Table of contents for issues of Network Security

Last update: Sun Dec 26 09:51:43 MST 2021                Valid HTML 3.2!

Volume 1994, Number 6, June, 1994
Volume 1994, Number 7, July, 1994
Volume 1994, Number 8, August, 1994
Volume 1994, Number 9, September, 1994
Volume 1994, Number 10, October, 1994
Volume 1994, Number 11, November, 1994
Volume 1994, Number 12, December, 1994
Volume 1995, Number 1, January, 1995
Volume 1995, Number 2, February, 1995
Volume 1995, Number 3, March, 1995
Volume 1995, Number 4, April, 1995
Volume 1995, Number 5, May, 1995
Volume 1995, Number 6, June, 1995
Volume 1995, Number 7, July, 1995
Volume 1995, Number 8, August, 1995
Volume 1995, Number 9, September, 1995
Volume 1995, Number 10, October, 1995
Volume 1995, Number 11, November, 1995
Volume 1995, Number 12, December, 1995
Volume 1996, Number 1, January, 1996
Volume 1996, Number 2, February, 1996
Volume 1996, Number 3, March, 1996
Volume 1996, Number 4, April, 1996
Volume 1996, Number 5, May, 1996
Volume 1996, Number 6, June, 1996
Volume 1996, Number 7, July, 1996
Volume 1996, Number 8, August, 1996
Volume 1996, Number 9, September, 1996
Volume 1996, Number 10, October, 1996
Volume 1996, Number 11, November, 1996
Volume 1996, Number 12, December, 1996
Volume 1997, Number 1, January, 1997
Volume 1997, Number 2, February, 1997
Volume 1997, Number 3, March, 1997
Volume 1997, Number 4, April, 1997
Volume 1997, Number 5, May, 1997
Volume 1997, Number 6, June, 1997
Volume 1997, Number 7, July, 1997
Volume 1997, Number 8, August, 1997
Volume 1997, Number 9, September, 1997
Volume 1997, Number 10, October, 1997
Volume 1997, Number 11, November, 1997
Volume 1997, Number 12, December, 1997
Volume 1998, Number 1, January, 1998
Volume 1998, Number 2, February, 1998
Volume 1998, Number 3, March, 1998
Volume 1998, Number 4, April, 1998
Volume 1998, Number 5, May, 1998
Volume 1998, Number 6, June, 1998
Volume 1998, Number 7, July, 1998
Volume 1998, Number 8, August, 1998
Volume 1998, Number 9, September, 1998
Volume 1998, Number 10, October, 1998
Volume 1998, Number 11, November, 1998
Volume 1998, Number 12, December, 1998
Volume 1999, Number 1, January, 1999
Volume 1999, Number 2, February, 1999
Volume 1999, Number 3, March, 1999
Volume 1999, Number 4, April, 1999
Volume 1999, Number 5, May, 1999
Volume 1999, Number 6, June, 1999
Volume 1999, Number 7, July, 1999
Volume 1999, Number 8, August, 1999
Volume 1999, Number 9, September, 1999
Volume 1999, Number 10, October, 1999
Volume 1999, Number 11, November, 1999
Volume 1999, Number 12, December, 1999
Volume 2000, Number 1, January, 2000
Volume 2000, Number 2, February 1, 2000
Volume 2000, Number 3, March 1, 2000
Volume 2000, Number 4, April 1, 2000
Volume 2000, Number 5, May 1, 2000
Volume 2000, Number 6, June 1, 2000
Volume 2000, Number 7, July 1, 2000
Volume 2000, Number 8, August 1, 2000
Volume 2000, Number 9, September 1, 2000
Volume 2000, Number 10, October 1, 2000
Volume 2000, Number 11, November, 2000
Volume 2000, Number 12, December 1, 2000
Volume 2001, Number 1, January 1, 2001
Volume 2001, Number 2, February 1, 2001
Volume 2001, Number 3, March 1, 2001
Volume 2001, Number 4, April 1, 2001
Volume 2001, Number 5, May 1, 2001
Volume 2001, Number 6, June 1, 2001
Volume 2001, Number 7, July 1, 2001
Volume 2001, Number 8, August 1, 2001
Volume 2001, Number 9, September 1, 2001
Volume 2001, Number 10, October 31, 2001
Volume 2001, Number 11, November 30, 2001
Volume 2001, Number 12, December 1, 2001
Volume 2002, Number 1, January 1, 2002
Volume 2002, Number 2, February 28, 2002
Volume 2002, Number 3, March 31, 2002
Volume 2002, Number 4, April 1, 2002
Volume 2002, Number 5, May 31, 2002
Volume 2002, Number 6, June 1, 2002
Volume 2002, Number 7, July 1, 2002
Volume 2002, Number 8, August 1, 2002
Volume 2002, Number 9, September 1, 2002
Volume 2002, Number 10, October, 2002
Volume 2002, Number 11, November, 2002
Volume 2002, Number 12, December, 2002
Volume 2003, Number 1, January, 2003
Volume 2003, Number 2, February, 2003
Volume 2003, Number 3, March, 2003
Volume 2003, Number 4, April, 2003
Volume 2003, Number 5, May, 2003
Volume 2003, Number 6, June, 2003
Volume 2003, Number 7, July, 2003
Volume 2003, Number 8, August, 2003
Volume 2003, Number 9, September, 2003
Volume 2003, Number 10, October, 2003
Volume 2003, Number 11, November, 2003
Volume 2003, Number 12, December, 2003
Volume 2004, Number 1, January, 2004
Volume 2004, Number 2, February, 2004
Volume 2004, Number 3, March, 2004
Volume 2004, Number 4, April, 2004
Volume 2004, Number 5, May, 2004
Volume 2004, Number 6, June, 2004
Volume 2004, Number 7, July, 2004
Volume 2004, Number 8, August, 2004
Volume 2004, Number 9, September, 2004
Volume 2004, Number 10, October, 2004
Volume 2004, Number 11, November, 2004
Volume 2004, Number 12, December, 2004
Volume 2005, Number 1, January, 2005
Volume 2005, Number 2, February, 2005
Volume 2005, Number 3, March, 2005
Volume 2005, Number 4, April, 2005
Volume 2005, Number 5, May, 2005
Volume 2005, Number 6, June, 2005
Volume 2005, Number 7, July, 2005
Volume 2005, Number 8, August, 2005
Volume 2005, Number 9, September, 2005
Volume 2005, Number 10, October, 2005
Volume 2005, Number 11, November, 2005
Volume 2005, Number 12, December, 2005
Volume 2006, Number 1, January, 2006
Volume 2006, Number 2, February, 2006
Volume 2006, Number 3, March, 2006
Volume 2006, Number 4, April, 2006
Volume 2006, Number 5, May, 2006
Volume 2006, Number 6, June, 2006
Volume 2006, Number 7, July, 2006
Volume 2006, Number 8, August, 2006
Volume 2006, Number 9, September, 2006
Volume 2006, Number 10, October, 2006
Volume 2006, Number 11, November, 2006
Volume 2006, Number 12, December, 2006
Volume 2007, Number 1, January, 2007
Volume 2007, Number 2, February, 2007
Volume 2007, Number 3, March, 2007
Volume 2007, Number 4, April, 2007
Volume 2007, Number 5, May, 2007
Volume 2007, Number 6, June, 2007
Volume 2007, Number 7, July, 2007
Volume 2007, Number 8, August, 2007
Volume 2007, Number 9, September, 2007
Volume 2007, Number 10, October, 2007
Volume 2007, Number 11, November, 2007
Volume 2007, Number 12, December, 2007
Volume 2008, Number 1, January, 2008
Volume 2008, Number 2, February, 2008
Volume 2008, Number 3, March, 2008
Volume 2008, Number 4, April, 2008
Volume 2008, Number 5, May, 2008
Volume 2008, Number 6, June, 2008
Volume 2008, Number 7, July, 2008
Volume 2008, Number 8, August, 2008
Volume 2008, Number 9, September, 2008
Volume 2008, Number 10, October, 2008
Volume 2008, Number 11, November, 2008
Volume 2008, Number 12, December, 2008
Volume 2009, Number 1, January, 2009
Volume 2009, Number 2, February, 2009
Volume 2009, Number 3, March, 2009
Volume 2009, Number 4, April, 2009
Volume 2009, Number 5, May, 2009
Volume 2009, Number 6, June, 2009
Volume 2009, Number 7, July, 2009
Volume 2009, Number 8, August, 2009
Volume 2009, Number 9, September, 2009
Volume 2009, Number 10, October, 2009
Volume 2009, Number 11, November, 2009
Volume 2009, Number 12, December, 2009
Volume 2010, Number 1, January, 2010
Volume 2010, Number 2, February, 2010
Volume 2010, Number 3, March, 2010
Volume 2010, Number 4, April, 2010
Volume 2010, Number 5, May, 2010
Volume 2010, Number 6, June, 2010
Volume 2010, Number 7, July, 2010
Volume 2010, Number 8, August, 2010
Volume 2010, Number 9, September, 2010
Volume 2010, Number 10, October, 2010
Volume 2010, Number 11, November, 2010
Volume 2010, Number 12, December, 2010
Volume 2011, Number 1, January, 2011
Volume 2011, Number 2, February, 2011
Volume 2011, Number 3, March, 2011
Volume 2011, Number 4, April, 2011
Volume 2011, Number 5, May, 2011
Volume 2011, Number 6, June, 2011
Volume 2011, Number 7, July, 2011
Volume 2011, Number 8, August, 2011
Volume 2011, Number 9, September, 2011
Volume 2011, Number 10, October, 2011
Volume 2011, Number 11, November, 2011
Volume 2011, Number 12, December, 2011
Volume 2012, Number 1, January, 2012
Volume 2012, Number 2, February, 2012
Volume 2012, Number 3, March, 2012
Volume 2012, Number 4, April, 2012
Volume 2012, Number 5, May, 2012
Volume 2012, Number 6, June, 2012
Volume 2012, Number 7, July, 2012
Volume 2012, Number 8, August, 2012
Volume 2012, Number 9, September, 2012
Volume 2012, Number 10, October, 2012
Volume 2012, Number 11, November, 2012
Volume 2012, Number 12, December, 2012
Volume 2013, Number 1, January, 2013
Volume 2013, Number 2, February, 2013
Volume 2013, Number 3, March, 2013
Volume 2013, Number 4, April, 2013
Volume 2013, Number 5, May, 2013
Volume 2013, Number 6, June, 2013
Volume 2013, Number 7, July, 2013
Volume 2013, Number 8, August, 2013
Volume 2013, Number 9, September, 2013
Volume 2013, Number 10, October, 2013
Volume 2013, Number 11, November, 2013
Volume 2013, Number 12, December, 2013
Volume 2014, Number 1, January, 2014
Volume 2014, Number 2, February, 2014
Volume 2014, Number 3, March, 2014
Volume 2014, Number 4, April, 2014
Volume 2014, Number 5, May, 2014
Volume 2014, Number 6, June, 2014
Volume 2014, Number 7, July, 2014
Volume 2014, Number 8, August, 2014
Volume 2014, Number 9, September, 2014
Volume 2014, Number 10, October, 2014
Volume 2014, Number 11, November, 2014
Volume 2014, Number 12, December, 2014
Volume 2015, Number 1, January, 2015
Volume 2015, Number 2, February, 2015
Volume 2015, Number 3, March, 2015
Volume 2015, Number 4, April, 2015
Volume 2015, Number 5, May, 2015
Volume 2015, Number 6, June, 2015
Volume 2015, Number 7, July, 2015
Volume 2015, Number 8, August, 2015
Volume 2015, Number 9, September, 2015
Volume 2015, Number 10, October, 2015
Volume 2015, Number 11, November, 2015
Volume 2015, Number 12, December, 2015
Volume 2016, Number 1, January, 2016
Volume 2016, Number 2, February, 2016
Volume 2016, Number 3, March, 2016
Volume 2016, Number 4, April, 2016
Volume 2016, Number 5, May, 2016
Volume 2016, Number 6, June, 2016
Volume 2016, Number 7, July, 2016
Volume 2016, Number 8, August, 2016
Volume 2016, Number 9, September, 2016
Volume 2016, Number 10, October, 2016
Volume 2016, Number 11, November, 2016
Volume 2016, Number 12, December, 2016
Volume 2017, Number 1, January, 2017
Volume 2017, Number 2, February, 2017
Volume 2017, Number 3, March, 2017
Volume 2017, Number 4, April, 2017
Volume 2017, Number 5, May, 2017
Volume 2017, Number 6, June, 2017
Volume 2017, Number 7, July, 2017
Volume 2017, Number 8, August, 2017
Volume 2017, Number 9, September, 2017
Volume 2017, Number 10, October, 2017
Volume 2017, Number 11, November, 2017
Volume 2017, Number 12, December, 2017
Volume 2018, Number 1, January, 2018
Volume 2018, Number 2, February, 2018
Volume 2018, Number 3, March, 2018
Volume 2018, Number 4, April, 2018
Volume 2018, Number 5, May, 2018
Volume 2018, Number 6, June, 2018
Volume 2018, Number 7, July, 2018
Volume 2018, Number 8, August, 2018
Volume 2018, Number 9, September, 2018
Volume 2018, Number 10, October, 2018
Volume 2018, Number 11, November, 2018
Volume 2018, Number 12, December, 2018
Volume 2019, Number 1, January, 2019
Volume 2019, Number 2, February, 2019
Volume 2019, Number 3, March, 2019
Volume 2019, Number 4, April, 2019
Volume 2019, Number 5, May, 2019
Volume 2019, Number 6, June, 2019
Volume 2019, Number 7, July, 2019
Volume 2019, Number 8, August, 2019
Volume 2019, Number 9, September, 2019
Volume 2019, Number 10, October, 2019
Volume 2019, Number 11, November, 2019
Volume 2019, Number 12, December, 2019
Volume 2020, Number 1, January, 2020
Volume 2020, Number 2, February, 2020
Volume 2020, Number 3, March, 2020
Volume 2020, Number 4, April, 2020
Volume 2020, Number 5, May, 2020
Volume 2020, Number 6, June, 2020
Volume 2020, Number 7, July, 2020
Volume 2020, Number 8, August, 2020
Volume 2020, Number 9, September, 2020
Volume 2020, Number 10, October, 2020
Volume 2020, Number 11, November, 2020
Volume 2020, Number 12, December, 2020
Volume 2021, Number 1, January, 2021
Volume 2021, Number 2, February, 2021
Volume 2021, Number 3, March, 2021


Network Security
Volume 1994, Number 6, June, 1994

                   Ann Steffora   User education critical to effective
                                  network security . . . . . . . . . . . . 2--2
                   Ann Steffora   Internet community has many ways to
                                  handle security infringements  . . . . . 3--3
                      Anonymous   Flaw found in Clipper technology . . . . 3--4
                      Anonymous   Junkie . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Wireless data services take-off  . . . . 4--4
                      Anonymous   Mobile data comms market sees rapid
                                  growth . . . . . . . . . . . . . . . . . 4--5
                      Anonymous   UK invests in photonics  . . . . . . . . 5--5
                      Anonymous   Nynex develops fibre-optic
                                  infrastracture . . . . . . . . . . . . . 5--5
                      Anonymous   Proginet unveils plan to link IBM
                                  mainframes to Netware  . . . . . . . . . 5--5
                      Anonymous   US legislature pushes for uniform online
                                  health privacy rules . . . . . . . . . . 5--6
                      Anonymous   Encryption restrictions bind
                                  manufacturer's hands . . . . . . . . . . 6--6
                      Anonymous   Electronic cash  . . . . . . . . . . . . 6--6
                      Anonymous   CyberSAFE Challenger 5.2.1 . . . . . . . 7--7
                      Anonymous   SDI secures Shiva LANs . . . . . . . . . 7--7
                      Anonymous   Security manager . . . . . . . . . . . . 7--7
                      Anonymous   Increased NetSP security . . . . . . . . 7--7
                Steven Michaels   LAN users are lax on security  . . . . . 8--8
                    Brian Riggs   Cracking down on online crime  . . . . . 8--8
         Harold Joseph Highland   How secure is data over the Internet?    9--11
               Padgett Peterson   The fortress mentality: Its time has
                                  come again . . . . . . . . . . . . . . . 12--13
             William M. Hancock   Issues and problems in secure remote
                                  access . . . . . . . . . . . . . . . . . 14--18
                     Ken Lindup   Is there a role for hackers in polite
                                  society? . . . . . . . . . . . . . . . . 19--19

