Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Assessment war: Windows services

In the world of Web 2.0, Java, .NET and other hot technologies we are often guilty of forgetting about the core components that make it all possible. Aleksander Czarnowski describes a simple attack scenario based on a high-privilege Windows service…

Read more  

Predictions about the prediction scam

The prediction scam has yet to make it into electronic format. A group of researchers from the University of Calgary get ahead of the game and explain how they believe it will work.

Read more  

Agnitum Outpost Security Suite Pro 2008

John Hawes discovers how firewall expert Agnitum has fared having added malware detection to its Outpost Security Suite product.

Read more  

Botnet monitoring

Despite the best efforts of the IT security industry it looks like the malicious bot is here to stay. Andrei Gherman looks at how botnet monitoring can provide information about bots as well as helping to keep the threat under control.

Read more  

A richer, but more dangerous web

'The accessing of media-rich, collaborative sites by employees is already cause for concern in terms of both employee productivity and security.' Mark Murtagh, Websense.

Read more  

2007: The year of the social engineer?

Martin Overton looks at how malware authors have started to borrow techniques from phishers.

Read more  

Inside rogue Flash ads

As malicious web ads become increasingly common, Dennis Elser and Micha Pekrul take a close look at a Flash advertising banner belonging to the SWF.AdHijack family.

Read more  

Rule-driven malware identification and classification

Over the last few years anti-virus researchers have faced an increasing volume of malware samples arriving at their research labs on a daily basis. Víctor Álvarez presents a simple, rule-driven approach to malware identification and classification…

Read more  

Blow up your video

These days we are used to seeing interactive multimedia content on websites - but unfortunately it is possible for these file formats to contain more than one might expect. Christoph Alme and Dennis Elser present a round-up of recent multimedia…

Read more  

A year of threats across several technologies

'The main trend I have observed this year has been the spread of malware activity across several forms of technology and applications.' Eddy Willems.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.