An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.
'The main trend I have observed this year has been the spread of malware activity across several forms of technology and applications.' Eddy Willems.
Read moreFewer than half the products submitted for this VB100 review on Windows 2000 made the grade - largely thanks to some pesky polymorphic file infectors and a rash of false positives. John Hawes has all the details.
Read moreReza Rajabiun considers the implications of spam for developing countries and the persistence of the digital divide.
Read moreIn the second installment of this three-part series on exepacker blacklisting, Robert Neumann provides a more detailed look at the different types of blacklisting and describes the tools that are available for analysis.
Read moreAditya Kapoor (McAfee)
Rachit Mathur and Aditya Kapoor present an analysis of the techniques used by the Tibs packer and describes the reasons for its prolonged effectiveness.
Read more'Search engines are free, powerful and efficient tools that can be used to find vulnerabilities and hacked sites on the web, and even in your own organization.' Alex Eckelberry, Sunbelt Software.
Read moreThe latest offering from ESET is a multifunction home-user product. John Hawes was given the chance to take a look at ESET Smart Security just days before its official release - and found a product which promises to be formidable competition for the…
Read moreAndrew Lee (ESET)
Pierre-Marc Bureau (ESET)
Pierre-Marc Bureau and Andrew Lee examine the evolution of W32/Nuwar, the 'Storm worm', from its rather humble beginnings as a minor malware threat into one of the most bleeding-edge malware technologies currently affecting systems across the globe.
Read moreTrojan.Srizbi is the first example seen in the wild of a complex piece of malware that operates fully from kernel mode. Kimmo Kasslin and Elia Florio provide a detailed analysis.
Read more'Whitelisting is currently nothing more than (admittedly careful and extensive) inverted blacklisting by AV software.' Gabor Szappanos, VirusBuster.
Read more