Network Security
Volume 1994, Number 7, July, 1994

                 Lisa Armstrong   Are public networks safe?  . . . . . . . 2--2
                   Monica Snell   Protecting the internal network  . . . . 2--2
                   Erin English   Cache of nude images found at nuclear
                                  weapons lab  . . . . . . . . . . . . . . 2--3
                   Monica Snell   Users upset over Internet ads  . . . . . 3--3
                      Anonymous   Changes to come for DCS  . . . . . . . . 3--4
                      Anonymous   LAN mail to overtake host mail . . . . . 4--4
                      Anonymous   Novell and PC security collaborate . . . 4--4
                      Anonymous   Communications available to more
                                  countries  . . . . . . . . . . . . . . . 4--4
                   Monica Snell   Lotus notes the Internet advantage . . . 4--5
                 Lisa Armstrong   A sparekey to Netware  . . . . . . . . . 5--5
                 L. G. Lawrence   Security in a client server environment  5--15
                  S. Gordon and   
                   I. Nedelchev   Sniffing in the sun: History of a
                                  disaster . . . . . . . . . . . . . . . . 16--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1994, Number 8, August, 1994

                      Anonymous   US companies count Internet security
                                  options  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Security for commerce on the Internet    2--2
                      Anonymous   Ring of crime in Scotland  . . . . . . . 2--3
                      Anonymous   CIA to mine Internet . . . . . . . . . . 3--3
                      Anonymous   IBM's virus collection grows . . . . . . 3--3
                      Anonymous   Rise in number of teleworkers  . . . . . 4--4
                      Anonymous   Home workers demand ISDN . . . . . . . . 4--4
                      Anonymous   Mobile phone network promoted  . . . . . 4--4
                      Anonymous   High-rise optic links  . . . . . . . . . 4--4
                      Anonymous   Fund raising for satellite phone system  4--5
                      Anonymous   Improved remote LAN access . . . . . . . 5--5
                      Anonymous   Secure access for councillors  . . . . . 5--5
                      Anonymous   Raxco launches \tt omniguard . . . . . . 5--5
                      Anonymous   New firewall server launched . . . . . . 5--5
                      Anonymous   Bell Atlantic network delayed  . . . . . 5--6
                      Anonymous   Revamping the net! . . . . . . . . . . . 6--6
                      Anonymous   PGP misconceptions explained . . . . . . 6--6
                      Anonymous   Cellular phone fraud . . . . . . . . . . 7--10
                   Bill Hancock   Internet firewalls . . . . . . . . . . . 10--11
               Padgett Peterson   The fortress mentality --- Part II: The
                                  Internet . . . . . . . . . . . . . . . . 11--14
                Silvano Ongetta   Effectiveness of passwords . . . . . . . 14--17
               Robert Schifreen   What motivates a hacker? . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1994, Number 9, September, 1994

                      Anonymous   High-tech calling-card number theft  . . 2--2
                      Anonymous   Bulletin board operators fined for
                                  piracy . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Online privacy . . . . . . . . . . . . . 2--2
                      Anonymous   The Internet becomes the high seas of
                                  piracy . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Combatting cellular phone fraud  . . . . 3--3
                      Anonymous   US government wiretapping updated  . . . 3--3
                      Anonymous   Self-healing optical networks  . . . . . 3--4
                      Anonymous   New UK data protection registrar . . . . 4--4
                      Anonymous   Net judges . . . . . . . . . . . . . . . 4--4
                      Anonymous   Australian virus update  . . . . . . . . 4--5
                      Anonymous   UK messaging market commandeered . . . . 5--5
                      Anonymous   Global telecoms growth . . . . . . . . . 5--5
                      Anonymous   Taiwan invests in the superhighway era   5--5
                      Anonymous   High-speed optical test bed  . . . . . . 5--5
                      Anonymous   Baby Bells commit to multimedia  . . . . 5--6
                      Anonymous   Ericsson cooperates with DynaSoft on
                                  security . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Microsoft and Telekom announce
                                  multimedia venture . . . . . . . . . . . 6--6
                      Anonymous   Virus protection system for networks . . 6--6
                      Anonymous   Norton administrator for networks 1.5    6--6
                   Martin Cheek   Sidewinder helps keep Internet better
                                  secured  . . . . . . . . . . . . . . . . 6--7
                   Monica Snell   Policies bring more security to E-mail   7--7
                   Bill Hancock   Hazards of promiscuous mode programming  8--9
                     Jan Hruska   Virus control on networks: Solving the
                                  unsolvable . . . . . . . . . . . . . . . 10--13
                  Lesley Hansen   Use of network design to reduce security
                                  risks  . . . . . . . . . . . . . . . . . 13--17
               Robert Schifreen   Preventing software piracy . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1994, Number 10, October, 1994

                      Anonymous   Security leak at BT  . . . . . . . . . . 2--2
                      Anonymous   Computer abuse surveys . . . . . . . . . 2--2
                      Anonymous   Internet liberation front  . . . . . . . 2--3
                      Anonymous   Pressure to charge hacker  . . . . . . . 3--3
                      Anonymous   Cellular phone fraud arrest  . . . . . . 3--3
                      Anonymous   Internet pirates sale again  . . . . . . 3--4
                      Anonymous   Nationwide EDI for India . . . . . . . . 4--4
                      Anonymous   Toronto gets Free-Net  . . . . . . . . . 4--4
                      Anonymous   Microsoft launch new online service  . . 4--4
                      Anonymous   PC network disaster recovery . . . . . . 5--5
                      Anonymous   The great `cyber-bucks' give away  . . . 5--5
                      Anonymous   High speed switching and networking  . . 5--5
                      Anonymous   Checks for under-performing networks . . 5--5
                      Anonymous   Crime and security network . . . . . . . 6--6
                      Anonymous   EU ends monopolies on phone networks . . 6--6
                 Lisa Armstrong   Internet copyrights  . . . . . . . . . . 6--6
                   Erin English   Internet white pages with PGP  . . . . . 7--7
                   Martin Cheek   Financial transactions to come onto the
                                  Internet . . . . . . . . . . . . . . . . 7--7
                 Lisa Armstrong   PersonaCard 100 data security token  . . 7--8
                   Bill Hancock   Naming is the key to the future  . . . . 8--9
                    Sara Gordon   IRC and security --- Can the two
                                  co-exist?  . . . . . . . . . . . . . . . 10--17
               Robert Schifreen   How hackers do it  . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1994, Number 11, November, 1994

                      Anonymous   LAN/WAN news . . . . . . . . . . . . . . 2--5
                   Wayne Madsen   The Clipper controversy  . . . . . . . . 6--11
                    Frank Doyle   Tricks of the LAN security trade . . . . 12--13
                   Wayne Madsen   Online industrial espionage  . . . . . . 14--18
                     Ken Lindup   Commercial Internet use: a new risk? . . 19--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1994, Number 12, December, 1994

                      Anonymous   Piracy charges dismissed against
                                  LaMacchia  . . . . . . . . . . . . . . . 2--2
                      Anonymous   Computers security support centre set up 2--3
                      Anonymous   Corporate move to the net  . . . . . . . 3--3
                      Anonymous   Cellular on the verge of going mass
                                  market . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Axent announces acquisition of datamedia 4--4
                      Anonymous   Virus alert program for information
                                  highway users  . . . . . . . . . . . . . 4--4
                      Anonymous   Keeping e-mail private . . . . . . . . . 4--4
                      Anonymous   Secure network management initiative . . 4--4
                 Lisa Armstrong   Bank of America secures the Internet . . 4--5
                      Phil Hall   Laser beams as a LAN connectivity
                                  alternative  . . . . . . . . . . . . . . 5--6
                 Winn Schwartau   To net or not to net?  . . . . . . . . . 7--11
                 Norman Crocker   An introduction to MVS integrity
                                  concerns . . . . . . . . . . . . . . . . 12--16
               Padgett Peterson   Dangerous letters: ANSI bombs and forged
                                  e-mail . . . . . . . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20


Network Security
Volume 1995, Number 1, January, 1995

                      Anonymous   IP spoofing attacks latest threat  . . . 2--2
                      Anonymous   Organizations in cyberspace  . . . . . . 2--2
                      Anonymous   Russians better at fighting phone fraud  2--3
                      Anonymous   A boom in VAN services . . . . . . . . . 3--3
                      Anonymous   The LAN surges on  . . . . . . . . . . . 3--3
                      Anonymous   Concert seeking 10% of market  . . . . . 3--3
                      Anonymous   Securicor supplies data security
                                  business service . . . . . . . . . . . . 3--4
                      Anonymous   CyberSource, the cyber-distributor . . . 4--4
                      Anonymous   Network monitoring report generation
                                  system . . . . . . . . . . . . . . . . . 4--4
                 Lisa Armstrong   AT&T IVES . . . . . . . . . . . . . . . . 4--5
                      Anonymous   New level of security for global
                                  electronic trading . . . . . . . . . . . 5--5
                      Anonymous   Fault-tolerant TCP/IP for LAN to
                                  mainframe connectivity . . . . . . . . . 5--5
                      Anonymous   Award for IBM's Internet security
                                  firewall . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Flood of network security products . . . 5--6
                   Erin English   MIT scales up Kerberos security system
                                  for Internet . . . . . . . . . . . . . . 6--6
                   Erin English   A new certification programme for
                                  network security . . . . . . . . . . . . 6--7
                   Erin English   Security made simple with SOCKS  . . . . 7--7
                    Henry Wolfe   The Internet threat  . . . . . . . . . . 7--8
                 Winn Schwartau   Password alternatives --- Part 1 . . . . 9--13
             Gerald L. Kovacich   Local area networks security:
                                  Establishing policies and procedures . . 13--16
                  Stephen Saxby   Electronic monitoring poses E-mail
                                  dilemma  . . . . . . . . . . . . . . . . 17--18
               Bernard P. Zajac   Book Review: \booktitleE-Mail Security
                                  --- How To Keep Your Electronic Messages
                                  Private: Bruce Schneier, published by
                                  John Wiley & Sons at \$24.95. ISBN
                                  0-471-05318-X} . . . . . . . . . . . . . 18--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 2, February, 1995

                      Anonymous   Telnet encryption vulnerability  . . . . 2--2
                      Anonymous   Vulnerabilities in /bin/mail . . . . . . 2--3
                      Anonymous   Hacker leaves threatening messages . . . 3--3
                     Ken Lindup   Mitnick arrested . . . . . . . . . . . . 3--4
                      Anonymous   BR complains about counterfeit NetWare   4--4
                      Anonymous   Global communications group formed . . . 4--4
                      Anonymous   Support for corporate Internet users . . 4--4
                      Anonymous   Microsoft Network receives mixed
                                  response . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Online banking growth  . . . . . . . . . 5--5
                      Anonymous   Draft plans to break European telecoms
                                  monopolies . . . . . . . . . . . . . . . 5--5
                      Anonymous   The growing Web  . . . . . . . . . . . . 5--5
                      Anonymous   Eliminate unauthorized network access    5--6
                   Monica Snell   Secure shopping on the Internet  . . . . 6--6
                 Lisa Armstrong   Endorsements for SHTTP . . . . . . . . . 6--7
                   Erin English   Passwords through pagers . . . . . . . . 7--7
                   Bill Hancock   Assessing and reducing network risk  . . 7--9
               Bernard P. Zajac   Computer viruses --- Legal options . . . 9--10
                 Winn Schwartau   Password alternatives --- Part 2 . . . . 11--15
                Gerald Kovacich   Security requirements for voice
                                  messaging operations . . . . . . . . . . 15--18
                     Ken Lindup   The hacker war . . . . . . . . . . . . . 19--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 3, March, 1995

                      Anonymous   Sendmail vulnerabilities . . . . . . . . 2--2
                      Anonymous   `at' and `cron' vulnerabilities  . . . . 2--3
                      Anonymous   Providers not accountable for virus
                                  distribution . . . . . . . . . . . . . . 3--3
                      Anonymous   Natas spreads in southwestern United
                                  States . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Boom in online information . . . . . . . 3--4
                      Anonymous   America Online plans to sell 5% stake    4--4
                      Anonymous   ACE/Client for NetWare . . . . . . . . . 4--4
                      Anonymous   New Ethernet adapter card  . . . . . . . 4--4
                      Anonymous   Small businesses link through BT . . . . 4--5
                    Brian Riggs   Top to tail router security  . . . . . . 5--5
                   Monica Snell   AT&T strengthen security of Network Notes 5--5
                    Dan Thomsen   IP spoofing and session hijacking  . . . 6--11
                Chris Sheffield   Network review --- Part 1  . . . . . . . 11--16
                     Ken Lindup   The arrest of Kevin Mitnick  . . . . . . 16--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 4, April, 1995

                      Anonymous   `Good Times' is a hoax . . . . . . . . . 2--2
                      Anonymous   Satan costs developer his job  . . . . . 2--2
                      Anonymous   Hacker charged in Canada . . . . . . . . 2--2
                      Anonymous   Child porn hacker sentenced  . . . . . . 2--3
                      Anonymous   BT engineer guilty of piracy . . . . . . 3--3
                      Anonymous   World Wide Web needs a security boost    3--3
                      Anonymous   BT makes moves in Sweden and Italy . . . 3--4
                      Anonymous   Fibre links for major buildings  . . . . 4--4
                      Anonymous   Investing in Internet security . . . . . 4--4
                      Anonymous   IBM increases Internet services  . . . . 4--4
                      Anonymous   Private drive on superhighway  . . . . . 4--5
                      Anonymous   Users prefer frame relay . . . . . . . . 5--5
                      Anonymous   SentryLink data encryption devices . . . 5--5
                      Anonymous   MCI and Pacific Bell offer Internet
                                  services . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Fault tolerant Web server  . . . . . . . 6--6
                      Anonymous   Defender authentication software . . . . 6--6
                      Anonymous   Network Security Plus  . . . . . . . . . 6--7
                 Lisa Armstrong   CyberGuard . . . . . . . . . . . . . . . 7--7
                 Lisa Armstrong   Info-Terrorism . . . . . . . . . . . . . 7--8
                 Lisa Armstrong   Secure PBX . . . . . . . . . . . . . . . 8--8
                    Brian Riggs   Vaulting with ATM  . . . . . . . . . . . 8--9
                Chris Sheffield   Network review --- Part 2  . . . . . . . 9--13
                 Lisa Armstrong   Oracle Secure C/S  . . . . . . . . . . . 9--9
                  Stephen Saxby   G7 Summit poses challenge to governments
                                  on public access to official information 14--15
                      Anonymous   Events . . . . . . . . . . . . . . . . . 15--16

