ISSUE 35(December, 2012)

  • Administrative scripting with Nmap
  • Information security in Europe with ENISA Executive Director Prof. Udo Helmbrecht
  • Unintended, malicious and evil applications of augmented reality
  • The enemy at the gate
go to issue

ISSUE 34(June, 2012)

  • Fitness as a model for security
  • Security and migrating to the cloud: Is it all doom and gloom?
  • Solid state drives: Forensic preservation issues
  • Introduction to Android malware analysis
go to issue

ISSUE 33(February, 2012)

  • Securing Android: Think outside the box
  • Interview with Joe Sullivan, CSO at Facebook
  • White hat shellcode: Not for exploits
  • Using mobile device management for risk mitigation in a heterogeneous environment
  • Metasploit: The future of penetration testing with HD Moore
  • Using and extending the Vega open source web security platform
  • Next-generation policies: Managing the human factor in security
go to issue

ISSUE 32(December, 2011)

  • 7 questions you always wanted to ask a professional vulnerability researcher
  • Insights on drive-by browser history stealing
  • PacketFence: Because NAC doesn’t have to be hard!
  • Information security and the threat landscape with Raj Samani
go to issue

ISSUE 30(June, 2011)

  • Microsoft’s Enhanced Mitigation Experience Toolkitup?
  • Transaction monitoring as an issuer fraud risk management technique in the banking up?
  • card payment systemup?

  • IPv6: Saviour and threatup?
  • The hard truth about mobile application security: Separating hype from realityup?
go to issue

ISSUE 29(March, 2011)

  • Virtual machines: Added planning to the forensic acquisition process
  • Financial Trojans: Following the money
  • Mobile encryption: The new frontier
go to issue

ISSUE 27(September, 2010)

  • Review: BlockMaster SafeStick secure USB flash drive
  • The devil is in the details: Securing the enterprise against the cloud
  • Cybercrime may be on the rise, but authentication evolves to defeat it
go to issue

ISSUE 26(June, 2010)

  • PCI: Security’s lowest common denominator
  • Analyzing Flash-based RIA components and discovering vulnerabilities
  • Logs: Can we finally tame the beast?
go to issue

ISSUE 25(April, 2010)

  • The changing face of penetration testing: Evolve or die!
  • Cloud computing and recovery, not just backup
  • EJBCA: Make your own certificate authority
  • Advanced attack detection using OSSIM
go to issue