Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Android SMS trojans: new platform, ‘old’ tricks

Denis Maslennikov (Kaspersky Lab)

August 2010 saw the appearance of the first piece of malware for the Android mobile platform. Denis Maslennikov examines three variants of the FakePlayer SMS trojan.

Read more  

Case study: the Ibank trojan

Alisa Shevchenko sheds some light on the technology of online banking fraud with an indepth analysis of the Ibank trojan which targets a wide variety of Russian online banking technologies.

Read more  

VB ‘securing your organization in the age of cybercrime’ Seminar

Helen Martin reports from the first VB Seminar in London.

Read more  

Deelaed learning

Over a period of around three months, new virus writer hh86 produced a handful of viruses using some new techniques - then disappeared without a word. Peter Ferrie details her creations.

Read more  

Vancouver expedition

The 20th VB conference drew to a close last month in the beautiful city of Vancouver. Helen Martin reports on the presentations, games, awards, birthday cakes, and the buzzword of the event: Stuxnet.

Read more  

Anti-unpacker tricks – part fourteen

Last year, a series of articles described some tricks that might become common in the future, along with some countermeasures. In this final article of the series we look at anti-unpacking by anti-emulating.

Read more  

Worldwide anti-botnet initiatives

‘Germany was the first country to launch a large-scale malware-cleaning project backed by the government.’ Sorin Mustaca, Avira

Read more  

Exploit identification

In previous articles Mark Davis introduced exploit frameworks such as Fragus, Tornado, and others, and described how to analyse them using LAMP/WAMP servers. Here, he walks through a Tornado kit, start to finish, showing the process required to…

Read more  

Letters

Letters to the editor on the relevance of spam feeds and the earning potential of cybercrime.

Read more  

Wot no comparative?

VBSpam comparative results postponed.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.