ISSUE 30(June, 2011)

  • Microsoft’s Enhanced Mitigation Experience Toolkitup?
  • Transaction monitoring as an issuer fraud risk management technique in the banking up?
  • card payment systemup?

  • IPv6: Saviour and threatup?
  • The hard truth about mobile application security: Separating hype from realityup?
go to issue

ISSUE 29(March, 2011)

  • Virtual machines: Added planning to the forensic acquisition process
  • Financial Trojans: Following the money
  • Mobile encryption: The new frontier
go to issue

ISSUE 27(September, 2010)

  • Review: BlockMaster SafeStick secure USB flash drive
  • The devil is in the details: Securing the enterprise against the cloud
  • Cybercrime may be on the rise, but authentication evolves to defeat it
go to issue

ISSUE 26(June, 2010)

  • PCI: Security’s lowest common denominator
  • Analyzing Flash-based RIA components and discovering vulnerabilities
  • Logs: Can we finally tame the beast?
go to issue

ISSUE 25(April, 2010)

  • The changing face of penetration testing: Evolve or die!
  • Cloud computing and recovery, not just backup
  • EJBCA: Make your own certificate authority
  • Advanced attack detection using OSSIM
go to issue

ISSUE 24(February, 2010)

  • Writing a secure SOAP client with PHP: Field report from a real-world project
  • How virtualized browsing shields against web-based attacks
  • Preparing a strategy for application vulnerability detection
  • Threats 2.0: A glimpse into the near future
go to issue

ISSUE 23(November, 2009)

  • Microsoft’s security patches year in review: A malware researcher’s perspective
  • A closer look at Red Condor Hosted Service
  • Study uncovers alarming password usage behavior
  • Elevating email to an enterprise-class database application solution
go to issue

ISSUE 22(September, 2009)

  • Using real-time events to drive your network scans
  • The Nmap project: Open source with style
  • A look at geolocation, URL shortening and top Twitter threats
  • Review: Data Locker
go to issue

ISSUE 21(June, 2009)

  • Malicious PDF: Get owned without opening
  • Review: IronKey Personal
  • Windows 7 security features: Building on Vista
  • Using Wireshark to capture and analyze wireless traffic
go to issue

ISSUE 20(March, 2009)

  • Improving network discovery mechanisms
  • Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus
  • What you need to know about tokenization
go to issue

ISSUE 19(December, 2008)

  • The future of AV: looking for the good while stopping the bad
  • Eight holes in Windows login controls
  • Extended validation and online security: EV SSL gets the green light
  • Web filtering in a Web 2.0 world
go to issue