An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
In the latest of his ‘Greetz from Academe’ series, highlighting some of the work going on in academic circles, John Aycock looks at a paper that describes how malicious apps can be slipped past Apple’s app review process.
Read moreIt is not uncommon, nowadays, for businesses to outsource their marketing to third parties - but sometimes, such business links lead to malicious activities. Ke Zhang dissects a piece of malware that generates referrer spam for a ‘web search site’…
Read moreMomentous changes are in the pipeline for VB – with an exciting future ahead. Helen Martin announces the changes that are in store for the publication and the company.
Read moreSolarbot, a.k.a. Dapato or Napolar, is a traditional botnet that has been around for a while. It is used for spreading other malware and often comes with built-in DDoS and proxy modules. He Xu takes a closer look.
Read moreLast month, Peter Ferrie described a Windows virus that turns Java class files into droppers for the virus, and concluded that it would be a simple matter to reverse that: for a virus writer to create a Java class file that turns Windows files into…
Read more‘There is a shift occurring in the security space around incident response. It’s becoming clear that no organization is completely safe.' Tim Armstrong
Read moreResearch suggests ransomware is more prevalent than previously thought.
Read moreCisco launches competition to help with securing the Internet of Things.
Read moreEnergy and utility companies are being turned down when requesting insurance cover for cyber attacks because their defences are perceived to be too weak.
Read moreSecurity firm finds millions of stolen credentials and email addresses on the black market.
Read more