Network Security
Volume 1995, Number 5, May, 1995

                      Anonymous   The birth of the `hacker-tracker'  . . . 2--2
                      Anonymous   Developments in Internet security  . . . 2--2
                      Anonymous   Korea fights the hackers . . . . . . . . 2--2
                      Anonymous   Fears of Net insecurity  . . . . . . . . 2--3
                      Anonymous   Fixes for AIX holes  . . . . . . . . . . 3--3
                      Anonymous   Firewalls under fire . . . . . . . . . . 3--4
                      Anonymous   Further fights against mobile phone
                                  fraud  . . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Internet interest not necessarily
                                  business . . . . . . . . . . . . . . . . 5--5
                      Anonymous   US fibre-optic cables set to triple  . . 5--5
                      Anonymous   Internet security issues addressed . . . 5--6
                      Anonymous   SITA unveils Internet service  . . . . . 6--6
                      Anonymous   Client/server security package . . . . . 6--6
                      Anonymous   Netscape's SSL Internet security . . . . 6--6
                      Anonymous   ANR addresses network security issues    6--7
                      Anonymous   Secrets for Windows, security for
                                  Internet . . . . . . . . . . . . . . . . 7--7
                      Anonymous   PCMCIA security for notebooks and Novell
                                  LANs . . . . . . . . . . . . . . . . . . 7--7
                   Erin English   IP Version 6 holds promise for the
                                  future . . . . . . . . . . . . . . . . . 7--8
             Cynthia Bournellis   Putting an end to too many passwords . . 8--8
                   Erin English   SATAN does not go undetected . . . . . . 8--9
                 Chris Bucholtz   Suit challenges status of cryptography
                                  as munition  . . . . . . . . . . . . . . 9--9
                   Bill Hancock   Stop that E-mail! You are probably
                                  breaking the law!  . . . . . . . . . . . 10--12
                   Sarah Gordon   Devil's advocate . . . . . . . . . . . . 12--15
                Chris Sheffield   Network review --- Part 3  . . . . . . . 15--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 6, June, 1995

                      Anonymous   Cisco IOS software vulnerability . . . . 2--2
                      Anonymous   Hackers monitored police . . . . . . . . 2--2
                      Anonymous   Underground Reconnaissance Service . . . 2--2
                      Anonymous   Black Baron convicted  . . . . . . . . . 2--3
                      Anonymous   Hackers penetrate college computers  . . 3--3
                      Anonymous   Outfoxing the cellular thieves . . . . . 3--3
                      Anonymous   Bulter Bunny found guilty  . . . . . . . 3--3
                      Anonymous   Row puts Internet provision in doubt . . 4--4
                      Anonymous   Internet goes private in Brazil  . . . . 4--4
                      Anonymous   Infohighway in Africa? . . . . . . . . . 4--4
                      Anonymous   Internet steals international phone
                                  calls  . . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Mergent reaches agreement with Bull  . . 5--5
                      Anonymous   Europe encrypts weather data . . . . . . 5--5
                      Anonymous   Microsoft network pushes into electronic
                                  commerce . . . . . . . . . . . . . . . . 5--6
                      Anonymous   Broad multimedia alliance  . . . . . . . 6--6
                      Anonymous   ICL and Motorola ally for network
                                  security . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Nortel and Shiva direct Internet traffic 6--6
                      Anonymous   Motorola pushes its security portfolio   6--7
                      Anonymous   Network security assessment tool . . . . 7--7
                      Anonymous   Motorola helps firms protect data  . . . 7--7
                      Anonymous   Financial data backed up by ISDN . . . . 7--7
                      Anonymous   Internet security improved . . . . . . . 7--8
                 Chris Bucholtz   Networks suffer backup blues . . . . . . 8--8
                      Anonymous   The `TouchLock' security device  . . . . 8--8
                      Anonymous   Indian groups face increased Government
                                  electronic surveillance  . . . . . . . . 9--9
                    Brian Riggs   Church puts freedom of Internet on trial 10--10
                 Chris Bucholtz   Judge says hacker deserves more time . . 10--10
                 Chris Bucholtz   Security takes centre stage at Internet
                                  conference . . . . . . . . . . . . . . . 10--11
                  Tom Kaneshige   Banking on the Internet  . . . . . . . . 11--11
                 Chris Bucholtz   US war games fought  . . . . . . . . . . 11--12
                 Chris Bucholtz   Network security far too lax . . . . . . 12--12
                   Bill Hancock   Simple social engineering  . . . . . . . 13--14
               David R. Worlock   The culture of control: Safeguarding
                                  intellectual property in the age of
                                  networks --- Part 1  . . . . . . . . . . 14--17
                  Stephen Saxby   Network-related law --- recent decisions
                                  from USA . . . . . . . . . . . . . . . . 18--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 7, July, 1995

                      Anonymous   PKZIP Trojan . . . . . . . . . . . . . . 2--2
                      Anonymous   Regulation of porn in cyberspace . . . . 2--2
                      Anonymous   Caibua virus . . . . . . . . . . . . . . 2--3
                      Anonymous   Campaign to fight \$3 billion a year
                                  problem  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Swedish pirates prosecuted . . . . . . . 3--3
                      Anonymous   The year of the virus hoax . . . . . . . 3--3
                      Anonymous   Security worries with Registration
                                  Wizard . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Federal agency to secure infohighway . . 4--4
                      Anonymous   New electronic verification standard . . 4--4
                      Anonymous   The worries of online purchasers . . . . 4--5
                      Anonymous   Radio over the Net . . . . . . . . . . . 5--5
                      Anonymous   Novell and EUNet offer Internet
                                  connection . . . . . . . . . . . . . . . 5--5
                      Anonymous   The electric network . . . . . . . . . . 5--5
                      Anonymous   Firewalls to keep online spies at bay    6--6
                      Anonymous   Windows anti-virus virtual device driver 6--6
                      Anonymous   Protection as good as at the Whitehouse  6--6
                      Anonymous   Message security for electronic
                                  communications . . . . . . . . . . . . . 6--7
                      Anonymous   Secure E-mail for Microsoft-Mail users   7--7
               Thomas Kaneshige   Government's role in superhighway
                                  security . . . . . . . . . . . . . . . . 7--7
                  Tom Kaneshige   Software giants unite to filter the Net  8--8
                 Chris Bucholtz   Visa and MasterCard settle on Internet
                                  security standard  . . . . . . . . . . . 8--9
                 Chris Bucholtz   Encryption exports, Clipper policy
                                  criticized by consortium . . . . . . . . 9--9
                  Kermit Beseke   Developing a corporate Internet policy   10--13
               David R. Worlock   The culture of control: Safeguarding
                                  intellectual property in the age of
                                  networks --- Part 2  . . . . . . . . . . 13--17
               Padgett Peterson   The fortress mentality --- Part III:
                                  Tokens, one-time password devices and
                                  the Roman Army . . . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 8, August, 1995

                      Anonymous   French hacker cracks Netscape code . . . 2--2
                      Anonymous   Sendmail V.5 vulnerability . . . . . . . 2--2
                      Anonymous   Japanese battle hackers, viruses . . . . 2--3
                      Anonymous   Citicorp bank accounts breached  . . . . 3--3
                      Anonymous   Stronger encryption exportable . . . . . 3--3
                      Anonymous   Bringing security to ATM . . . . . . . . 3--4
                      Anonymous   Europe negotiates over encryption  . . . 4--4
                      Anonymous   Netscape goes public . . . . . . . . . . 4--4
                      Anonymous   AT&T finally notices the Internet . . . . 4--4
                      Anonymous   The authorizer . . . . . . . . . . . . . 4--5
                      Anonymous   Netscape's latest security effort  . . . 5--5
                      Anonymous   New generation network security product  5--5
                      Anonymous   NetCop scans for explicit material . . . 5--5
                 Chris Bucholtz   Pilot's E-mail has Pentagon up in arms   5--6
               Thomas Kaneshige   Full service security shop to ward off
                                  hackers  . . . . . . . . . . . . . . . . 6--6
               Thomas Kaneshige   Security systems for the road most
                                  travelled  . . . . . . . . . . . . . . . 6--7
             Cynthia Bournellis   Internet project defines middle ground   7--7
                   Erin English   CyberCash and Checkfree join forces  . . 7--8
                     Fred Cohen   Internet holes --- Part 1: Internet
                                  Control Message Protocol . . . . . . . . 8--10
                   Erin English   CyberAngels unite on the net . . . . . . 8--8
                 Caroline Shaer   Single sign-on . . . . . . . . . . . . . 11--15
                Silvano Ongetta   Electronic Data Interchange --- What are
                                  the security measures? . . . . . . . . . 16--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1995, Number 9, September, 1995

                      Anonymous   Netscape's software security scare . . . 2--2
                      Anonymous   Solaris \tt ps vulnerability . . . . . . 2--3
                      Anonymous   New security patches from Sun  . . . . . 3--3
                      Anonymous   Sun Sendmail \tt -oR vulnerability . . . 3--4
                      Anonymous   Undercover cybercops trap hackers  . . . 4--4
                      Anonymous   Ties to US intelligence for domain name
                                  assigner . . . . . . . . . . . . . . . . 4--4
                      Anonymous   America Online fights hackers  . . . . . 4--4
                      Anonymous   Online child pornography debate
                                  continues  . . . . . . . . . . . . . . . 5--5
                      Anonymous   Malicious Word spreads to the Net  . . . 5--5
                      Anonymous   Document about virus contains one  . . . 5--5
                     Frank Rees   An expensive lesson for bulletin board
                                  user . . . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Microsoft's Internet security claims
                                  criticized . . . . . . . . . . . . . . . 6--6
                      Anonymous   Electronic cheques planned . . . . . . . 6--7
                      Anonymous   Mobile services market set to triple . . 7--7
                      Anonymous   Making the Internet a safer place  . . . 7--7
                      Anonymous   AT&T splits into three  . . . . . . . . . 8--8
                      Anonymous   Integrity of network link guaranteed . . 8--8
                      Anonymous   Sophos' Windows 95 virus scanner . . . . 8--8
                      Anonymous   DES for HDLC/SDLC links  . . . . . . . . 8--8
                      Anonymous   Internet firewall from Integralis  . . . 8--9
                    David Barry   SNMP upgrade to lose security features   9--10
                    Cindy Davis   Firewall Consortium  . . . . . . . . . . 9--9
                      Anonymous   New secure Net products  . . . . . . . . 9--9
               Thomas Kaneshige   FBI to police online amidst heated
                                  controversy  . . . . . . . . . . . . . . 10--10
                   Bill Hancock   Attacking network routers  . . . . . . . 11--12
               Padgett Peterson   The fortress mentality --- Part IV:
                                  Telecomputing, telecommuting and serving
                                  remote customers . . . . . . . . . . . . 12--14
                     Fred Cohen   Internet holes --- Part 2: Packet
                                  fragmentation attacks  . . . . . . . . . 14--16
             Bob Herschberg and   
             Edo Roos Lindgreen   Internet: a certain insecurity . . . . . 16--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 10, October, 1995

                      Anonymous   Sun 4.1x loadmodule vulnerability  . . . 2--2
                      Anonymous   syslog vulnerability workaround  . . . . 2--2
                      Anonymous   Telnet daemon vulnerabilities  . . . . . 2--3
                      Anonymous   Internet security code . . . . . . . . . 3--3
                      Anonymous   Growing cellular networks in China . . . 3--4
                      Anonymous   Secure payments from Cybercash . . . . . 4--4
                      Anonymous   The digital ID case  . . . . . . . . . . 4--4
                      Anonymous   Microsoft and Lotus make net moves . . . 4--5
                      Anonymous   Firewall partnership formed  . . . . . . 5--5
                      Anonymous   Single sign-on technology  . . . . . . . 5--5
                      Anonymous   Firewall security for network
                                  applications . . . . . . . . . . . . . . 5--5
                      Anonymous   Azlan's alliance with Netscape and
                                  Supernet . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Frame relay encryptor protects . . . . . 5--6
                      Anonymous   H-P's encryption engine proposal . . . . 6--6
                   Erin English   Oracle expands support for Oracle7 . . . 6--6
                   Erin English   Oracle embraces Fortezza . . . . . . . . 7--7
             Cynthia Bournellis   RSA negotiates with firewall vendors to
                                  establish VPNs . . . . . . . . . . . . . 7--7
                 Chris Bucholtz   Netscape answers security lapses with
                                  anti-bug contest . . . . . . . . . . . . 7--8
               Thomas Kaneshige   Auto industry to create its own network  8--8
                   Bill Hancock   Export of cryptographic information from
                                  the US: a brief look at the problems . . 9--11
                     Fred Cohen   Internet holes --- Part 3: The \tt
                                  sendmail maelstrom . . . . . . . . . . . 11--12
              E. Eugene Schultz   A new perspective on firewalls . . . . . 13--17
                    D. W. Banes   Physical layer network security: What
                                  your LAN can do for you  . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 11, November, 1995

                      Anonymous   Silicon Graphics Inc.'s Ip vulnerability 2--2
                      Anonymous   30 US companies lose \$66 million  . . . 2--2
                      Anonymous   FBI outlines a wiretapping future  . . . 2--3
                      Anonymous   Flaw in fault-tolerance software . . . . 3--3
                   Wayne Madsen   Fortezza reaches into civilian agencies  3--3
                      Anonymous   Companies crack down on Internet use . . 3--3
                      Anonymous   Check in at Internet site to check
                                  security . . . . . . . . . . . . . . . . 3--4
                      Anonymous   Woe is the Net, or is it?  . . . . . . . 4--4
                      Anonymous   Choosing a Web standard  . . . . . . . . 4--4
                      Anonymous   Product scans for viruses before a
                                  download . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Single sign-on network security  . . . . 4--5
                      Anonymous   Merlin's Internet magic  . . . . . . . . 5--5
                      Anonymous   Internet user authentication security    5--5
                      Anonymous   OS/2 data security product to integrate
                                  IBM's security hooks . . . . . . . . . . 5--5
                  Graham Browne   Using DES with keys longer than 56 bits  5--6
                   Bill Hancock   Recent history of known network breaches 6--9
                 John Leach and   
              Colin Brown Zergo   Security considerations of network
                                  outsourcing  . . . . . . . . . . . . . . 10--14
                     Fred Cohen   Internet holes --- Part 4: Network news
                                  transfer protocol  . . . . . . . . . . . 15--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1995, Number 12, December, 1995

                      Anonymous   X authentication vulnerability . . . . . 2--2
                      Anonymous   Dramatic increase in telephone hacking   2--2
                      Anonymous   Police given permission to tap E-mail    2--2
                      Anonymous   HP-UX \tt ftp vulnerability  . . . . . . 2--3
                      Anonymous   RSA loses licence for Hellman--Merkle
                                  algorithm  . . . . . . . . . . . . . . . 3--3
                      Anonymous   The viruses are getting more vicious . . 3--3
                      Anonymous   JavaScript language becomes a competitor 3--3
                      Anonymous   First virtual bank claims to be secure   4--4
                      Anonymous   Long distance phone calls via the
                                  Internet . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Security problems with Windows 95  . . . 4--4
                      Anonymous   Protection from viruses for E-mail . . . 4--5
                      Anonymous   A firewall for ATM . . . . . . . . . . . 5--5
                      Anonymous   Unix network security  . . . . . . . . . 5--5
                   Erin English   AOLGOLD virus worries users  . . . . . . 5--6
                   Erin English   IP security standards battle it out  . . 6--6
                     Fred Cohen   Internet holes --- Part 5a: 50 ways to
                                  attack your web systems  . . . . . . . . 7--11
                   Erin English   Exportable encryption policy found
                                  `unacceptable' . . . . . . . . . . . . . 7--7
                   Bill Hancock   Internet hacking resources . . . . . . . 11--15
                      Anonymous   Events . . . . . . . . . . . . . . . . . 16--16


