publications...

Listed below is the maintained list of articles I've written freelance for various security-based print and online publications.

LinkedIn

April 16, 2017

Enter the Hand-Wave

https://www.linkedin.com/pulse/enter-hand-wave-israel-torres

 

April 10, 2017

Information Secrets II

https://www.linkedin.com/pulse/information-secrets-ii-israel-torres

 

April 3, 2017

Half-baked Developer

https://www.linkedin.com/pulse/half-baked-developer-israel-torres

 

March 20, 2017

Security is number one!

https://www.linkedin.com/pulse/security-number-one-israel-torres

 

March 13, 2017

I don’t click links…

https://www.linkedin.com/pulse/i-dont-click-links-israel-torres

 

March 2, 2017

Information Secrets

https://www.linkedin.com/pulse/information-secrets-israel-torres

Milton Security Group

March 31, 2013

Operative Drunk Dagger

http://www.miltonstart.com/blog/2013/03/31/operative-drunk-dagger/

 

March 22, 2013

Serious Security Is Serious

http://www.miltonstart.com/blog/2013/03/22/serious-security-is-serious/

 

March 15, 2013

Have Malware, Will Propagate

http://www.miltonstart.com/blog/2013/03/15/have-malware-will-propagate/

 

March 13, 2013

Ms. Configuration

http://www.miltonstart.com/blog/2013/03/13/ms-configuration/

 

September 19, 2012

iPhones iPhones Everywhere

http://www.miltonstart.com/blog/2012/09/19/iphones-iphones-everywhere/>/a>

 

September 11, 2012

Access Creep

http://www.miltonstart.com/blog/2012/09/11/access-creep/

eForensics Magazine

November 2015

Case Study - Basic Malware Analysis using Kali

https://eforensicsmag.com/download/eforensics-open-the-unhackable-cloud/

 

December 2012

DIY Remote Mac OS X Watchdog

http://eforensicsmag.com/eforensics-network-32012/

PenTest Magazine

August 2012

Configuring and Executing a Pentesting Scenario with Mac OS X Mountain Lion 10.8

http://pentestmag.com/pentest-web-app-082012/

INFOSEC Institute

April 2012

Hacking WolframAlpha - The Anatomy

http://resources.infosecinstitute.com/hacking-wolframalpha/

Hakin9 - IT Security Magazine

October 2011 [Hack Apple 10/11]

Apple Memory Tricks [source code]

http://hakin9.org/hack-apple-1011/

 

September 2011 [CryptoTutorials - Multi-part Series]

PART 4 Cryptography Fundamentals: Crypto Tools

http://hakin9.org/cryptotutorials-part-4/

 

September 2011 [Secure Coding 9/11]

Review of Passware Password Recovery Kit Forensic 11.0

http://hakin9.org/secure-coding-911/

 

September 2011 [Secure Coding 9/11]

For My Eyes Only [source code]

http://hakin9.org/secure-coding-911/

 

August 2011 [Hakin9 Extra 3/2011 – Forensics]

Forensic Improvisation [source code] [direct]

http://hakin9.org/hakin9-extra-22011-forensics/

 

August 2011 [CryptoTutorials - Multi-part Series]

PART 3 Cryptography Fundamentals: Crypto with Keys [source code]

http://hakin9.org/cryptotutorials-part-3/

 

August 2011 [Hacking RFID 8/2011]

RFIDIOt for Mac OS X [source code] [free article] [RFIDIOtOSXInstaller2011 MD5]

http://hakin9.org/hacking-rfid-82011/

 

July 2011 [CryptoTutorials - Multi-part Series]

PART 2 Cryptography Fundamentals: You can’t hide what isn’t there

http://hakin9.org/cryptotutorials-part-2/

 

July 2011 [CryptoTutorials - Multi-part Series]

PART 1 Cryptography Fundamentals: What you see isn’t what you get

http://hakin9.org/cryptotutorials-part-1/

 

June 2011 [Hakin9 Extra 1/2011 – Exploiting Software]

From Fuzz To Sploit [source code]

http://hakin9.org/hakin9-extra-12011-exploiting-software/

 

June 2011 [Insecure Access Control 06/2011]

Obscuring the truth [source code]

http://hakin9.org/insceure-access-control-062011/

 

December 2010 [Botnets, Malware, Spyware – Hakin9 11/2010]

dasbot: controlling IRC via bash [source/support]

http://hakin9.org/botnets-malware-spyware-hakin9-112010/

 

November 2010 [Spyware - someone is always watching...]

When XOR is your friend... [source code]

http://hakin9.org/spyware-someone-is-always-watching/

 

September 2010 [Mobile Malware – the new cyber threat]

Armoring Malware: Hiding Data within Data

http://hakin9.org/mobile-malware-–-the-new-cyber-threat/

 

June 2010 [Is DDOS still a threat?]

More Secure PHP Server Side Source Encryption

http://hakin9.org/is-ddos-still-a-threat/

 

June 2008 [Hacking Wi-Fi]

PKCS Potion Number Twelve

http://haking9.org/hacking-wi-fi/

SecureMac

July 2015

10 Security Tips for Safe Computing for OS X Yosemite

 

November 2012

10 Security Tips for Safe Computing for OS X Mountain Lion

http://www.securemac.com/10-MacOSX-MountainLion-Security-Tips.php

 

April 2012

20+ Top Security Tips for Safe Computing for Mac OS X

http://www.securemac.com/20tips.php

 

September 2010

Sophos Anti-Virus for Mac Home Edition Review

http://www.securemac.com/sophos-anti-virus-review.php

 

May 2010

PGP 10 WDE for Mac OS X (Snow Leopard) Review

http://www.securemac.com/pgp-10-wde-review.php