ISSUE 26

ISSUE 26 (June, 2010)

PCI Security

Issue 26 Contributors

Mayank Aggarwal
Security researcher at Global Threat Center, SMobile Systems
Rishita Anubhai
Web Security Researcher at Blueinfy
Shivang Bhagat
Security Consultant at Blueinfy
Anton Chuvakin
Log management and PCI DSS compliance expert
David Crowder
CEO of Pramana
Matt Erasmus
Info-sec professional
Matt Grantham
Network security engineer
Max Huang
Founder and CEO of O2Security
Rick Kam
President and Founder of ID Experts
Nick Lowe
Head of Western Europe sales for Check Point
Jerry Mangiarelli
IT Security Specialist with TD Bank Financial Group
Ulf T. Mattsson
CTO of Protegrity
Dimitri McKay
Security Architect at LogLogic
Dave Olander
SVP Engineering at Xceedium
Didier Stevens
IT Security Consultant at Contraste Europe NV

Table of contents

  • PCI: Security’s lowest common denominator
  • Analyzing Flash-based RIA components and discovering vulnerabilities
  • Logs: Can we finally tame the beast?
  • Launch arbitrary code from Excel in a restricted environment
  • Placing the burden on the bot
  • Data breach risks and privacy compliance
  • Authenticating Linux users against Microsoft Active Directory
  • Hacking under the radar
  • iPhone backup, encryption and forensics

(IN)SECURE Magazine archive

show all