Network Security
Volume 1996, Number 1, January, 1996

                      Anonymous   rpc.ypupdated vulnerability  . . . . . . 2--2
                      Anonymous   Growth in UK cell-phone fraud  . . . . . 2--3
                      Anonymous   Public-key encryption flawed in time . . 3--3
                      Anonymous   Encryption report kept under lock and
                                  key  . . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   NetConnect distributes BorderWare
                                  firewall . . . . . . . . . . . . . . . . 3--4
                      Anonymous   Novell's operating systems forecast to
                                  remain dominant  . . . . . . . . . . . . 4--4
                      Anonymous   Further online banking competition . . . 4--4
                      Anonymous   The new era of cable modems  . . . . . . 4--5
                      Anonymous   Spec for secure transactions . . . . . . 5--5
                      Anonymous   Users demand encryption policies . . . . 5--5
                      Anonymous   Cable growth potential massive . . . . . 5--5
                      Anonymous   Secure domain unit for network
                                  protection . . . . . . . . . . . . . . . 5--6
                      Anonymous   Briefing document for Internet security  6--6
                      Anonymous   Internal security across client/server
                                  networks . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Network security assessment tool for
                                  Windows NT . . . . . . . . . . . . . . . 7--7
               Thomas Kaneshige   McAfee gives the boot to virus . . . . . 7--7
               Thomas Kaneshige   Network security made easy with little
                                  black box  . . . . . . . . . . . . . . . 7--8
                   Erin English   SEC tackles Internet investment fraud    8--8
                   Erin English   Lotus working on military version of
                                  Notes  . . . . . . . . . . . . . . . . . 8--8
                     Fred Cohen   Internet holes --- Part 5b: 50 ways to
                                  attack your Web systems  . . . . . . . . 9--13
               Thomas Kaneshige   Oracle to secure database access over
                                  the Net  . . . . . . . . . . . . . . . . 9--9
                  Lesley Hanson   The impact of ATM on security in the
                                  data network . . . . . . . . . . . . . . 13--17
                     Ken Lindup   Hackers for hire . . . . . . . . . . . . 18--18
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 2, February, 1996

                      Anonymous   New version solves BIND security
                                  problems . . . . . . . . . . . . . . . . 2--2
                      Anonymous   HP \tt syslog vulnerability  . . . . . . 2--2
                      Anonymous   UDP port denial-of-service attack  . . . 2--3
                      Anonymous   Virus spreads like wild fire . . . . . . 3--3
                      Anonymous   Winword macro viruses  . . . . . . . . . 3--4
                      Anonymous   Singapore's service providers confident
                                  of security despite break-in . . . . . . 4--4
                      Anonymous   Compress and encrypt data simultaneously 4--5
                      Anonymous   The next Great Wall of China?  . . . . . 5--5
                      Anonymous   Extended password protection for
                                  CyberGuard Firewall  . . . . . . . . . . 5--5
                      Anonymous   Internet may not be profitable . . . . . 5--6
                      Anonymous   The promise of secure phone banking  . . 6--6
                      Anonymous   Remote access protection . . . . . . . . 6--6
                      Anonymous   Secure deployment of Internet services   6--6
                      Anonymous   Humans and viruses locked out  . . . . . 6--7
                John Sterlicchi   Wayfarer turns Internet into LAN . . . . 7--7
                John Sterlicchi   New moves to stimulate EDI growth  . . . 7--8
                John Sterlicchi   First NT firewall soars in . . . . . . . 8--9
                     Fred Cohen   Internet holes --- Part 6: Automated
                                  attack and defence . . . . . . . . . . . 9--14
                     Janet Osen   Sex, crimes and the Internet: the Jake
                                  Baker case . . . . . . . . . . . . . . . 15--22
                      Anonymous   Events . . . . . . . . . . . . . . . . . 24--24

Network Security
Volume 1996, Number 3, March, 1996

                      Anonymous   Corrupt information from network servers 2--2
                      Anonymous   SunSoft demo CDs contain a security
                                  threatening flaw . . . . . . . . . . . . 2--2
                      Anonymous   Internet security purchase for HP  . . . 2--3
                      Anonymous   CompuServe in Germany suffers another
                                  inquiry  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Governments pressed Tor agreement on
                                  encryption . . . . . . . . . . . . . . . 3--3
                      Anonymous   Business class Internet service  . . . . 3--4
                      Anonymous   Visa and MasterCard combine security
                                  specifications . . . . . . . . . . . . . 4--4
                      Anonymous   Integralis revenues rise 60% . . . . . . 4--4
                      Anonymous   SecurID authentication for BayRS routers 4--4
                      Anonymous   Security system for electronic cash  . . 4--4
                      Anonymous   Microsoft's Internet information server  4--5
                      Anonymous   CyberGuard's new enhancements  . . . . . 5--5
                      Anonymous   The firewall with the new dual wall  . . 5--5
                John Sterlicchi   Security technologies aid ITT transition 5--6
              Atoosa Savarnejad   Kerberos gets cracked  . . . . . . . . . 6--6
              Atoosa Savarnejad   IBM to develop secure version  . . . . . 6--6
                     Fred Cohen   Internet holes --- Part 7: The human
                                  side . . . . . . . . . . . . . . . . . . 7--10
            Philip R. Moyer and   
              E. Eugene Schultz   A systematic methodology for firewall
                                  penetration testing  . . . . . . . . . . 11--18
                     Janet Osen   The Freedom of Information Act and the
                                  2600 Club  . . . . . . . . . . . . . . . 19--19
                      Anonymous   Events 20  . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 4, April, 1996

                      Anonymous   Weaknesses in Java bytecode verifier . . 2--2
                      Anonymous   Digital OSF/1 \tt dxconsole
                                  vulnerability  . . . . . . . . . . . . . 2--2
                      Anonymous   Encryption restrictions may be eased . . 2--3
                      Anonymous   UK Government debates key escrow . . . . 3--3
                      Anonymous   ITSEC and Orange Book standards merge    3--3
              Atoosa Savarnejad   Netscape hires KPMG  . . . . . . . . . . 3--3
                      Anonymous   Netscape and GE's joint Internet venture 3--4
                      Anonymous   Net opened to British businesses . . . . 4--4
                      Anonymous   Secure electronic links to cross capital 4--4
                      Anonymous   Unix rejected, security found wanting    4--4
                      Anonymous   Alliance offers integrated business
                                  solution . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Secure Internet payments . . . . . . . . 5--5
                      Anonymous   More security for Windows NT . . . . . . 5--5
                      Anonymous   Word macro viruses detected and
                                  eliminated . . . . . . . . . . . . . . . 5--6
              Atoosa Savarnejad   IDC annual survey reveals extent of
                                  insecurity . . . . . . . . . . . . . . . 6--6
              Atoosa Savarnejad   US company offers firewall challenge . . 6--7
                   Bill Hancock   Improving network security through port
                                  switching  . . . . . . . . . . . . . . . 7--8
                     Fred Cohen   Internet holes --- Part 8: Spam  . . . . 8--10
           Charles Cresson Wood   An Internet Curmudgeon's rants . . . . . 10--11
                     Janet Osen   Bad news for bulletin boards . . . . . . 11--13
                   Bill Hancock   Can you social engineer your way into
                                  your network?  . . . . . . . . . . . . . 14--15
                      Anonymous   Events . . . . . . . . . . . . . . . . . 16--16

Network Security
Volume 1996, Number 5, May, 1996

                      Anonymous   Warning issued on new type of Word macro
                                  virus  . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Encryption battle sees possible break
                                  through  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Firewall market developments . . . . . . 2--2
                      Anonymous   Enhanced network security offered  . . . 2--3
                      Anonymous   The Internet-enabled backup solution . . 3--3
                      Anonymous   Private information sent safely over
                                  public frame relay network . . . . . . . 3--3
              Atoosa Savarnejad   Californian representative warns against
                                  cyberfraud . . . . . . . . . . . . . . . 4--4
              Atoosa Savarnejad   PGP becomes a company  . . . . . . . . . 4--4
              Atoosa Savarnejad   Cisco offers free encryption technology  4--5
                     Fred Cohen   Internet holes --- Part 9: IP address
                                  forgery and how to eliminate it  . . . . 5--12
                     Tom Parker   The role of cryptography in global
                                  communications . . . . . . . . . . . . . 13--17
            A. Padgett Peterson   Internet attack mechanisms . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 6, June, 1996

                      Anonymous   Interpreters in CGI bin directories  . . 2--2
                      Anonymous   NIS+ password tables left insecure . . . 2--2
                      Anonymous   IRIX desktop tool vulnerability  . . . . 2--2
                      Anonymous   Security hole in IIS software  . . . . . 2--3
                      Anonymous   Electronic mail encryption standards'
                                  rivalry  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Microsoft's designs for Internet
                                  security . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Managed Internet service . . . . . . . . 4--4
                      Anonymous   Internet/intranet security from Gradient
                                  and HP . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Performing Right Society's network
                                  secured  . . . . . . . . . . . . . . . . 4--4
                      Anonymous   PC Security gets investment from
                                  Motorola . . . . . . . . . . . . . . . . 4--5
                      Anonymous   OpeN/2 authorization software  . . . . . 5--5
                      Anonymous   LAN diagnostic consultancy service . . . 5--5
                      Anonymous   Single sign-on security for
                                  enterprise-wide systems  . . . . . . . . 5--6
                      Anonymous   Firewall targeted for NetWare  . . . . . 6--6
                      Anonymous   Protection for dial access systems . . . 6--6
                      Anonymous   SoftID authentication software . . . . . 6--6
                      Anonymous   Anti-virus solution for network
                                  firewalls  . . . . . . . . . . . . . . . 6--7
                     Fred Cohen   Internet holes --- Part 10: UDP viruses  7--10
            A. Padgett Peterson   E-mail security --- An oxymoron? . . . . 10--13
              E. Eugene Schultz   Building the right firewall  . . . . . . 13--17
                     Janet Osen   The Freedom of Information Act and the
                                  2600 Club  . . . . . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 7, July, 1996

                      Anonymous   Vulnerability in DEC software security
                                  kits . . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Vulnerability in the dip program . . . . 2--2
                      Anonymous   Suidperl vulnerability . . . . . . . . . 2--3
                      Anonymous   Right mouse click could allow in viruses 3--3
                      Anonymous   Security and authentication offered  . . 3--4
                      Anonymous   Businesses get help to beat Internet
                                  crime  . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Companies adopt Internet commerce
                                  solutions  . . . . . . . . . . . . . . . 4--4
                      Anonymous   Total secure networking solutions
                                  incorporates CyberGuard  . . . . . . . . 4--5
                      Anonymous   Credit-card company seeks strong
                                  encryption . . . . . . . . . . . . . . . 5--5
                      Anonymous   Barclays' pilot for electronic commerce  5--5
                      Anonymous   Librarians develop Internet protocol . . 5--6
                      Anonymous   Secure Virtual Private Networks  . . . . 6--6
                      Anonymous   Serverware launches new version of
                                  SeNTry . . . . . . . . . . . . . . . . . 6--6
                      Anonymous   IronBridge and IronWall  . . . . . . . . 6--7
                      Anonymous   CKS MyNet, the answer to single sign-on? 7--7
                John Sterlicchi   Security framework from Microsoft  . . . 7--8
              Atoosa Savarnejad   Revisions in SET mark advances to secure
                                  cyberspace shopping  . . . . . . . . . . 8--8
                     Fred Cohen   Internet holes --- Part 11: Internet
                                  lightning rods . . . . . . . . . . . . . 9--13
               Thomas Kaneshige   McAfee and Microsoft clean up Internet   9--9
                   Alan Solomon   The end of the virus problem . . . . . . 13--17
                     Ken Lindup   Superman is alive and well and living in
                                  Wapping  . . . . . . . . . . . . . . . . 18--18
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 8, August, 1996

                      Anonymous   Solaris 2.5 KCMS programs vulnerability  2--2
                      Anonymous   HP-UX vulnerabilities  . . . . . . . . . 2--2
                      Anonymous   The rdist vulnerability  . . . . . . . . 2--3
                      Anonymous   First virus capable of infecting Excel
                                  spreadsheet  . . . . . . . . . . . . . . 3--3
                      Anonymous   Joint marketing for CyberGuard and EDS   3--3
                      Anonymous   Enterprise Web solutions from Netscape
                                  and NeXT . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Usenet news via satellite  . . . . . . . 3--4
                      Anonymous   Baysecure Framework's security enhanced
                                  by ACE/Server  . . . . . . . . . . . . . 4--4
                      Anonymous   New NT virus scanner . . . . . . . . . . 4--4
                      Anonymous   CryptoSystem protects TCP/IP networks    4--5
                      Jon David   The Internet --- Gateway to your
                                  information assets . . . . . . . . . . . 5--7
                   Bill Hancock   Operating system attacks from network
                                  resources  . . . . . . . . . . . . . . . 8--11
                     Fred Cohen   Internet holes --- Part 12a: Internet
                                  incident response  . . . . . . . . . . . 12--14
               Padgett Peterson   Providing secure, recoverable e-mail . . 15--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 9, September, 1996

                      Anonymous   Vulnerability in expreserve  . . . . . . 2--2
                      Anonymous   Security problem in fm\_fls  . . . . . . 2--2
                      Anonymous   Virus fears for new operating systems    2--2
                      Anonymous   Merge creates mega security response
                                  team . . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Secure banking and shopping on Internet  3--3
                      Anonymous   Internet security offerings from HP  . . 3--3
                      Anonymous   Agreement reached between Microsoft and
                                  RSA  . . . . . . . . . . . . . . . . . . 3--4
                      Anonymous   Name change for Digital Pathways . . . . 4--4
                      Anonymous   On-LAN authentication for Windows NT . . 4--4
                      Anonymous   Digital resells Raptor's security
                                  products . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Encryption without key exchange  . . . . 4--5
                      Anonymous   The next Eagle from Raptor . . . . . . . 5--5
                      Anonymous   Further protection from E-mail viruses   5--5
                     Tim Persyn   Journalists take to hacking  . . . . . . 5--5
                  Andrianne Bee   US government allows selling of strong
                                  encryption to US clients . . . . . . . . 6--6
                  Andrianne Bee   NCSA programme certifies Web sites . . . 6--6
                   Sarah Gordon   Are good virus simulators still a bad
                                  idea?  . . . . . . . . . . . . . . . . . 7--13
                     Fred Cohen   Internet holes --- Part 12(b): Internet
                                  incident response  . . . . . . . . . . . 13--17
                     Janet Osen   The Virtual Magistrate [Project] . . . . 18--18
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 10, October, 1996

                      Anonymous   TCP SYN flooding and IP spoofing attacks 2--2
                      Anonymous   Further sendmail vulnerabilities . . . . 2--3
                      Anonymous   Irina, a hoax not a virus  . . . . . . . 3--3
                      Anonymous   Corporations fear ICE\_T virus emergence 3--3
                      Anonymous   Key escrow becomes key recovery  . . . . 3--4
                      Anonymous   Further doubts emerge over NT security   4--4
                      Anonymous   Privacy advocates not appeased by key
                                  recovery . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Reflex creates macro virus trapper . . . 4--4
                      Anonymous   The Authorizer firewall, protection for
                                  X25 networks . . . . . . . . . . . . . . 5--5
                      Anonymous   Virus scanner for X.400 messaging system 5--5
              Atoosa Savarnejad   Multi-discipline alliance spans all
                                  security aspects . . . . . . . . . . . . 5--5
              Atoosa Savarnejad   Netsolve launches first ISP-independent
                                  outsourcing product  . . . . . . . . . . 6--6
                   Adrianne Bee   Soon even the Internet will take
                                  American Express . . . . . . . . . . . . 6--7
                     Fred Cohen   Internet holes --- Part 13: The SYN
                                  flood  . . . . . . . . . . . . . . . . . 7--9
                      Jon David   Sniffers --- The whole story . . . . . . 9--13
                     Janet Osen   The Communications Decency Act and the
                                  karma of chaos --- Part 1  . . . . . . . 13--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 11, November, 1996

