An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
Round-up of some of the security industry's predictions for the year ahead.
Read moreThe untimely death of security researcher Péter Ször sent shockwaves across anti-malware community last month. Some of those who knew him best pay tribute to a brilliant mind and a true gentleman.
Read moreEddy Willems presents a round up of the 22nd EICAR Conference, held in Hannover last month.
Read moreViruses for Java are relatively rare, and parasitic viruses for Java are even rarer. The Java/Handjar virus infects Java applications by placing its virus code inside a JAR file and including a reference to the virus class file. Peter Ferrie has the…
Read moreUK starts recruitment for Cyber Reserve Unit; India plans to increase number of reverse engineering professionals.
Read moreFinnish Ministry of Foreign affairs breached over four-year period.
Read moreOnly 17% of respondents in Ernst & Young survey say their company’s information security function fully meets the needs of their organization.
Read morePython obfuscation is relatively rare. In the latest of his ‘Greetz from academe’ series, highlighting some of the work going on in academic circles, John Aycock takes a look at a research paper in which the authors reverse engineered a 'hardened'…
Read moreNeurevt is a relatively new HTTP bot that already has a lot of functionalities along with an extendable and flexible infrastructure. Zhongchun Huo takes a detailed look at its infrastructure, communication protocol and encryption scheme.
Read moreWhen one has a nice idea – such as a tricky method for encoding data – it is common to take that idea and improve on it. It is rare to see someone take such an idea and degenerate it, but that’s exactly what we see in W32/Tussie.B. Peter Ferrie…
Read more