as its major infection vector.

Read more  

Proxies for the underworld: I-Worm.Locksky.AS

The Locksky email worm first appeared in October 2005. Its aim is to install proxies on victims' machines, which can then be sold. Ferenc Laszlo Nagy has the details.

Read more  

Solving the metamorphic puzzle

Metamorphic viruses have posed a challenge for the anti-virus industry for quite some time. This article focuses on a number of metamorphic techniques and highlights different methods for detecting them.

Read more  

Improving proactive detection of packed malware

Dynamic translation is a technique that can be used instead of emulation for decrypting complex malware. Adrian Stepan describes how the technique can also be used to perform generic unpacking.

Read more  

Changes to the VB test sets

VB's product reviewer Matt Ham describes some changes to the test sets used for VB's comparative reviews.

Read more  

How can a web filter add proactive security?

Steen Pedersen explains how the perimeter defence layer can be enhanced with the use of a web filter.

Read more  

Not worthy

Peter Ferrie has the details of MSIL/Idonus.

Read more  

Signature updates vs BCP

Aleksander Czarnowski (AVET Information and Network Security)

Would you ever expect a well established anti-virus company to fail to provide you with signature updates? Would your company's security policy be ready to deal with such a situation?

Read more  

Inside the Windows Meta File format

The Windows Meta File (WMF) format has received a lot of attention over recent weeks. Peter Ferrie looks at why.

Read more  

What threats may come

'A serious threat in 2006 will be multi-stage, targeted phishing attacks.' Tomer Honen, Aladdin Knowledge Systems.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.