Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Let’s kick some bot!

Martin Overton reviews Syngress's latest security title: 'Botnets - the killer web app'.

Read more  

AV industry commments on anti-malware testing

'Agreement was virtually unanimous that the WildList is no longer useful as a metric of the ability of a product to protect users' Randy Abrams, Eset.

Read more  

VB comparative review: Windows XP SP2

A bumper crop of 37 products were submitted for this month's VB100 comparative review on Windows XP. John Hawes has the details.

Read more  

Attacks on iPod

Péter Ször describes Podloso, the iPod Linux virus, and looks at other possible attacks on the iPod.

Read more  

ANI-hilate this week

The time between the announcement and exploitation of vulnerabilities continues to shrink - especially in the case of stack overflow vulnerabilities, which require very little skill to exploit. Peter Ferrie describes a prime example: the recent ANI…

Read more  

Nirbot: targeted attacks get personal

Nirbot gains its notoriety primarily from the cat fight in which its author has been engaged. Although keenly aware of the descriptions and blog entries posted about his creations, the author seems not to be so well versed on the naming conventions…

Read more  

MIT Spam Conference 2007

John Graham-Cumming provides a roundup of the papers and presentations at the fifth MIT Spam Conference.

Read more  

Trend Micro PC-cillin Internet Security 2007

John Hawes shares his experiences with Trend Micro's PC-cillin Internet Security suite.

Read more  

Securing the Web 2.0

'I believe that if the human factor is such a significant part of the problem, then it must also form part of the solution.' David Emm, Kaspersky Lab.

Read more  

Covert zombie ops

Can a botmaster send commands covertly to a botnet of over a million zombies and control them in real time? John Aycock considers how such a botmaster’s command channel might look.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.