Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Spammers sued

Spammers in the US face charges.

Read more  

The TREC 2005 Spam Filter Evaluation Track

The 14th Text Retrieval Conference (TREC 2005) took place in November 2005. One of the highlights of the event was the TREC spam filter evaluation effort. Gordon Cormack has all the details.

Read more  

AVAR 2005: wired to wireless, hacker to cyber-criminal?

Righard Zwienenberg reports on the 8th annual AVAR conference in Tianjin, China.

Read more  

Ally in our defences

'Information is ... our lifeblood for details about computer threats, impact and activity.' Jeannette Jarvis, The Boeing Company.

Read more  

Cooperative heuristics

John D. Park attempts to teach an anti-virus scanner to 'think' like a human analyst.

Read more  

The real reason for the decline of the macro virus

Dr Vesselin Bontchev shares some of his expert knowledge and reveals the real reason for the decline of the macro virus.

Read more  

Inside the Microsoft script encoder

Peter Ferrie delves inside the Microsoft script encoder.

Read more  

VB Comparative: Windows Server 2003 Enterprise X64 version - December 2005

A somewhat disappointing total of nine vendors submitted their products for VB's first comparative review on a 64-bit operating system.

Read more  

When malware meets rootkits

Elia Florio takes a detailed look at the rootkit technique known as 'DKOM using \Device\PhysicalMemory'

Read more  

Thoughts of mass destruction

Years after Chernobyl was released, the potential for hardware-destroying viruses has yet to be fully exploited.

Read more  

Search the Bulletin


Bulletin Archive