• Show by years
  • ISSUE 40 (December, 2013)

    • How malware became the cyber threat it is today
    • Testing anti-malware products
    • Shoulder surfing via audio frequencies for XBox Live passwords
    • How to write Yara rules to detect malware
    go to issue
  • ISSUE 39 (September, 2013)

    • Dear CSO, do you know how to build security culture?
    • How to secure a company’s Chinese development center?
    • The state of web application security in numbers
    • Web application exploitation with broken authentication and path traversal
    go to issue
  • ISSUE 38 (June, 2013)

    • Becoming a computer forensic examiner
    • UEFI secure boot: Next generation booting or a controversial debate
    • How to detect malicious network behavior
    • What startups can learn from enterprise level data security tactics
    go to issue
  • ISSUE 37 (March, 2013)

    • Becoming a malware analyst
    • Five questions for Microsoft’s Chief Privacy Officer
    • Application security testing for AJAX and JSON
    • Penetrating and achieving persistence in highly secured networks
    go to issue
  • ISSUE 36 (December, 2012)

    • What makes security awareness training successful?
    • Five questions for Microsoft’s Worldwide Chief Security Advisor
    • Computer forensic examiners are from Mars, attorneys are from Venus
    go to issue
  • ISSUE 35 (December, 2012)

    • Administrative scripting with Nmap
    • Information security in Europe with ENISA Executive Director Prof. Udo Helmbrecht
    • Unintended, malicious and evil applications of augmented reality
    • The enemy at the gate
    go to issue
  • ISSUE 34 (June, 2012)

    • Fitness as a model for security
    • Security and migrating to the cloud: Is it all doom and gloom?
    • Solid state drives: Forensic preservation issues
    • Introduction to Android malware analysis
    go to issue
  • ISSUE 33.5 (March, 2012)

    Special issue focused on RSA Conference US 2012.

    go to issue
  • ISSUE 33 (February, 2012)

    • Securing Android: Think outside the box
    • Interview with Joe Sullivan, CSO at Facebook
    • White hat shellcode: Not for exploits
    • Using mobile device management for risk mitigation in a heterogeneous environment
    • Metasploit: The future of penetration testing with HD Moore
    • Using and extending the Vega open source web security platform
    • Next-generation policies: Managing the human factor in security
    go to issue
  • ISSUE 32 (December, 2011)

    • 7 questions you always wanted to ask a professional vulnerability researcher
    • Insights on drive-by browser history stealing
    • PacketFence: Because NAC doesn’t have to be hard!
    • Information security and the threat landscape with Raj Samani
    go to issue
  • Show by years