Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Spam and the digital divide

Reza Rajabiun considers the implications of spam for developing countries and the persistence of the digital divide.

Read more  

Exepacker blacklisting part 2

In the second installment of this three-part series on exepacker blacklisting, Robert Neumann provides a more detailed look at the different types of blacklisting and describes the tools that are available for analysis.

Read more  

Exploring the evolutionary patterns of Tibs-packed executables

Aditya Kapoor (McAfee)

Rachit Mathur and Aditya Kapoor present an analysis of the techniques used by the Tibs packer and describes the reasons for its prolonged effectiveness.

Read more  

Something smells fishy

The author of MSIL/Yakizake claimed that ‘very few implementations of multi-platform malware exist up until now'. Peter Ferrie lists a dozen multi-platform viruses and explains why Yakizake does not qualify for the category.

Read more  

Blow up your video

These days we are used to seeing interactive multimedia content on websites - but unfortunately it is possible for these file formats to contain more than one might expect. Christoph Alme and Dennis Elser present a round-up of recent multimedia…

Read more  

Evading SpamAssassin with obfuscated text images

Battista Biggio and colleagues assess the performance of popular open source spam filter SpamAssassin against image spam with obfuscated text.

Read more  

Birds of a feather...

The AVIEN Malware Defense Guide has been written by members of the AVIEN/AVIEWS online communities with the aim of passing on knowledge that they believe will be both interesting and useful to those involved in the real-world battle against malware…

Read more  

Anonymous proxies: the threat to corporate security enforcement

The popularity of anonymous proxies is rising rapidly, as is the number of sites offering anonymous proxy services, but what impact do they have on corporate security? Rony Michaely explains the risks.

Read more  

Search engines in research and vulnerability assessment

'Search engines are free, powerful and efficient tools that can be used to find vulnerabilities and hacked sites on the web, and even in your own organization.' Alex Eckelberry, Sunbelt Software.

Read more  

ESET Smart Security

The latest offering from ESET is a multifunction home-user product. John Hawes was given the chance to take a look at ESET Smart Security just days before its official release - and found a product which promises to be formidable competition for the…

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.