An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Tumours and polips

The W32/Polip virus caught the AV industry by surprise recently – we didn't expect to see a parasitic virus, and we certainly didn't expect to see anything of such apparent complexity. However, looks can be deceiving. Peter Ferrie reveals all.

Read more  

Fixing 'the virus problem'?

Andrew Lee (ESET)

'Will the new security features in Windows Vista fix the virus problem?' was the question that nearly knocked Andrew Lee off his seat in surprise. Once he had recovered his composure, he decided to provide a more detailed answer than the simple,…

Read more  

Math baloney: yet another first

In April 2006 a virus appeared for a new virusable platform - the general-purpose, mathematics-oriented MatLab. Vesselin Bontchev provides us with the full details of the unremarkable and slightly buggy proof-of-concept virus MLab/Balogy.A.

Read more  

From the bedroom to the bank – IT threats evolve

'Phishing levels ... are expected to rise again due to the adoption of spear-phishing techniques.' Mark Sunner, MessageLabs.

Read more  

VB Comparative: Windows XP - June 2006

In Matt Ham's final comparative review for Virus Bulletin he puts 26 products for Windows XP through their paces. Two products enter the test line-up for the first time this month: TrustPort Antivirus and the rather more well-known Microsoft OneCare.…

Read more  

EICAR 2006 in a nutshell

Eddy Willems provides a roundup of this year's EICAR conference.

Read more  

Inside the PE file format

Sanjay Katkar describes how recent malicious programs have exploited the PE file format, manipulating the header fields to avoid detection.

Read more  


John Graham-Cumming describes the aims and ideas behind the SpamOrHam project.

Read more  

Malware Penetration Index: a new virus metric

Oren Drori and Nicky Pappo introduce their new model for calculating malware penetration probability during an outbreak.

Read more  

Don’t bring a knife to a gunfight

'The industry needs to look at what can be done to increase its defences, and provide innovative solutions.' Joshua Corman, Internet Security Systems.

Read more  

Search the Bulletin

Bulletin Archive