Wednesday, August 04, 2010

August issue of Hakin9: Securing the Cloud

August issue of Hakin9: Securing the Cloud

New issue of Hakin9 magazine already available!

Inside:
  • Prey: A New Hope by Mervyn Heng
  • An introduction to Reverse Engineering: Flash, .NET by Nilesh Kumar
  • Web Malware - Part 1 by Rajdeep Chakraborty
  • Cyber warfare with DNSbotnets by Francisco Alonso
  • Search Engine Security and Privacy by Rebecca Wynn
  • Securing the Cloud: Is it a Paradigm Shift in Information Security? by Gary Miliefsky
  • Radio Frequency-enabled Identity Theft by Julian Evans
  • Intelligence Monopolies by Matthew Jonkmann
  • Special Report: Capturing the New Frontier: How To Unlock the Power of Cloud Computing by Mike Armistead

Is Prey: A New Hope
Mervyn Heng
Misplaced your laptop or had it stolen? You are not alone.Dell and the Ponemon Institute collaborated on a study with 106 United States airports as well as over 800 business travelers to ascertain the frequency with which laptops are lost in airports.

An introduction to Reverse Engineering: Flash, .NET
Nilesh Kumar
This article is about the demonstration of Reversing of Flash and .NET applications. This is an introductory article showing basics of decompiling/ disassembling. In the first I have chosen to show reversing of Flash files and .NET files and how to patch them.

Web Malware - Part 1
Rajdeep Chakraborty
The Internet has been plagued by a variety of Malware that use the Web for propagation and as these threats loom around in the Internet it can infect even the smartest and the most tech savvy computer users.

Cyber warfare with DNSbotnets
Francisco Alonso
Botnets aren’t just a fad or items being sold and purchased like items on ebay, but are becoming carefully designed tools used for cyber war. In this article we will discuss what a Botnet is, and the next generation of Botnets over DNS.

Search Engine Security and Privacy
Rebecca Wynn
It’s no secret that search engines like Google, Yahoo, Bing (MSN) retain search data and metadata regarding searches. They are open about doing so. What’s unsure, though, is to what extent this creates a long-term threat to information security and privacy. This article briefly reviews what data is retained and stored by these search engines and what readers can do to protect their information.

Securing the Cloud: Is it a Paradigm Shift in Information Security?
Gary Miliefsky
First let me start by saying No. There’s really nothing new in the Cloud except where risk appears to shift. But does it really? I would argue that it increases your risk and there can be no shift of blame for a successful Cloud attack and breach of confidential data stored in the Cloud. You are ultimately responsible.

Contacts Us
[email protected]
Editor-in-Chief
Karolina LesiƄska
[email protected]

No comments: