ISSUE 3 (August 2005)
PDA attacks
ISSUE 3
Issue 3 Contributors
Robert Buljevic
Security consultant working for Mack IT
Gerhard Eschelbeck
CTO for Qualys
Matthew Fisher
Senior Security Engineer for SPI Dynamics
Seth Fogie
VP for Airscanner.com
Melisa LaBancz-Bleasdale
Communications consultant
William Lynch
Senior Consultant for Computer Task Group’s Information Security Services Practice
Stephen Toulouse
Security program manager of the Microsoft Security Response Centre (MSRC)

PDA attacks

PDF download
Read issue 3 now
Share

Table of contents

  • Security vulnerabilities, exploits and patches
  • PDA attacks: palm sized devices – PC sized threats
  • Adding service signatures to Nmap
  • CSO and CISO – perception vs. reality in the security kingdom
  • Unified threat management: IT security’s silver bullet?
  • The reality of SQL injection
  • 12 months of progress for the Microsoft Security Response Centre
  • Interview with Michal Zalewski, security researcher
  • OpenSSH for Macintosh
  • Method for forensic validation of backup tape

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue