An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
In early February, a new security project known as DMARC (Domain-Based Message Authentication, Reporting and Conformance) hit the headlines. The project involves some of the best known companies on the Internet and attempts to reduce email-based…
Read moreDroidDream is a fully fledged mobile bot once a mobile device is rooted, with the ability to install applications of choice, navigate to websites, add bookmarks to the browser, manipulate text and voice messages, and communicate with a remote command…
Read moreThe Dutch National Cyber Security Centre (NCSC) was officially opened in January. Wout de Natris looks at how the Dutch government aims to achieve a safe, open and stable information society, with a focus on public-private cooperation.
Read more'Companies and governments need to hack themselves first.' Jeremiah Grossman, WhiteHat Security.
Read moreMorton Swimmer reports from Europe's premier hacker event.
Read moreMartijn Grooten (Virus Bulletin)
As the migration to IPv6 slowly begins to happen, Martijn Grooten takes a look at the potential security issues that could occur with the switch to IPv6 and encourages the security industry to ready itself for those challenges.
Read moreIt’s not just graphic designers who can do interesting things with the Intel MMX instruction set. Virus writers are finding ways to (ab)use some of the instructions, too. Peter Ferrie has the details of W32/Svar.
Read moreDavid Harley (ESET)
‘Some security commentators suggest inventing answers to [security] questions rather than using real data.' David Harley.
Read moreEven in a mobile world, the principles of malware analysis remain the same. John Foremost takes us through the basic steps in the static analysis of mobile malware.
Read more