An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

VB2015 paper: The Unbearable Lightness of APTing

Yaniv Balmas (Check Point Software Technologies)
Shahar Tal (Check Point Software Technologies)
Ron Davidson (Check Point Software Technologies)

APT campaigns are typically described with awe surrounding the technical achievements enabled by the level of resources and capacity conceivably available only to nation-state governments and intelligence agencies, often dubbed APT groups. These…

Read more  

VB2015 paper: Android Ransomware: Turning CryptoLocker into Crypto Unlocker

Alexander Adamov (NioGuard Security Lab)

These days, we see an increasing number of new pieces of ransomware for Android devices. They adopt new social engineering, communication and encryption techniques such as the use of Tor and advanced encryption algorithms (RSA-1024 and even elliptic…

Read more  

Throwback Thursday: A View from the Lab (October 1997)

In mid-1997, new viruses and variants were appearing at over 250 per month, and according to Peter Morley, "Any organization which cannot process 300 viruses per month in times of stress, has no chance of keeping in the game." He split anti-virus…

Read more  

Optimizing ssDeep for use at scale

Being able to find files that are similar to a particular file is quite useful, although it can be difficult to handle at scale. It can often require an infeasible number of comparisons, which need to take place outside of a database. In an attempt…

Read more  

Throwback Thursday: Legal attempts to reduce spam. A UK perspective (November 2003)

In November 2003, Martin Lee summarized from a UK perspective the various legislative attempts to ban the abuse of email by law.

Read more  

Throwback Thursday: What DDoS it all Mean? (March 2000)

In February 2000, distributed denial of service, or DDoS, attacks disrupted some of the largest websites – CNN, MSN, Yahoo and others – sites designed to serve millions of pages per day. So Nick FitzGerald asked: what are DDoS attacks? How might they…

Read more  

3ROS exploit framework kit – one more for the infection road!

Aditya K. Sood and Rohit Bansal look at a different side of an exploit kit: the interface used by the malware authors who rely on exploit kits to get their malware installed on victims' machines.

Read more  

Shifu – the rise of a self-destructive banking trojan

The banking trojan Shifu appears to inherit some of its features from several other well-known banking trojans. Floser Bacurio and Wayne Low decided to take a close look at one of its droppers.

Read more  

Throwback Thursday: Memetic Mass Mailers: Time to Classify Hoaxes as Malware? (July 2002)

In July 2002, Andrew Lee explained why an effective hoax could be as damaging as a mass-mailed fast-burning virus, and questioned whether we should begin to classify hoaxes as malware.

Read more  

Throwback Thursday: The Real Virus Problem (December 1993)

Thanks mainly to the marketing efforts of the anti-virus industry around the world, in 1993 the true extent of the computer virus problem has been efficiently concealed beneath a ragbag of pseudo-scientific projections, surveys, reports, forecasts…

Read more  

Search the Bulletin

Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.