security threat

ciso_summit_logo800px (3)

CISO Summit 2013

The CISO Summit, December 3-4, 2013, in Scottsdale, Ariz., is the premier stage for C-suite decision-makers to share insight on information security issues, while…

Hakin9 Mobile Cover

Hakin9 Mobile 1/11 (1)

Android Insecurities by Joey Peloquin The article will begin with a focus on what the author calls Offensive Mobile Forensics, an analysis technique that…

Hacking RFID

Hacking RFID 8/2011

Latest News From the IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Security by Hiding! By Ali Hadi I was once…

ninja cover

Review of Ninja Hacking

Review of Ninja Hacking Unconventional Penetration Testing Tactics and Techniques By Michael Munt www.syngress.com   This is an unusual title for a book that…

Cloud Security 05/2011

Cloud Security 05/2011

In brief Armando Romeo and ID Theft Protect A Beginners Guide to Ethical Hacking – review SHYAAM SUNDHAR Coranti – review MICHAEL MUNT IPv6…