                      Anonymous   Sendmail daemon mode vulnerability . . . 2--2
                      Anonymous   Hackers not deterred by certification
                                  scheme . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Invasion of Supreme Court's homepage . . 2--2
                      Anonymous   Netscape Navigator virus scare . . . . . 2--2
                      Anonymous   Survey reveals Internet-borne viruses on
                                  increase . . . . . . . . . . . . . . . . 3--3
              Michael McCormack   Content self-regulation recommended  . . 3--3
                      Anonymous   Combatants of Internet porn  . . . . . . 3--4
                      Anonymous   Internet commerce hampered by security
                                  fears  . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Smartcards vulnerable to new attack  . . 4--4
                      Anonymous   TV Web-surfing device breaks export
                                  regulations  . . . . . . . . . . . . . . 4--4
                      Anonymous   Users experience major problems with
                                  networks . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Japanese company buys into security
                                  market . . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Secure access for Internet/intranet
                                  connectivity . . . . . . . . . . . . . . 5--5
                      Anonymous   Hacker-proof system for data coding  . . 5--5
                      Anonymous   Internet Transaction Processing
                                  solutions  . . . . . . . . . . . . . . . 5--6
                      Anonymous   Cisco's firewall for Internet/intranet   6--6
                   Adrianne Bee   How cyber-safe is your company?  . . . . 6--7
                   Adrianne Bee   Vendor alliances aim to make Internet
                                  safe for business  . . . . . . . . . . . 7--7
                   Adrianne Bee   Cyber stamps . . . . . . . . . . . . . . 7--8
               Thomas Kaneshige   Vendors rally for answers to Panix
                                  Attacks  . . . . . . . . . . . . . . . . 8--8
               Thomas Kaneshige   Microsoft's catapult raises NT firewall
                                  bar  . . . . . . . . . . . . . . . . . . 8--9
                      Jon David   The future of PGP on the Internet  . . . 9--12
                     Janet Osen   The Communications Decency Act --- Part
                                  2: The language of the Communications
                                  Decency Act  . . . . . . . . . . . . . . 12--18
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1996, Number 12, December, 1996

                      Anonymous   HP 9000 access vulnerability . . . . . . 2--2
                      Anonymous   Password buffer over-run vulnerability   2--2
                      Anonymous   fpkg2swpkg program vulnerability . . . . 2--2
                      Anonymous   newgrp buffer over-run vulnerability . . 2--3
                      Anonymous   Computer security concerns ranked low in
                                  survey . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Internet shopping secured by SET for
                                  Taiwanese  . . . . . . . . . . . . . . . 3--3
                      Anonymous   Hardware encryption technology complies
                                  with encryption regulations  . . . . . . 4--4
                      Anonymous   Extending copyright protection for the
                                  Internet . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Increase in business users needing the
                                  Internet . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Electronic fingerprint identifies owner
                                  of image . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Global Internet commerce . . . . . . . . 5--5
                      Anonymous   PICS recommended for Internet  . . . . . 5--5
                      Anonymous   Kane Security Analyst assesses network
                                  virus protection . . . . . . . . . . . . 5--5
                      Anonymous   Electronic privacy device from Harris    6--6
                      Anonymous   New software security token  . . . . . . 6--6
                      Anonymous   Protection for electronic business
                                  communications . . . . . . . . . . . . . 6--7
                      Anonymous   Internet security for Windows NT
                                  environments . . . . . . . . . . . . . . 7--7
                   Wayne Madsen   Congressional Committee looks at US
                                  encryption policy  . . . . . . . . . . . 7--8
                     Fred Cohen   Managing network security --- Part 1:
                                  How good do you have to be?  . . . . . . 9--11
                      Jon David   Auditing the Internet  . . . . . . . . . 11--14
               Sarah Gordon and   
                   Richard Ford   Real world anti-virus product reviews
                                  and evaluations --- Part 1 . . . . . . . 14--18
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20


Network Security
Volume 1997, Number 1, January, 1997

                      Anonymous   Korn shell \tt suid\_exec vulnerability  2--2
                      Anonymous   Vulnerabilities in SGI IRIX  . . . . . . 2--2
                      Anonymous   Denial of service attack via ping  . . . 3--3
                      Anonymous   Computer attacks against WebCom  . . . . 3--4
                      Anonymous   Government's Web site attacked by
                                  hackers  . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Tightening of encryption regulations in
                                  Japan  . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Encryption compromise on rocky ground    4--5
                      Anonymous   Eagle provides security for Internet
                                  product  . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Panel urges better protection  . . . . . 5--5
                      Anonymous   The season for virus hoaxes  . . . . . . 5--5
                      Anonymous   Axent acquires AssureNet pathways  . . . 5--6
                      Anonymous   Worldwide single-point security  . . . . 6--6
                      Anonymous   Enhanced remote access security  . . . . 6--6
                      Anonymous   Public key smartcard available . . . . . 6--6
                      Anonymous   Desktop encryption utility . . . . . . . 7--7
                      Anonymous   Security for vulnerable high speed
                                  networks . . . . . . . . . . . . . . . . 7--7
                 Danthanh Huynh   Professor criticizes Web security  . . . 7--7
                     Fred Cohen   Managing network security --- Part 2:
                                  Where should we concentrate protection?  8--11
               Sarah Gordon and   
                   Richard Ford   Real world anti-virus product reviews
                                  and evaluations --- Part 2 . . . . . . . 11--18
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 2, February, 1997

                      Anonymous   Vulnerability in \tt rlogin/Term . . . . 2--2
                      Anonymous   MIME conversion buffer overflow  . . . . 2--3
                      Anonymous   RSA's $ 40$-bit encryption algorithm
                                  cracked  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   talkd vulnerability  . . . . . . . . . . 3--3
                      Anonymous   The holes in online security . . . . . . 3--3
                      Anonymous   Electronic commerce hindered by fear of
                                  crime  . . . . . . . . . . . . . . . . . 3--4
                      Anonymous   US DoD COTS snafu  . . . . . . . . . . . 4--4
                      Anonymous   Companies form group to support
                                  cross-platform encryption  . . . . . . . 4--4
                      Anonymous   Exploit intranets without compromising
                                  security . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Power-cached Internet/intranet gateway   5--5
                      Anonymous   Security for enterprise Internet
                                  applications . . . . . . . . . . . . . . 5--5
                      Anonymous   Anti-virus protection for Office 97  . . 5--5
                      Anonymous   Virus found on Linux system  . . . . . . 5--6
                   Adrianne Bee   The latest on encryption . . . . . . . . 6--7
              Atoosa Savarnejad   Intranet firewalls susceptible to
                                  internal attacks . . . . . . . . . . . . 7--7
              Atoosa Savarnejad   Warning issued, flaw in Unix software    7--7
              E. Eugene Schultz   When firewalls fail: Lessons learned
                                  from firewall testing  . . . . . . . . . 8--11
                     Fred Cohen   Managing Network Security --- Part 3:
                                  Network security as a control issue  . . 12--15
             David Aubrey-Jones   Internet --- Virusnet? . . . . . . . . . 15--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 3, March, 1997

                      Anonymous   Bug found in Java Virtual Machine  . . . 2--2
                      Anonymous   Flaw found in Internet Explorer  . . . . 2--2
                      Anonymous   httpd nph-test-cgi script vulnerability  2--2
                      Anonymous   Encryption key of 48 bits cracked  . . . 2--2
                      Anonymous   French companies restricted from using
                                  high-end encryption  . . . . . . . . . . 3--3
                      Anonymous   PGP encryption heavily criticized  . . . 3--3
                      Anonymous   Vulnerability in InterNetNews server . . 3--3
                     Roy Szweda   Finjan introduces ActiveX Security
                                  Manager  . . . . . . . . . . . . . . . . 3--4
                      Anonymous   ACE/Server Access Manager launched . . . 4--4
                     Roy Szweda   NCSA supports new TIS ForceField . . . . 4--5
              Atoosa Savarnejad   IBM launches SecureWay . . . . . . . . . 5--5
              Atoosa Savarnejad   eTrust to roll out in second quarter . . 5--6
                   Bill Hancock   The US cryptographic export debate ---
                                  Round five?  . . . . . . . . . . . . . . 6--7
                     Fred Cohen   Managing network security --- Part 4:
                                  Integrity first, usually . . . . . . . . 8--10
                     Janet Osen   The medium is the message: a media
                                  specific analysis of the Communications
                                  Decency Act  . . . . . . . . . . . . . . 10--16
                     Janet Osen   For whom the modem tolls: The travails
                                  of America Online  . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 4, April, 1997

                      Anonymous   Explorer security still patchy . . . . . 2--2
                      Anonymous   Vulnerability in IMAP and POP  . . . . . 2--2
                      Anonymous   Current attacks on news servers  . . . . 2--3
                      Anonymous   VirusPatrol keeps Internet users virus
                                  free . . . . . . . . . . . . . . . . . . 3--3
                     Roy Szweda   Rainbow supports Netscape's open
                                  multi-platform security  . . . . . . . . 3--3
                      Anonymous   Strong encryption available worldwide    3--4
                      Anonymous   MicroLan Systems joins CSAPP . . . . . . 4--4
                     Roy Szweda   AT&T/Mondex deal enables Web
                                  `micropayments'  . . . . . . . . . . . . 4--4
                      Anonymous   File security uses smartcard and RSA
                                  encryption . . . . . . . . . . . . . . . 5--5
                      Anonymous   Enhanced security features for Netscape
                                  web servers  . . . . . . . . . . . . . . 5--5
                      Anonymous   Secure virtual private networking over
                                  the Internet . . . . . . . . . . . . . . 5--6
                      Anonymous   MIMEsweeper redefines Web/E-mail
                                  security . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Lotus Domino anti-virus solution . . . . 6--6
                      Anonymous   Easy authentication and signature
                                  verification . . . . . . . . . . . . . . 6--6
              Atoosa Savarnejad   Having your cookies and eating them too  6--7
              Atoosa Savarnejad   IBM and TIS strike an agreement  . . . . 7--8
              Atoosa Savarnejad   Cisco allies with industry leaders for
                                  security initiative  . . . . . . . . . . 8--8
                Philip R. Moyer   Enhanced firewall infrastructure testing
                                  methodology  . . . . . . . . . . . . . . 9--15
                     Fred Cohen   Managing network security --- Part 5:
                                  Risk management or risk analysis . . . . 15--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 5, May, 1997

                      Anonymous   Vulnerability in \tt libXt . . . . . . . 2--2
                      Anonymous   Natural language service libraries
                                  vulnerability  . . . . . . . . . . . . . 2--3
                      Anonymous   Java applets that steal computer cycles  3--3
                      Anonymous   Vulnerabilities in pluggable
                                  authentication module  . . . . . . . . . 3--3
                      Anonymous   High profile Web sites warrant high
                                  security . . . . . . . . . . . . . . . . 3--4
                      Anonymous   NT systems shut down by Telnet hack  . . 4--4
                      Anonymous   Secure E-commerce for insurers . . . . . 4--4
                      Anonymous   Microsoft closes E-mail service  . . . . 4--4
                      Anonymous   Cellular phone fraud prevention working? 4--5
                      Anonymous   Internet used as Trojan horse  . . . . . 5--5
                      Anonymous   Providers divided over Internet proposal 5--5
                      Anonymous   Intranets to far out-number Internet . . 5--6
                      Anonymous   Networks flooded with E-mail messages    6--6
                      Anonymous   Global anti-virus research programme
                                  launched . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Integrated network security products . . 6--6
                      Anonymous   Multi-tier Unix security product offered 7--7
                      Anonymous   New detection system takes on
                                  multi-million phone fraud  . . . . . . . 7--8
                      Anonymous   Detection and repair for new online
                                  virus  . . . . . . . . . . . . . . . . . 8--8
                      Anonymous   Remote access solution to encrypt data   8--8
               Douglas Sechrist   Internet phone calls breaking through
                                  corporate firewalls  . . . . . . . . . . 8--9
              Atoosa Savarnejad   Sparks fly over NT security  . . . . . . 9--10
              Charlie Breitrose   Hackers hit ISPs by the dozens . . . . . 9--9
              Atoosa Savarnejad   Another NT security hole discovered  . . 10--11
                      Ian Capen   Check Point announces security software
                                  alliance . . . . . . . . . . . . . . . . 11--11
                      Anonymous   To catch a thief \ldots unmasking the
                                  telecoms fraudster . . . . . . . . . . . 12--13
                     Fred Cohen   Managing network security --- Part 6:
                                  Computer games and network security
                                  management . . . . . . . . . . . . . . . 14--18
                     Ken Lindup   Would Lenin make a good security
                                  officer? . . . . . . . . . . . . . . . . 19--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 6, June, 1997

                      Anonymous   Metamail vulnerability . . . . . . . . . 2--2
                      Anonymous   IRIX \tt runpriv program vulnerability   2--3
                      Anonymous   Vulnerability with Solaris 2.x PC buffer
                                  overflow . . . . . . . . . . . . . . . . 3--3
              Atoosa Savarnejad   ISP security consortium formed . . . . . 4--4
                      Anonymous   Internet is on its own . . . . . . . . . 4--4
                      Anonymous   NSA sued for algorithm . . . . . . . . . 4--4
                      Anonymous   Experts claim DTI's scheme has
                                  catastrophic flaws . . . . . . . . . . . 4--5
                      Anonymous   Worldwide debut for SKIP . . . . . . . . 5--5
                      Anonymous   Breakthrough for UK firm with US
                                  encryption restrictions  . . . . . . . . 5--5
                      Anonymous   Low data rate communications security
                                  improved . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Data protected at most finite level  . . 5--6
                      Anonymous   Encryption and authentication for Java   6--6
                      Anonymous   NT-based firewall for mixed TCP/IP and
                                  IPX networks . . . . . . . . . . . . . . 6--6
              Atoosa Savarnejad   Princeton team uncovers flaw in Java . . 6--7
              Atoosa Savarnejad   AOL4FREE makes second round as Trojan
                                  horse infection  . . . . . . . . . . . . 7--7
              Charlie Breitrose   Trend Micro offers free virus protection
                                  from the Web . . . . . . . . . . . . . . 7--7
                  Lesley Hansen   Network infrastructure security  . . . . 8--12
                     Fred Cohen   Managing network security --- Part 7:
                                  Prevent, detect and respond  . . . . . . 13--16
                  Stephen Saxby   Policies for cyberspace --- Illegal
                                  content on the Internet  . . . . . . . . 16--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 7, July, 1997

              Charlie Breitrose   Computer hacking glitch for Ramsey
                                  murder investigators . . . . . . . . . . 2--2
                      Anonymous   Netscape Navigator security problem  . . 2--2
                      Anonymous   Solaris solstice AdminSuite
                                  vulnerabilities  . . . . . . . . . . . . 3--3
                      Anonymous   Vulnerability in the at(1) program . . . 3--4
                     Roy Szweda   Ernst & Young LLP --- WheelGroup Corp.
                                  alliance . . . . . . . . . . . . . . . . 4--4
                      Anonymous   SunOS \tt chkey vulnerability  . . . . . 4--4
                      Anonymous   Alliance provides Internet security to
                                  large enterprises  . . . . . . . . . . . 4--5
              Atoosa Savarnejad   Microsoft to offer enhanced firewall
                                  features in new server . . . . . . . . . 5--5
                      Anonymous   Lucent Technologies to resell Raptor's
                                  firewalls  . . . . . . . . . . . . . . . 5--5
                      Anonymous   AOL users hit further problems with
                                  hackers  . . . . . . . . . . . . . . . . 6--6
                     Roy Szweda   Sun takes on Feds over US encryption
                                  regulations  . . . . . . . . . . . . . . 6--6
              Charlie Breitrose   Microsoft joins Web security consortium  6--7
                     Roy Szweda   Holographic fingerprint security device  7--7
                      Anonymous   US export licence for $ 128$-bit
                                  encryption for Microsoft . . . . . . . . 7--7
                     Roy Szweda   Encryption software for Windows  . . . . 8--8
                      Anonymous   SessionWall-3 protects organizations
                                  from abuse . . . . . . . . . . . . . . . 8--8
                      Anonymous   Enhancements to improve model for
                                  signing Internet Code  . . . . . . . . . 8--8
              Atoosa Savarnejad   Group asks for disclosure of travel
                                  records of crypto czar . . . . . . . . . 8--9
              Charlie Breitrose   American legislators debate encryption
                                  laws . . . . . . . . . . . . . . . . . . 9--10
              Charlie Breitrose   Web security group unveils certification
                                  programme  . . . . . . . . . . . . . . . 10--10
                   Wayne Madsen   Key Escrow Encryption Bill hits Congress 11--12
                     Fred Cohen   Managing network security --- Part 8:
                                  Relativistic risk assessment . . . . . . 13--14
                 Eugene Schultz   Book Review: \booktitleInternet
                                  security: Risk analysis, strategies, and
                                  firewalls: Othmar Kyas, International
                                  Thomson Computer Press, 1997 . . . . . . 15--15

