Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

ANI-hilate this week

The time between the announcement and exploitation of vulnerabilities continues to shrink - especially in the case of stack overflow vulnerabilities, which require very little skill to exploit. Peter Ferrie describes a prime example: the recent ANI…

Read more  

Magical lights shine on you

'The use of trojans to gather evidence has previously been proposed by law enforcers in Sweden, the Netherlands, Denmark and the USA ... However, there is something of an obstacle for all magic lantern projects: the anti-malware industry has the…

Read more  

VB comparative review: Novell SUSE Linux Enterprise Server 10

In this month's VB100 test we put 16 AV products through their paces on SUSE Linux. John Hawes has the details of how each of them fared.

Read more  

(In)justice in the digital age

The recent Julie Amero court case has raised a number of concerns regarding computer security, investigation and liability. Who is responsible when a person uses a computer that is infected with malicious software? Can the user be liable even when…

Read more  

Wormhole attacks Solaris station

The Wanuk worm, written for the Solaris platform, was unusual in that its author paid a lot of attention to detail with his creation, and even included error checks at each step - however, at least one bug slipped through. Costin Ionescu has the full…

Read more  

Testing times ahead?

Richard Ford (Florida Institute of Technology)

What lies ahead for anti-virus testing programmes with the introduction of new protection schemes that move away from scanner-based detection? Richard Ford and Attila Ondi look to the future of AV testing.

Read more  

An African A-F-F-air...

Martin Overton revisits the topic of 419 scams, cataloguing some of the changes seen over the last few years.

Read more  

Letter to the editor: The strange case of Julie Amero

'As things currently stand, anyone who has pornographic images appearing on their screen as a result of malware on their PC, or being trapped in a continuous pop-up loop, is at risk of conviction if there are minors in the vicinity.' Alex Shipp,…

Read more  

AEC TrustPort Workstation

John Hawes takes an indepth look at AEC's TrustPort Workstation.

Read more  

Darknet monitoring

Jose Nazario (Arbor Networks)

'Monitoring darknet traffic yields great visibility into what threats are present.’ Jose Nazario, Arbor Networks.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.