An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
There are already at least two known 32-bit and 64-bit cross-infectors for Windows, but W32/W64.Amfibee is the first 32/64-bit cross-infector for Windows that is almost entirely a single block of code. Peter Ferrie explains more.
Read more‘The industry seems to be surprised when old attacks are repurposed on new systems.’ Tim Armstrong, Kaspersky Lab
Read morePhishing is a global problem, but there are some geographic variances. Sebastien Goutal presents a study of the phishing attacks typically seen in France.
Read moreBy packing their malicious executables, malware authors can be sure that when they are opened in a disassembler they will not show the correct sequence of instructions, thus making malware analysis a more lengthy and difficult process. Abhishek Singh…
Read moreSurvey shows rise in salary and overall job satisfaction for IT security workers.
Read moreUK intelligence agency recognizes eight centres of excellence in cyber security research.
Read moreAditya Sood and Richard Enbody analyse the details of the Google E-Card phishing campaign and its accompanying malicious binary to understand the propagation and distribution of the malware.
Read moreMATLAB may not be the first platform that comes to mind when talking about viruses, but with its vast collection of mathematical functions it lends itself to all kinds of problem-solving mischief. Peter Ferrie details the MLS/Mifeve virus.
Read moreCollaboration aims to promote the benefits of formal cybersecurity training and certification.
Read moreDamballa reports on stealth techniques used by six malware families to evade detection.
Read more