Network Security
Volume 1997, Number 8, August, 1997

                      Anonymous   Windows NT NtOpenProcessToken
                                  vulnerability  . . . . . . . . . . . . . 2--2
                      Anonymous   Vulnerability in ld.so . . . . . . . . . 2--2
                      Anonymous   Security vulnerability in Lynx temporary
                                  files and \tt LYDownload.c . . . . . . . 3--3
                John Sterlicchi   Anti-spam hacker succeeds  . . . . . . . 3--4
                      Anonymous   Java bugs give openings to hackers . . . 4--4
                      Anonymous   Netscape fixes latest Navigator bug  . . 4--4
                      Anonymous   INN news server vulnerabilities  . . . . 4--5
                      Anonymous   PGP allowed limited export . . . . . . . 5--5
                      Anonymous   Bank of Ireland uses SET first in Europe 5--5
                      Anonymous   Cisco joins Java security alliance . . . 5--5
                     Roy Szweda   CyberGuard gains E3 certification from
                                  Australian Government  . . . . . . . . . 5--6
                      Anonymous   New security modem announced . . . . . . 6--6
                      Anonymous   Secure access to dedicated Web pages . . 6--6
                      Anonymous   SecurlD authentication protects
                                  corporate information  . . . . . . . . . 6--7
                      Anonymous   Global public key security for PCs . . . 7--7
                     Roy Szweda   Secure Computing unveils NT firewall . . 7--7
                   Bill Hancock   Virtual private networks: What, why,
                                  when, where and how  . . . . . . . . . . 8--11
                     Fred Cohen   Managing network security --- Part 9:
                                  Penetration testing? . . . . . . . . . . 12--15
                    Andrew Shaw   Voice verification --- Authenticating
                                  remote users over the telephone  . . . . 16--18
              E. Eugene Schultz   Book Review: \booktitleIntranet
                                  firewalls: Scott Fuller and Kevin Pagan,
                                  Ventana Press, 1997  . . . . . . . . . . 19--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 9, September, 1997

                      Anonymous   Security compromise via procfs . . . . . 2--2
                      Anonymous   SunOS, Solaris \tt ifconfig ioctls
                                  vulnerability  . . . . . . . . . . . . . 2--2
                      Anonymous   SGI, IRIX webdist.cgi, handler and wrap
                                  programs vulnerabilities . . . . . . . . 2--3
                     Roy Szweda   AT&T sues Connect America and others for
                                  Internet scam  . . . . . . . . . . . . . 3--3
                      Anonymous   Further relaxing of export regulations
                                  makes Internet more secure . . . . . . . 3--3
                     Roy Szweda   CNN asked to remove Web link . . . . . . 4--4
                      Anonymous   RSA publishes RC2 specification  . . . . 4--4
                     Roy Szweda   Playboy files Telecom Act protest  . . . 4--5
                      Anonymous   Companies provide secure Internet
                                  roaming capabilities . . . . . . . . . . 5--5
                      Anonymous   CyberGuard joins alliance programme in
                                  Singapore  . . . . . . . . . . . . . . . 5--5
                      Anonymous   Multi-tier network security from McAfee  5--5
                      Anonymous   HTML-driven remote authentication  . . . 6--6
                      Anonymous   Product protects network from
                                  Internet-based attacks . . . . . . . . . 6--6
              Atoosa Savarnejad   E-mail firewall uses S/MIME protocol . . 6--7
              Charlie Breitrose   Distributing encrypted messages more
                                  securely . . . . . . . . . . . . . . . . 7--7
                     Fred Cohen   Managing network security --- Part 10:
                                  Change your password . . . . . . . . . . 8--11
                     Janet Osen   In the battle of the bits --- Final
                                  score: Internet 1, Congress 0  . . . . . 12--16
                 Winn Schwartau   What exactly is information warfare? ---
                                  Part 1 . . . . . . . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 10, October, 1997

                      Anonymous   Businesses using Net could face
                                  blackmail  . . . . . . . . . . . . . . . 2--2
                      Anonymous   Buffer overflow problem in rdist . . . . 2--2
                      Anonymous   SGI IRIX LOCKOUT and login/scheme
                                  vulnerabilities  . . . . . . . . . . . . 2--3
                      Anonymous   Ministry's encryption policy criticized  3--4
                     Roy Szweda   CompuServe barbecues spam  . . . . . . . 4--4
                     Roy Szweda   Encrypted communications frustrate FBI   4--4
                      Anonymous   Every Swede to have personal E-mail
                                  address  . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Completely secure Internet connection on
                                  offer  . . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Internet security for business to
                                  business applications  . . . . . . . . . 5--5
                      Anonymous   Java applets run from a `cage' . . . . . 5--6
                      Anonymous   Military-level encryption for all data
                                  transmissions  . . . . . . . . . . . . . 6--6
              Charlie Breitrose   Virtual envelope for E-mail  . . . . . . 6--6
                      Anonymous   High performance solution to IP security
                                  needs  . . . . . . . . . . . . . . . . . 6--7
                      Anonymous   JCP launches secure Internet
                                  transactions protocol  . . . . . . . . . 7--8
                    E. D. Wehde   Netscape fixes bugs  . . . . . . . . . . 8--8
                    E. D. Wehde   Microsoft helps banks  . . . . . . . . . 8--9
                    E. D. Wehde   US gets tough on encryption  . . . . . . 9--10
                 Eugene Schultz   Hackers and penetration testing  . . . . 10--10
                     Ken Lindup   Take one large bomb  . . . . . . . . . . 10--11
                 Winn Schwartau   What exactly is information warfare? ---
                                  Part 2 . . . . . . . . . . . . . . . . . 12--16
                     Fred Cohen   Managing network security --- Part 11:
                                  To outsource or not to outsource, that
                                  is the question! . . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1997, Number 11, November, 1997

                      Anonymous   sysdef command vulnerability . . . . . . 2--2
                      Anonymous   ftpd/rlogind vulnerabilities . . . . . . 2--2
                      Anonymous   Vulnerability in rlogin  . . . . . . . . 2--3
                     Roy Szweda   Flaw found in Yahoo E-mail security
                                  \ldots . . . . . . . . . . . . . . . . . 3--3
                     Roy Szweda   \ldots And Jabadoo in Explorer 4 browser 3--3
                      Anonymous   Open Group OSF/DCE denial-of-service
                                  vulnerability  . . . . . . . . . . . . . 3--4
                      Anonymous   White paper urges risk assessment before
                                  connection . . . . . . . . . . . . . . . 4--4
                      Anonymous   World's first SET completed  . . . . . . 5--5
                      Anonymous   Passive hacking, the latest craze  . . . 5--5
                      Anonymous   McAfee and Network General combine . . . 5--5
                      Anonymous   Four continents bridged by secured VPN   5--6
                      Anonymous   SecurVPN for secure remote access  . . . 6--6
                      Anonymous   Industrial strength E-mail virus
                                  protection . . . . . . . . . . . . . . . 6--6
                      Anonymous   New `plug and play' cryptographic
                                  accelerators available . . . . . . . . . 6--6
                      Anonymous   Encryption for Windows 95  . . . . . . . 7--7
                      Anonymous   Applet Management System for secure Java
                                  implementation . . . . . . . . . . . . . 7--7
                     Frank Rees   Australian Government obstructs the
                                  export of revolutionary encryption . . . 7--8
                     Fred Cohen   Managing network security --- Part 13:
                                  The network security game  . . . . . . . 9--11
                 Winn Schwartau   What exactly is information warfare? ---
                                  Part 3 . . . . . . . . . . . . . . . . . 12--18
                     Berni Dwan   Book Review: \booktitleWeb psychos,
                                  stalkers and pranksters how to protect
                                  yourself in cyberspace: Banks, Michael
                                  A., Coriolis Group Books, \$24.99} . . . 19--20

Network Security
Volume 1997, Number 12, December, 1997

                      Anonymous   SGI IRIX vulnerabilities . . . . . . . . 2--2
                      Anonymous   View your neighbours' data using Wave    2--3
                      Anonymous   Vulnerabilities in GlimpseHTTP and
                                  WebGlimpse . . . . . . . . . . . . . . . 3--3
                      Anonymous   Attacker executes arbitrary commands on
                                  WWW server . . . . . . . . . . . . . . . 3--4
                     Roy Szweda   Firewall market continues impressive
                                  growth . . . . . . . . . . . . . . . . . 4--4
                     Roy Szweda   Billion dollar programme to fight cyber
                                  threats  . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Diffie--Hellman encryption freely
                                  available  . . . . . . . . . . . . . . . 5--5
                      Anonymous   Net hijacker caught by FBI . . . . . . . 5--5
                      Anonymous   VPN provides secure remote access  . . . 5--5
                      Anonymous   Secure online banking solution offered   6--6
                      Anonymous   Puerto Rican Government chooses TVD  . . 6--6
                      Anonymous   Network monitoring with SessionWall-3    6--6
                     Roy Szweda   VistaNet security briefing issued  . . . 6--6
                      Anonymous   Remote network access via local phone
                                  call . . . . . . . . . . . . . . . . . . 7--7
                      Anonymous   ActiveX scanned at the gateway . . . . . 7--7
                      Anonymous   Enterprise security for Web-based
                                  applications . . . . . . . . . . . . . . 7--8
                Barbara Gengler   EDI-based fraud prevention for cellular
                                  phones . . . . . . . . . . . . . . . . . 8--8
                Barbara Gengler   Axent upgrades Unix Privilege Manager    8--9
                Barbara Gengler   Bovine RC5 Effort  . . . . . . . . . . . 9--10
                       Ed Wehde   War against spam . . . . . . . . . . . . 10--10
                     Fred Cohen   Managing network security --- Part 14:
                                  50 Ways to defeat your intrusion
                                  detection system . . . . . . . . . . . . 11--14
                  David Hopwood   A comparison between Java and ActiveX
                                  security . . . . . . . . . . . . . . . . 15--20


Network Security
Volume 1998, Number 1, January, 1998

                      Anonymous   Editorial Board  . . . . . . . . . . . . 1--1
                      Anonymous   The `smurf' denial-of-service attack . . 2--2
                      Anonymous   Yahoo! threatened by hackers . . . . . . 2--3
                      Anonymous   The ftp bounce problem . . . . . . . . . 3--3
                      Anonymous   statd buffer over-run vulnerability  . . 3--4
                      Anonymous   No export approvals required for key
                                  recovery toolkit . . . . . . . . . . . . 4--4
                      Anonymous   Action plan for safe Internet use  . . . 4--4
                      Anonymous   Safety of encrypted files questioned . . 4--5
                      Anonymous   Firewall offers advanced filtering
                                  capabilities . . . . . . . . . . . . . . 5--5
                      Anonymous   Speedy, secure remote access offering    5--6
                      Anonymous   Suite offers protection against viruses,
                                  hostile applets and hackers  . . . . . . 6--6
                      Anonymous   New Gauntlet has VPN capabilities  . . . 6--6
                      Anonymous   Credit card fraud on Internet explodes   6--7
                   Wayne Madsen   Cryptography protected under US
                                  constitution . . . . . . . . . . . . . . 7--8
                      Anonymous   The future of Internet/intranet security 8--9
              E. Eugene Schultz   Securing third-party connections . . . . 10--13
                   Bill Hancock   Automated intrusion detection systems
                                  and network security . . . . . . . . . . 14--15
                     Fred Cohen   Managing network security --- Part 15:
                                  Y2K alternative solutions  . . . . . . . 16--18
                     Ian Penman   The Tasini case  . . . . . . . . . . . . 19--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1998, Number 2, February, 1998

                      Anonymous   Vulnerabilities in common desktop
                                  environment  . . . . . . . . . . . . . . 2--2
                      Anonymous   Vulnerability in ssh-agent . . . . . . . 2--2
                      Anonymous   Macro viruses updated  . . . . . . . . . 2--3
                      Anonymous   SET compliance tested  . . . . . . . . . 3--3
                      Anonymous   Companies merge to give UK network
                                  security . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Key recovery heavily criticized by
                                  expert . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   C2Net and nCipher join forces for
                                  security's sake  . . . . . . . . . . . . 4--4
                      Anonymous   Cryptographic accelerators support key
                                  management . . . . . . . . . . . . . . . 4--4
                      Anonymous   Kill unwanted E-mail messages  . . . . . 4--4
                      Anonymous   Preemptive action against network
                                  attacks  . . . . . . . . . . . . . . . . 4--5
                Barbara Gengler   Netect's detection tool  . . . . . . . . 5--5
                       Ed Wehde   RSA challenge  . . . . . . . . . . . . . 5--6
                       Ed Wehde   HP, Cisco secure . . . . . . . . . . . . 6--6
                     Fred Cohen   Managing network security --- The
                                  management of fear . . . . . . . . . . . 7--9
                Marie A. Wright   A look at public key certificates  . . . 10--13
           Charles Cresson Wood   Essential controls for Internet
                                  electronic commerce  . . . . . . . . . . 13--18
               Nigel Miller and   
                  Claire Frater   Shetland squabbles or worldwide
                                  wrangles?  . . . . . . . . . . . . . . . 18--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1998, Number 3, March, 1998

                      Anonymous   Microsoft Windows long file names
                                  exploited  . . . . . . . . . . . . . . . 2--2
                      Anonymous   IBM AIX \tt telnet denial-of-service . . 2--2
                      Anonymous   volrmmount program vulnerability . . . . 3--3
                      Anonymous   Confidentiality of E-mail sites in UK
                                  jeopardized  . . . . . . . . . . . . . . 3--3
                      Anonymous   US exports constraints removed for TIS   3--4
                      Anonymous   Encryption for Web-based banking
                                  applications . . . . . . . . . . . . . . 4--4
                      Anonymous   Data protection and disaster recovery
                                  for enterprise computing . . . . . . . . 4--4
                      Anonymous   E-mail and Web content security solution 4--4
                Barbara Gengler   Microsoft fix  . . . . . . . . . . . . . 4--5
                       Ed Wehde   Security breakthrough from Bell Labs . . 5--6
                       Ed Wehde   Lotus moves to fix security flaws  . . . 6--7
                   Wayne Madsen   State Department misses boat on telecom
                                  snooping . . . . . . . . . . . . . . . . 7--7
                   Wayne Madsen   Uncle Sam's crypto road show . . . . . . 8--13
                     Fred Cohen   Managing network security --- Red
                                  teaming  . . . . . . . . . . . . . . . . 13--15
              E. Eugene Schultz   Planning for Windows NT 5.0 security . . 15--20

