Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

The life cycle of bots

Luis Corrons (Panda Security)

Having spent a lot of time thoroughly analysing how bots work – studying the overall bot ‘ecosystem’ as well as the individual files, Luis Corrons has noted that they've achieved a certain level of autonomy, in such a way that they almost have a life…

Read more  

OpenOffice security and viral risk – part one

Eric Filiol and Jean-Paul Fizaine report on the security weaknesses of the OpenOffice suite.

Read more  

BitDefender Total Security 2008

John Hawes takes an in-depth look at BitDefender's latest home-user offering, BitDefender Total Security 2008.

Read more  

Viva Las Vegas!

Andrew Lee (ESET)

VB sent roving reporters (aka anti-virus miscreants) Andrew Lee and David Perry to the Nevada desert for five days of non-stop hardcore computer security at the Black Hat Briefings and hacker convention DEFCON 15. Andrew Lee reports on Black Hat, and…

Read more  

AV is alive and well

'Both the disease and the cure now differ significantly from their original forms.' David Emm, Kaspersky Lab.

Read more  

Friendly whitelisting and other innovations: a response

Chief Security Officer for Bit9, Ian Poynter continues the conversation started last month by Dr Vesselin Bontchev about whitelisting as an endpoint security technology, and explores some of the questions he raised.

Read more  

Fighting spam using tar pits

Tobias Eggendorfer describes how both SMTP and HTTP tar pits offer interesting ways of helping to get rid of spam.

Read more  

Are you invisible?

'Anyone who writes even one example of a piece of malware, exploit or rootkit feels qualified to call himself a security researcher.' Aleksander Czarnowski, AVET, Poland.

Read more  

VB comparative review: Windows Vista x64 Business Edition

Windows Vista x64 provided a rough terrain for AV products in the latest round of VB100 comparative testing. John Hawes has the full details of the products that made the grade and those that fell short.

Read more  

Profiling binaries for instrumentation

Instrumenting binaries is a technique that is rapidly gaining popularity among security researchers. Profiling the binary beforehand can provide a lot of important information about the target, as Aleksander Czarnowksi explains.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.