Listed below is the maintained list of articles I've written freelance for various security-based print and online publications.
February 2023
Analyzing Mobile iOS Apps with VirusTotal Enterprise Online and macOS Ventura Locally
https://eforensicsmag.com/product/mastering-ios-forensics/
January 2023
Analyzing Malware Mobile Apps with VirusTotal Enterprise Online and Kali Linux Locally
https://eforensicsmag.com/product/understanding-mobile-forensics/
December 2022
Eschew Obfuscation, Espouse Elucidation
https://eforensicsmag.com/product/forensicanalysis/
November 2022
Malware in the Sky with Diamonds
https://eforensicsmag.com/product/corporate-forensic-investigations/
October 2022
XProCheck: When Necessity is the Mother of Reinvention
https://eforensicsmag.com/product/digital-forensic-tools/
November 2015
Case Study - Basic Malware Analysis using Kali
https://eforensicsmag.com/download/eforensics-open-the-unhackable-cloud/
December 2012
DIY Remote Mac OS X Watchdog
http://eforensicsmag.com/eforensics-network-32012/
September 1, 2017
The Recollection of an Operator : Operation Black Bag
https://www.linkedin.com/pulse/recollection-operator-operation-black-bag-israel-torres
August 15, 2017
Information Secrets III
https://www.linkedin.com/pulse/information-secrets-iii-israel-torres
August 5, 2017
Automation - The Good, the Bad and the Ugly
https://www.linkedin.com/pulse/automation-good-bad-ugly-israel-torres
April 16, 2017
Enter the Hand-Wave
https://www.linkedin.com/pulse/enter-hand-wave-israel-torres
April 10, 2017
Information Secrets II
https://www.linkedin.com/pulse/information-secrets-ii-israel-torres
April 3, 2017
Half-baked Developer
https://www.linkedin.com/pulse/half-baked-developer-israel-torres
March 20, 2017
Security is number one!
https://www.linkedin.com/pulse/security-number-one-israel-torres
March 13, 2017
I don’t click links…
https://www.linkedin.com/pulse/i-dont-click-links-israel-torres
March 2, 2017
Information Secrets
https://www.linkedin.com/pulse/information-secrets-israel-torres
March 31, 2013
Operative Drunk Dagger
http://www.miltonstart.com/blog/2013/03/31/operative-drunk-dagger/
March 22, 2013
Serious Security Is Serious
http://www.miltonstart.com/blog/2013/03/22/serious-security-is-serious/
March 15, 2013
Have Malware, Will Propagate
http://www.miltonstart.com/blog/2013/03/15/have-malware-will-propagate/
March 13, 2013
Ms. Configuration
http://www.miltonstart.com/blog/2013/03/13/ms-configuration/
September 19, 2012
iPhones iPhones Everywhere
http://www.miltonstart.com/blog/2012/09/19/iphones-iphones-everywhere/>/a>
September 11, 2012
Access Creep
August 2012
Configuring and Executing a Pentesting Scenario with Mac OS X Mountain Lion 10.8
http://pentestmag.com/pentest-web-app-082012/
April 2012
Hacking WolframAlpha - The Anatomy
http://resources.infosecinstitute.com/hacking-wolframalpha/
October 2011 [Hack Apple 10/11]
Apple Memory Tricks [source code]
http://hakin9.org/hack-apple-1011/
September 2011 [CryptoTutorials - Multi-part Series]
PART 4 Cryptography Fundamentals: Crypto Tools
http://hakin9.org/cryptotutorials-part-4/
September 2011 [Secure Coding 9/11]
Review of Passware Password Recovery Kit Forensic 11.0
http://hakin9.org/secure-coding-911/
September 2011 [Secure Coding 9/11]
For My Eyes Only [source code]
http://hakin9.org/secure-coding-911/
August 2011 [Hakin9 Extra 3/2011 – Forensics]
Forensic Improvisation [source code] [direct]
http://hakin9.org/hakin9-extra-22011-forensics/
August 2011 [CryptoTutorials - Multi-part Series]
PART 3 Cryptography Fundamentals: Crypto with Keys [source code]
http://hakin9.org/cryptotutorials-part-3/
August 2011 [Hacking RFID 8/2011]
RFIDIOt for Mac OS X [source code] [free article] [RFIDIOtOSXInstaller2011 MD5]
http://hakin9.org/hacking-rfid-82011/
July 2011 [CryptoTutorials - Multi-part Series]
PART 2 Cryptography Fundamentals: You can’t hide what isn’t there
http://hakin9.org/cryptotutorials-part-2/
July 2011 [CryptoTutorials - Multi-part Series]
PART 1 Cryptography Fundamentals: What you see isn’t what you get
http://hakin9.org/cryptotutorials-part-1/
June 2011 [Hakin9 Extra 1/2011 – Exploiting Software]
From Fuzz To Sploit [source code]
http://hakin9.org/hakin9-extra-12011-exploiting-software/
June 2011 [Insecure Access Control 06/2011]
Obscuring the truth [source code]
http://hakin9.org/insceure-access-control-062011/
December 2010 [Botnets, Malware, Spyware – Hakin9 11/2010]
dasbot: controlling IRC via bash [source/support]
http://hakin9.org/botnets-malware-spyware-hakin9-112010/
November 2010 [Spyware - someone is always watching...]
When XOR is your friend... [source code]
http://hakin9.org/spyware-someone-is-always-watching/
September 2010 [Mobile Malware – the new cyber threat]
Armoring Malware: Hiding Data within Data
http://hakin9.org/mobile-malware-–-the-new-cyber-threat/
June 2010 [Is DDOS still a threat?]
More Secure PHP Server Side Source Encryption
http://hakin9.org/is-ddos-still-a-threat/
June 2008 [Hacking Wi-Fi]
PKCS Potion Number Twelve
http://haking9.org/hacking-wi-fi/
July 2015
10 Security Tips for Safe Computing for OS X Yosemite
November 2012
10 Security Tips for Safe Computing for OS X Mountain Lion
http://www.securemac.com/10-MacOSX-MountainLion-Security-Tips.php
April 2012
20+ Top Security Tips for Safe Computing for Mac OS X
http://www.securemac.com/20tips.php
September 2010
Sophos Anti-Virus for Mac Home Edition Review
http://www.securemac.com/sophos-anti-virus-review.php
May 2010
PGP 10 WDE for Mac OS X (Snow Leopard) Review
http://www.securemac.com/pgp-10-wde-review.php