Network Security
Volume 1998, Number 4, April, 1998

                      Anonymous   Solaris \tt rpc.cmsd vulnerability . . . 2--2
                      Anonymous   The truth about cookies  . . . . . . . . 2--2
                      Anonymous   Attackers cause denial-of-service  . . . 2--3
                      Anonymous   Shore up your defences, warns Microsoft  3--3
                      Anonymous   Sun finds \tt vacation vulnerability . . 3--3
                      Anonymous   FreeBSD mmap vulnerability . . . . . . . 3--3
                      Anonymous   Vulnerability in FreeBSD derived stacks  3--4
                      Anonymous   Buffer over-runs allow arbitrary
                                  commands . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Zergo announces acquisition of PKI
                                  company  . . . . . . . . . . . . . . . . 4--4
                      Anonymous   IT managers fail to receive support for
                                  security policies  . . . . . . . . . . . 5--5
                      Anonymous   The cryptographic debate rages on  . . . 5--5
                      Anonymous   Alliance brings full strength encryption
                                  to Europe  . . . . . . . . . . . . . . . 5--5
                      Anonymous   Data recovery and anti-virus companies
                                  unite  . . . . . . . . . . . . . . . . . 5--6
                      Anonymous   Fred Cohen & Associates introduces new
                                  NetScan service  . . . . . . . . . . . . 6--6
                      Anonymous   File security system for business
                                  networks . . . . . . . . . . . . . . . . 6--6
                      Anonymous   E-commerce security increased by
                                  encryption suite . . . . . . . . . . . . 6--7
                      Anonymous   Solving the insecurities of Internet
                                  commerce . . . . . . . . . . . . . . . . 7--7
                      Anonymous   Automatic detection for breaches . . . . 7--7
                      Anonymous   Hackers own methods turned against them  7--7
                      Anonymous   Virus security combined with network
                                  security . . . . . . . . . . . . . . . . 8--8
                      Anonymous   Threat to E-commerce still significant   8--9
                Barbara Gengler   Shredder software  . . . . . . . . . . . 9--9
                   Wayne Madsen   European firestorm over Brussel's report 10--11
                     Fred Cohen   Managing network security --- The
                                  unpredictability of defence  . . . . . . 12--14
                     Janet Osen   Online privacy issues: The other Tim
                                  McVeigh  . . . . . . . . . . . . . . . . 15--18
                   Nigel Miller   Employees on the net . . . . . . . . . . 18--20

Network Security
Volume 1998, Number 5, May, 1998

                      Anonymous   Multiple vulnerabilities in BIND . . . . 2--2
                      Anonymous   Open Group reveals vulnerabilities . . . 2--3
                      Anonymous   Cell phone system weakened to allow
                                  surveillance . . . . . . . . . . . . . . 3--4
                      Anonymous   Call for safe E-commerce exceeding
                                  predictions  . . . . . . . . . . . . . . 4--4
                      Anonymous   Name change for Integralis . . . . . . . 4--4
                      Anonymous   Partnership to secure against cybercrime 4--4
                      Anonymous   Strong authentication protects Windows
                                  NT . . . . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Cryptographic solution for E-commerce
                                  security . . . . . . . . . . . . . . . . 5--5
                Barbara Gengler   Outsiders break into Fortune 1000
                                  companies  . . . . . . . . . . . . . . . 5--6
                   Thomas Zizzo   Ascend router security concerns  . . . . 6--6
                   Wayne Madsen   Key Escrow flawed  . . . . . . . . . . . 6--7
                   Wayne Madsen   Encryption debate rages again  . . . . . 8--9
           Gilliaume Oosthuizen   Security issues related to E-commerce    10--11
                     Fred Cohen   Managing network security: Risk staging  12--15
                    Dario Forte   Is Java really secure? . . . . . . . . . 15--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1998, Number 6, June, 1998

                      Anonymous   SGI, IRIX vulnerabilities  . . . . . . . 2--3
                      Anonymous   3Com passwords stolen  . . . . . . . . . 3--3
                      Anonymous   Vulnerability found in Advanced File
                                  System Utility . . . . . . . . . . . . . 3--3
                      Anonymous   More Web sites vulnerable to hackers . . 3--4
                      Anonymous   Smartcard integration to intranet
                                  security . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Deploy applications securely over the
                                  Internet . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Discovering weaknesses in IP networks    5--5
                   Wayne Madsen   Family feud over encryption policy . . . 5--6
                Barbara Gengler   Blizzard Entertainment sued  . . . . . . 6--7
                Barbara Gengler   NetScreen plays in firewall arena  . . . 7--7
                   Bill Hancock   IPV6 security enhancements still not
                                  everything you need  . . . . . . . . . . 8--10
                     Oliver Lau   Meta-firewall: a sixth generation
                                  firewall --- Part 1  . . . . . . . . . . 10--16
                     Fred Cohen   Managing network security: Technical
                                  protection for the joint venture . . . . 16--20

Network Security
Volume 1998, Number 7, July, 1998

                      Anonymous   More IRIX vulnerabilities  . . . . . . . 2, 3
                      Anonymous   Buffer overflow in NIS+  . . . . . . . . 3--3
                      Anonymous   Parsing error reduces key length . . . . 4--4
                      Anonymous   Financial organizations leave Internet
                                  security lax . . . . . . . . . . . . . . 4--4
                      Anonymous   Partnership for migrating business
                                  securely on Internet . . . . . . . . . . 4--5
                      Anonymous   Companies focus on PKI business  . . . . 5--5
                      Anonymous   Added security for Web-based Java
                                  applications . . . . . . . . . . . . . . 5--5
                      Anonymous   Shark's cage security for NT . . . . . . 5--5
                      Anonymous   Crypto pack protects electronic
                                  information  . . . . . . . . . . . . . . 6--6
                   Wayne Madsen   Encryption legislation and policy  . . . 6--7
                   Wayne Madsen   NAFTA has crypto key recovery agenda . . 7--8
                     Fred Cohen   Managing network security: How does a
                                  typical IT audit work? . . . . . . . . . 8--11
                  Jane Rawlings   Electronic commerce on the Internet ---
                                  Part 1 . . . . . . . . . . . . . . . . . 11--14
                     Oliver Lau   Meta-firewall: a sixth generation
                                  firewall --- Part 2  . . . . . . . . . . 14--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1998, Number 8, August, 1998

                      Anonymous   HP-UX \tt ftp problems . . . . . . . . . 2--2
                      Anonymous   OpenVMS V7.1 LOGINOUT security
                                  vulnerability  . . . . . . . . . . . . . 2--2
                      Anonymous   Cracking of $ 56$-bit DES not a threat   2--3
                      Anonymous   Security integration to simplify user
                                  access . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Certified SET payment system integrated
                                  into INTERSHOP . . . . . . . . . . . . . 3--3
                      Anonymous   Enterprise security and intrusion
                                  detection come together  . . . . . . . . 3--4
                      Anonymous   Peapod and SeaChange form new company    4--4
                      Anonymous   Web security for browsers  . . . . . . . 4--4
                      Anonymous   Smartcard provides strong private key
                                  functions  . . . . . . . . . . . . . . . 5--5
                   Wayne Madsen   Crypto politics heating up . . . . . . . 5--6
                       Ed Wehde   Moves to break encryption deadlock . . . 6--7
                Barbara Gengler   CIA fears America is vulnerable  . . . . 7--7
                     Frank Rees   Computer crime and airforce information
                                  systems  . . . . . . . . . . . . . . . . 7--9
                     Fred Cohen   Managing Network Security: The seedy
                                  side of security . . . . . . . . . . . . 9--13
                   Bill Hancock   Using network hacking techniques to
                                  disrupt military operational networks    13--17
                  Jane Rawlings   Electronic Commerce on the Internet ---
                                  Part 2 . . . . . . . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1998, Number 9, September, 1998

                      Anonymous   Security vulnerabilities in Microsoft
                                  PPTP . . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   `Window External' jScript vulnerability
                                  in Internet Explorer 4 . . . . . . . . . 2--3
                      Anonymous   Cisco IOS remote router crash  . . . . . 3--3
                      Anonymous   Support for child-safe Web sites . . . . 3--3
                      Anonymous   Unix access control software . . . . . . 3--4
                      Anonymous   Cryptographic accelerator for speedy
                                  digital signatures . . . . . . . . . . . 4--4
                      Anonymous   Secure card reader for Internet
                                  security, E-commerce . . . . . . . . . . 4--5
                Barbara Gengler   IBM's new cryptosystem . . . . . . . . . 5--5
                Barbara Gengler   Encryption standard replaced . . . . . . 5--6
                     Fred Cohen   Managing network security: What should I
                                  report to whom?  . . . . . . . . . . . . 6--12
                    Dario Forte   Guaranteeing the safety of a network
                                  beyond the firewall  . . . . . . . . . . 12--16
          E. Eugene Schultz and   
                  Philip C. Cox   Putting the Mime name vulnerability in
                                  outlook and messenger in perspective . . 16--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1998, Number 10, October, 1998

                      Anonymous   Vulnerabilities with FTP . . . . . . . . 2--2
                      Anonymous   US finally relaxes encryption policies   2--3
                      Anonymous   Hit squad put on trail of hackers  . . . 3--3
                      Anonymous   VPN encouraged in Europe . . . . . . . . 3--3
                      Anonymous   Company acquisition to provide network
                                  protection . . . . . . . . . . . . . . . 3--4
                      Anonymous   Companies offer secure file delivery . . 4--4
                      Anonymous   Dell to sell Raptor firewalls  . . . . . 4--4
                      Anonymous   Maximize multiple firewalls  . . . . . . 4--5
                      Anonymous   Threat management solution offered . . . 5--5
                      Anonymous   Weaknesses in RSA combated . . . . . . . 5--6
                      Anonymous   Native firewall for NT . . . . . . . . . 6--6
                      Anonymous   Java-based management solution for
                                  global network security  . . . . . . . . 6--6
                      Anonymous   Entegrity secures cash flows . . . . . . 6--7
                Barbara Gengler   The Vulnerability Engine . . . . . . . . 7--7
                Barbara Gengler   New Internet security standard . . . . . 7--8
           Tristan Meears-White   \tt NetRegulation.inconfusion@uk . . . . 8--9
                     Fred Cohen   Managing network security: Time-based
                                  security . . . . . . . . . . . . . . . . 10--14
                Marie A. Wright   The elliptic curve cryptosystem: a
                                  synopsis . . . . . . . . . . . . . . . . 14--17
                   Bill Hancock   Skills inventory for network management  17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1998, Number 11, November, 1998

                      Anonymous   Simple lessons are the hardest to learn  2--2
                     Roy Szweda   China arrests first online bank robbers  2--2
                      Anonymous   Untrusted Scripted Paste in Internet
                                  Explorer 4.01  . . . . . . . . . . . . . 2--3
                      Anonymous   Cisco IOS login prompt vulnerability . . 3--3
                      Anonymous   Buffer overflow vulnerability in mountd  3--3
                      Anonymous   UK Government to toughen encryption
                                  regulations  . . . . . . . . . . . . . . 3--4
                      Anonymous   Quantitative information security risk
                                  study launched . . . . . . . . . . . . . 4--4
                      Anonymous   Web sites leave companies legally
                                  exposed  . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Companies develop secure home banking
                                  solutions  . . . . . . . . . . . . . . . 5--5
                      Anonymous   Digital signatures incorporated into
                                  electronic forms . . . . . . . . . . . . 5--5
                      Anonymous   Protection for electronic documents  . . 5--6
                      Anonymous   Link encryptor with electronically
                                  loadable algorithms  . . . . . . . . . . 6--6
                      Anonymous   NT security enhanced . . . . . . . . . . 6--7
                     Roy Szweda   Micro-miniature silicon lock makes
                                  computers `hacker-proof' . . . . . . . . 7--8
                     Fred Cohen   Managing network security: The real Y2K
                                  issue  . . . . . . . . . . . . . . . . . 8--11
                   Bill Hancock   Improving network security through port
                                  switching  . . . . . . . . . . . . . . . 12--13
                     Janet Osen   The thorny side of jurisdiction and the
                                  Internet . . . . . . . . . . . . . . . . 13--17
                     Janet Osen   Singing the blues: The case of the
                                  `little' Blue Note . . . . . . . . . . . 18--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1998, Number 12, December, 1998

                     Roy Szweda   University switches to financial
                                  security system  . . . . . . . . . . . . 2--2
                      Anonymous   Buffer overflow vulnerabilities in rdist 2--2
                      Anonymous   Reactor glitches blamed on software  . . 2--2
                      Anonymous   E-mail security survey . . . . . . . . . 3--3
                      Anonymous   IRC hit by Trojan horse  . . . . . . . . 3--3
                      Anonymous   Internet outages predicted at COMDEX . . 3--4
                      Anonymous   Coming explosion in E-commerce . . . . . 4--4
                      Anonymous   Alphabetic anti-virus guide  . . . . . . 4--4
                      Anonymous   Brokat is Internet banking leader says
                                  report . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Baltimore partners Logica for net
                                  security . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Tritheim defender provides affordable
                                  security . . . . . . . . . . . . . . . . 5--5
                      Anonymous   VLSI chip provides secure E-commerce . . 5--5
                      Anonymous   Commercial phone scanner . . . . . . . . 5--5
                      Anonymous   COMDEX highlights SecureZone . . . . . . 5--6
                     Roy Szweda   Cyberflex enables mobile smart services
                                  via GSM  . . . . . . . . . . . . . . . . 6--6
                Barbara Gengler   Controversy hits Tristrata . . . . . . . 7--7
                       Ed Wehde   Security companies work together . . . . 7--8
                   Bill Hancock   Network security: Monitoring is the
                                  first step . . . . . . . . . . . . . . . 8--9
                     Fred Cohen   Managing Network Security: Balancing
                                  risk . . . . . . . . . . . . . . . . . . 10--14
                 Fred Piper and   
                 Michael Walker   Cryptographic solutions for voice
                                  telephony and GSM  . . . . . . . . . . . 14--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20


Network Security
Volume 1999, Number 1, January, 1999

                      Anonymous   Editorial Board  . . . . . . . . . . . . OFC
                      Anonymous   SGI IRIX \tt fcagent daemon
                                  vulnerability  . . . . . . . . . . . . . 2--2
                      Anonymous   Cisco IOS \tt syslog denial-of-service   2--3
                      Anonymous   HP-UX vulnerabilities  . . . . . . . . . 3--3
                      Anonymous   Security vulnerability in sendmail . . . 3--3
                      Anonymous   Sun Solaris \tt dtmail, \tt passwd
                                  vulnerabilities  . . . . . . . . . . . . 3--4
                      Anonymous   Trojan horse version of TCP Wrappers . . 4--4
                      Anonymous   Windows NT remote explorer . . . . . . . 4--5
                      Anonymous   Entrust gets contract to provide
                                  authenticity . . . . . . . . . . . . . . 5--5
                      Anonymous   ICL/TimeStep partnership produces VPN    5--6
                      Anonymous   Integrated network and host-based
                                  intrusion detection solution . . . . . . 6--6
                      Anonymous   High availability firewall server
                                  solution . . . . . . . . . . . . . . . . 6--7
                      Anonymous   Intelligent probe simulates hacking and
                                  potential damage . . . . . . . . . . . . 7--7
                Barbara Gengler   Security guidelines released . . . . . . 7--8
                   Bill Hancock   Attacking network routers  . . . . . . . 8--9
                Mark Tantum and   
                    Touche Ross   Legal responsibility of Internet service
                                  providers: Part 1  . . . . . . . . . . . 10--15
                     Fred Cohen   Managing Network Security: Anatomy of a
                                  successful sophisticated attack  . . . . 16--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1999, Number 2, February, 1999

                      Anonymous   W97M.Footprint macro virus discovered    2--2
                      Anonymous   FTP PASV `pizza thief' exploit . . . . . 2--3
                      Anonymous   Network video conferencing needs
                                  security . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Budgets fail to address security needs   3--3
                      Anonymous   Security research alliance to promote
                                  network security . . . . . . . . . . . . 3--4
                      Anonymous   Partnership to distribute PKI solutions  4--4
                      Anonymous   Turnkey PI solution for VPN-1  . . . . . 4--4
                      Anonymous   Tool centralizes firewall configuration  5--5
                      Anonymous   Fraud on the Internet reduced  . . . . . 5--5
                Barbara Gengler   Network Associates gets contract . . . . 5--6
                       Ed Wehde   ATM security gets better . . . . . . . . 6--6
                   Bill Hancock   Assessing and reducing network risk  . . 7--8
                   Bill Hancock   Network security: The unsolved mystery   9--11
                     Fred Cohen   Managing network security: Returning
                                  fire . . . . . . . . . . . . . . . . . . 11--15
                Mark Tantum and   
                    Touche Ross   Legal responsibility of Internet service
                                  providers: Part 2  . . . . . . . . . . . 15--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1999, Number 3, March, 1999

