Infosecurity Magazine Features

  1. The Gods of Phishing

    Some phishing attempts are truly ethereal – near flawless representations of official communications. Others, however, are mere mortals. And then there’s the absolutely absurd. Esther Shein visits the pantheon of scammer emails

    1. Esther Shein

      Freelance Journalist

  2. Apple to Its iPhone Users: 'We've iPhound you'

    Apple recently got itself into some hot water over the fact that its iPhones were quietly logging their users' locations to a hidden and unencrypted datafile. Steve Gold, Infosecurity's technical editor, explains the fallout...

  3. The Rise and Fall of Online Credit Fraud

    While Chip and Pin technology has certainly decreased in-store fraud, it has also re-directed criminals’ attention to online banks and shoppers. Stephen Pritchard investigates what methods cybercriminals are using to steal credit card data, and reports on how the finance sector is fighting back

  4. Cybercrime Knows No Borders

    Prosecuting cybercrime is no easy task. Even with today’s forensic capabilities, legal inadequacies in various jurisdictions, not to mention uneven enforcement, make stemming the tide a rather daunting task. Lauren Moraski reports on the complications

  5. The World’s Dumbest Hackers

    The world’s smartest hackers are often the dumbest. Danny Bradbury introduces the seven deadly sins of hacking, and finds out what happens when a hacker’s heart rules their head

  6. Mob Mentalities: The World of Crowdsourced Software Development

    Many hands may make light work, but do they also introduce more risk? Danny Bradbury explores the thorny issue of security in crowdsourced software development

  7. Unsporting Espionage

    With the 2012 Olympics fast approaching, Davey Winder takes a look at the growing problem of IP espionage in the big, expensive world of sport…

  8. The Dirty Secrets of Green IT

    The recent push to save the planet from environmental catastrophe in some quarters has dovetailed nicely with organizations’ need to pare down budgets – making for some nice PR. But, as Wendy M. Grossman demonstrates, hiding behind some ‘green’ initiatives are increased security risks

  9. Spotlight on Cloud Computing: The Great Data Center Debate

    Handing over your data to a cloud provider may appear almost irresistible from a cost perspective, but what about the security and compliance concerns? Kevin Townsend examines both sides of the argument

  10. Spotlight on Cloud Computing: Security Risks in the Cloud

    The cost savings of cloud computing versus the anticipated security risks: it’s the broken record that seems to be on continuous loop for security professionals contemplating their strategy. Ted Kritsonis examines the key considerations

  11. Spotlight on Cloud Computing: Keeping Tabs on Your Data’s Address

    Location, location, location. It’s a slogan that has deep meaning for the real estate market, but it also maintains significant relevance to the regulatory and compliance risks associated with cloud computing in the era of globalization. Stephen Pritchard investigates

  12. Look Back and Move Forward

    The beginning of a new year is often a time for predictions or, sometimes, reassertions. Drew Amorosi revisits past prognostications from Infosecurity’s editorial board to assess its foretelling prowess, examine the year that was 2010, and gather some new projections for 2011 and beyond

  13. Joining forces to support the security profession

    In late 2010, three of the world’s leading global security organisations – ISF, (ISC)² and ISACA – released a set of 12 independent, non-proprietary security principles designed to help security practitioners respond more effectively to the changing needs of organisations in today’s complex, inter-connected world.

  14. Virtual Insanity

    Virtualization offers many benefits, but it also brings some security concerns, says Danny Bradbury

  15. Anti-virus: a technology update

    Anti-virus software might be the archetypal security product, but with so many high-profile malware attacks – including Stuxnet and Zeus – is it doing its job? Kevin Townsend investigates whether anti-virus software is still relevant

  16. Securing Your Home Office

    Here’s an interesting question for all you information security professionals out there: how secure is your home IT? No, seriously. There’s no doubting that you have a handle on keeping data secure across the enterprise alright, but how clued up are you away from the office where things are actually rather different in terms of both risk and response? Davey Winder investigates

  17. From the Eye of the Storm: 2011 Information Security Predictions

    Last January, Infosecurity magazine published prognostications by the (ISC)² Advisory Board of the Americas (ABA) regarding the information security field in 2010. Unlike many who have attempted to envision the future, the ABA has gone back and reviewed the accuracy of its predictions and provided a letter grade for each. The ABA will then offer new predictions for 2011.

  18. PCI update: Your guide to Version 2.0

    The PCI Security Standards Council released the latest version of its standards in October 2010. Stephen Pritchard looks at how businesses can bring their operations in line with the new requirements

  19. Lifting the Digital Fingerprints

    No matter what your business, it’s likely the audit man (or woman) will ring your door at least once. Ted Kritsonis gets advice on how to make this experience a bit more comfortable

  20. Cyberspace: The Fourth Arm of the Military?

    The Pentagon recently declared that its US Cyber Command unit was fully operational. Danny Bradbury finds out exactly what that means

What’s hot on Infosecurity Magazine?