Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

When malware meets rootkits

Elia Florio takes a detailed look at the rootkit technique known as 'DKOM using \Device\PhysicalMemory'

Read more  

Thoughts of mass destruction

Years after Chernobyl was released, the potential for hardware-destroying viruses has yet to be fully exploited.

Read more  

Inside Sony’s rootkit

Mark Russinovich describes the rootkit discovery that ignited a firestorm of criticism for Sony.

Read more  

Exploring the x64-treme heights of the Internet

Costin Raiu (Kaspersky Lab)

With its 64-bit Internet Explorer, Microsoft seems to have shipped a version that is relatively safe from malware, but will its lack of support for ActiveX controls, Java, Shockwave and PDFs simply drive users back to the malware-friendly 32-bit…

Read more  

In Dublin's fair city

VB2005 was a double record breaker - Virus Bulletin's longest and largest conference to date. We were delighted to welcome well over 360 delegates to The Burlington hotel in Dublin for the debut of the event's new longer format - and, for the second…

Read more  

The false positive disaster: Anti-Virus vs Winrar & Co

Andreas Marx (AV-TEST)

Andreas Marx reports on his extensive false positive testing of anti-virus software.

Read more  

IME as a possible keylogger

Using components of Windows multilingual support, it is possible to create a file that will capture keystrokes on a target system while using the OS to protect that file from removal or deletion. Masaki Suenaga explains how an IME could be used as a…

Read more  

In response to review comments

Kaspersky's David Emm comments on the KAV 5.0 writeup from last month's comparative review. Virus Bulletin's Matt Ham responds.

Read more  

NOD32 for Windows NT/2000/XP/2003/X64 with centralized management

Matt Ham Reviews the latest offering from Eset - NOD32 for Windows NT/2000/XP/2003/X64 with centralized management

Read more  

Is the boot on the other foot?

It adds insult to injury when the major media outlets misrepresent the facts.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.