                      Anonymous   Buffer overflows in FTP servers  . . . . 2--2
                      Anonymous   Sun Solaris vulnerabilities  . . . . . . 2--2
                      Anonymous   Microsoft BackOffice vulnerability . . . 2--3
                      Anonymous   Debian Linux `Super' package buffer
                                  overflow . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Digital Unix vulnerabilities . . . . . . 3--4
                      Anonymous   Virus sends users' details to virus
                                  exchange site  . . . . . . . . . . . . . 4--4
                      Anonymous   EU called to petition against unwanted
                                  E-mail . . . . . . . . . . . . . . . . . 4--5
                      Anonymous   UK to get a head start in the digital
                                  marketplace  . . . . . . . . . . . . . . 5--5
                      Anonymous   PKI solution for the Microsoft commerce
                                  platform . . . . . . . . . . . . . . . . 5--6
                      Anonymous   Security simplified through integration
                                  of adaptive security . . . . . . . . . . 6--6
                      Anonymous   Baltimore to PKI enable Adobe Acrobat    6--6
                      Anonymous   Product checks and enforces security
                                  best practices . . . . . . . . . . . . . 7--7
                Barbara Gengler   Total privacy technology . . . . . . . . 7--7
                Barbara Gengler   Free E-mail services or disservices? . . 8--8
                Barbara Gengler   E-commerce start-up has cash in its
                                  wallet . . . . . . . . . . . . . . . . . 8--9
                   Wayne Madsen   NSA continues to oppose crypto export
                                  control relief . . . . . . . . . . . . . 9--10
                   Bill Hancock   Network security: Monitoring is the
                                  first step . . . . . . . . . . . . . . . 10--11
                     Fred Cohen   Managing network security: The
                                  millisecond fantasy  . . . . . . . . . . 12--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1999, Number 4, April, 1999

                      Anonymous   Melissa spreading widely in USA  . . . . 2--2
                   Bill Hancock   Melissa's author caught  . . . . . . . . 2--3
                      Anonymous   HP-UX vulnerabilities  . . . . . . . . . 3--4
                Barbara Gengler   Encryption laws may slacken  . . . . . . 4--4
                Barbara Gengler   Microsoft questions Novell's NDS
                                  security . . . . . . . . . . . . . . . . 4--5
                   Wayne Madsen   NSA recommended for expanded Infosec and
                                  Infowar responsibilities . . . . . . . . 5--6
                     Fred Cohen   Managing network security: Simulating
                                  network security . . . . . . . . . . . . 6--13
                   Nigel Miller   E-mail abuse and corporate policies  . . 13--17
              E. Eugene Schultz   Book Review: \booktitleFighting computer
                                  crime: Author: Donn Parker, ISBN
                                  0-471-16378-3, Publisher: John Wiley and
                                  Sons, 1998 . . . . . . . . . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1999, Number 5, May, 1999

                      Anonymous   Buffer overflow in SGI X server's font
                                  path . . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Vulnerabilities of Cisco 7xx TCP and
                                  HTTP . . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Implementation flaw in the Linux TCP/IP
                                  stack  . . . . . . . . . . . . . . . . . 3--4
                      Anonymous   Entrust PKI receives validation to new
                                  global standard  . . . . . . . . . . . . 4--4
                      Anonymous   PKI solution integrated with Web
                                  security software  . . . . . . . . . . . 4--5
                      Anonymous   UK companies benefit from VPNs . . . . . 5--5
                      Anonymous   Encryptors provide frame relay security  5--5
                   Wayne Madsen   Big brother goes global  . . . . . . . . 6--6
                   Wayne Madsen   McCain's bill further `Balkanizes' US
                                  crypto export policy . . . . . . . . . . 6--7
                     Fred Cohen   Managing Network Security: Watching the
                                  World  . . . . . . . . . . . . . . . . . 8--13
                   Nigel Miller   Y2K mediation success stories  . . . . . 13--13
                   Nigel Miller   Pirates and casual copiers: how to
                                  protect the content of your Web site . . 13--14
                   Nigel Miller   \$107 million damages for disseminating
                                  unlawful information on a {Web} site . . 14--15
                   Nigel Miller   UK E-Commerce bill --- summary . . . . . 15--16
                   Nigel Miller   Liability for infringements on linked
                                  sites? . . . . . . . . . . . . . . . . . 16--17
                   Nigel Miller   The telecommunications (data protection
                                  and privacy) (direct marketing)
                                  regulations 1998 . . . . . . . . . . . . 17--17
                   Bill Hancock   Export of cryptographic information from
                                  the USA: A brief look at the problems    17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1999, Number 6, June, 1999

                      Anonymous   HP-UX \tt sendmail --- denial of service
                                  failures . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Cisco IOS software vulnerability . . . . 2--3
                      Anonymous   Telecommunications infrastructure to
                                  expand in Latin America  . . . . . . . . 3--3
                      Anonymous   Partnership delivers server-based
                                  anti-virus solution  . . . . . . . . . . 3--4
                      Anonymous   IPSec/IKE VPN and X.509 CA device
                                  secures networks . . . . . . . . . . . . 4--4
                      Anonymous   Compact solution to simplified firewall
                                  deployment . . . . . . . . . . . . . . . 4--5
                      Anonymous   Low-cost VPN solution for the remote
                                  office . . . . . . . . . . . . . . . . . 5--5
                Barbara Gengler   Networking companies won't make kit Y2K
                                  compliant  . . . . . . . . . . . . . . . 5--6
                Barbara Gengler   Now cryptography gets the `open source'
                                  treatment  . . . . . . . . . . . . . . . 6--6
                Barbara Gengler   Check point outlines VPN strategy  . . . 6--7
                Barbara Gengler   Federal agency sites still lack privacy
                                  notices  . . . . . . . . . . . . . . . . 7--7
                     Fred Cohen   Managing network security: The limits of
                                  awareness  . . . . . . . . . . . . . . . 8--10
                    Dario Forte   The future of the Advanced Encryption
                                  Standard . . . . . . . . . . . . . . . . 10--13
              Michelle J. Arden   ``Are you who you say you are?'' the
                                  financial market is finding out with PKI 13--16
                      Jon David   Vulnerabilities assessment --- Part 1.
                                  Vulnerability basics . . . . . . . . . . 16--18
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1999, Number 7, July, 1999

                      Anonymous   Vulnerability in Compaq's Tru64/DIGITAL
                                  UNIX software  . . . . . . . . . . . . . 2--2
                      Anonymous   rpc.statd and automountd vulnerabilities
                                  allow intruder access  . . . . . . . . . 2--2
                      Anonymous   TROJ\_XPLOREZIP --- stripping it from
                                  your system  . . . . . . . . . . . . . . 2--3
                      Anonymous   EU-US data privacy dispute to continue   3--4
                      Anonymous   Online Web domain registration protects
                                  against cybersquatting . . . . . . . . . 4--4
                      Anonymous   Companies team up to secure E-commerce
                                  in Hong Kong . . . . . . . . . . . . . . 4--4
                      Anonymous   Entrust provide free PKI and
                                  multi-platform toolkits for download . . 4--5
                Barbara Gengler   Internet Fraud Council . . . . . . . . . 5--5
                Barbara Gengler   Twinkle  . . . . . . . . . . . . . . . . 5--6
                       Ed Wehde   Military strength encryption for
                                  consumers  . . . . . . . . . . . . . . . 6--7
                     Fred Cohen   Managing network security: Attack and
                                  defence strategies . . . . . . . . . . . 7--11
                    Alison Webb   Auditing NT --- Part 1 . . . . . . . . . 11--15
                    Dario Forte   Postfix --- a secure alternative to
                                  Sendmail: A new frontier in the realm of
                                  free mailers . . . . . . . . . . . . . . 16--18
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1999, Number 8, August, 1999

                      Anonymous   Netscape Enterprise Server fails to
                                  properly process some URL's  . . . . . . 2--2
                      Anonymous   Malformed .HTR request vulnerability . . 2--2
                      Anonymous   Denial-of-service vulnerabilities in
                                  Windows NT 4.0 . . . . . . . . . . . . . 2--3
                      Anonymous   Finland paves the way for a digital
                                  society  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Global market for security products to
                                  grow to \$8 billion in 2003  . . . . . . 3--4
                      Anonymous   Companies develop Chinese language CA    4--4
                      Anonymous   Cylink expands its VPN offerings with
                                  ATM encryptor  . . . . . . . . . . . . . 4--5
                      Anonymous   Encrypt data at 6.7 billion bits per
                                  second . . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Secure solution for frame relay networks 5--5
                       Ed Wehde   Third Voice causes problems  . . . . . . 5--6
                       Ed Wehde   Sniffing out rogue modems  . . . . . . . 6--7
                       Ed Wehde   Crime lab just for the Internet  . . . . 7--7
                     Fred Cohen   Managing network security: What's
                                  happening out there  . . . . . . . . . . 8--11
                      Jon David   Vulnerabilities assessment --- Part 2.
                                  Getting in through the `Net' . . . . . . 11--14
                    Alison Webb   Auditing NT --- Part 2 . . . . . . . . . 14--18
                   Wayne Madsen   Barr offers Congressional oversight
                                  amendment on ECHELON . . . . . . . . . . 18--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1999, Number 9, September, 1999

                      Anonymous   Microsoft Web engine vulnerability . . . 2--2
                      Anonymous   Windows NT Terminal Servers DOS
                                  vulnerability  . . . . . . . . . . . . . 2--2
                      Anonymous   IBM AIX vulnerability in \tt ptrace()
                                  system call  . . . . . . . . . . . . . . 2--2
                      Anonymous   Free smart card software for digital
                                  certificates . . . . . . . . . . . . . . 2--3
                      Anonymous   Wireless data encryption for handhelds   3--3
                      Anonymous   Internet postage system launched in the
                                  United States  . . . . . . . . . . . . . 3--3
                      Anonymous   Clinton administration calls for network
                                  monitoring . . . . . . . . . . . . . . . 3--3
                      Anonymous   Six million Brazilians file taxes over
                                  the Net  . . . . . . . . . . . . . . . . 4--4
                      Anonymous   ADSL enables hacker access . . . . . . . 4--4
                      Anonymous   Face your image on a bar code  . . . . . 4--5
                      Anonymous   Protect your networks with data-security
                                  chips  . . . . . . . . . . . . . . . . . 5--5
                Barbara Gengler   Alarm raised over intrusion detection
                                  network  . . . . . . . . . . . . . . . . 5--6
                Barbara Gengler   Hewlett Packard security strategy  . . . 6--7
                Barbara Gengler   E-commerce security study  . . . . . . . 7--7
                     Fred Cohen   Managing network security: In your face
                                  information warfare  . . . . . . . . . . 8--10
                   Wayne Madsen   SAFE Bill ``ambushed'' . . . . . . . . . 10--11
                   Wayne Madsen   Justice Department, PCCIP ex-staffers
                                  offer critical infrastructure assurance
                                  proposals  . . . . . . . . . . . . . . . 11--12
                   Wayne Madsen   SAFE Bill clears Telecommunications
                                  Subcommittee with amendments . . . . . . 13--14
                Marie A. Wright   An overview of PKI . . . . . . . . . . . 14--17
                      Guy Heath   WIPO serves eviction notice on
                                  cyber-squatters  . . . . . . . . . . . . 18--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1999, Number 10, October, 1999

                      Anonymous   ActiveX controls not `safe for
                                  scripting' . . . . . . . . . . . . . . . 2--2
                      Anonymous   Netscape vulnerability gives attackers
                                  full control . . . . . . . . . . . . . . 2--2
                      Anonymous   Users gain root privilege with wu-ftpd   2--3
                      Anonymous   US lifts export curbs on encryption  . . 3--3
                      Anonymous   Japanese group simplifies hacker
                                  detection  . . . . . . . . . . . . . . . 3--3
                      Anonymous   Continuous compliance with legislation
                                  for UK companies . . . . . . . . . . . . 3--4
                      Anonymous   IBM's PC 300PL to become standard
                                  technology . . . . . . . . . . . . . . . 4--4
                      Anonymous   IP service switch prevents fragmentation 4--4
                Barbara Gengler   US Army thinks different . . . . . . . . 5--5
                       Ed Wehde   Vendors work towards LAN security  . . . 5--6
                Barbara Gengler   Politicians speak out on cyberterrorism  6--6
                     Fred Cohen   Managing network security: Security
                                  education in the information age . . . . 7--10
                    Dario Forte   Free security tools: Pros and Cons: a
                                  review of free security tools  . . . . . 10--13
                   Bill Hancock   Auditing the network environment at a
                                  technical level: Why's, how's and aha!'s 13--17
                   Bill Hancock   Health care and network security:
                                  Protecting patient privacy . . . . . . . 17--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 1999, Number 11, November, 1999

                      Anonymous   Windows NT 4.0 vulnerability . . . . . . 2--2
                      Anonymous   Microsoft IE5: `download behaviour'
                                  vulnerability  . . . . . . . . . . . . . 2--2
                      Anonymous   Jet database engine vulnerability  . . . 2--3
                      Anonymous   Microsoft and Protek collaboration meets
                                  NATO messaging standards . . . . . . . . 3--3
                      Anonymous   Secure E-government for Spain  . . . . . 3--3
                      Anonymous   Tripwire 2.2 for the Unix platform . . . 3--4
                      Anonymous   Free open-source code to result in
                                  global private network . . . . . . . . . 4--4
                      Anonymous   Secure solution for the wireless market  4--5
                Barbara Gengler   IPSec specification  . . . . . . . . . . 5--6
                Barbara Gengler   SNMP update  . . . . . . . . . . . . . . 6--6
                     Fred Cohen   Managing Network Security: The limits of
                                  cryptography . . . . . . . . . . . . . . 7--11
                Marie A. Wright   The evolution of the Advanced Encryption
                                  Standard . . . . . . . . . . . . . . . . 11--14
                      Jon David   Incident response  . . . . . . . . . . . 15--18
                   Wayne Madsen   Trust in Cyberspace  . . . . . . . . . . 18--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 1999, Number 12, December, 1999

                      Anonymous   Microsoft improves ISN generation  . . . 2--2
                      Anonymous   Microsoft virtual machine vulnerability  2--2
                      Anonymous   Companies promote secure wireless
                                  E-commerce . . . . . . . . . . . . . . . 2--2
                      Anonymous   Fraud screening for E-merchants  . . . . 3--3
                      Anonymous   Survey places security as top barrier to
                                  E-commerce . . . . . . . . . . . . . . . 3--3
                      Anonymous   Companies provide PKI SSO integration
                                  for secure business  . . . . . . . . . . 3--3
                      Anonymous   Australia and New Zealand join global
                                  security standard  . . . . . . . . . . . 3--4
                      Anonymous   Distributor offers one stop shop for
                                  smart cards  . . . . . . . . . . . . . . 4--4
                      Anonymous   Flexible copyright protection for Web
                                  content  . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Automatic repair for network security
                                  holes  . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Secure payment solution for E-commerce   4--5
                Barbara Gengler   The future of the palm print . . . . . . 5--5
                Barbara Gengler   Encryption export laws . . . . . . . . . 5--6
                       Ed Wehde   DVD hack program on Web  . . . . . . . . 6--7
                     Fred Cohen   Managing network security: Why it was
                                  done that way  . . . . . . . . . . . . . 7--9
                    Alison Webb   User authentication: Options in Oracle   10--14
                   Nigel Miller   Deep linking --- Deep trouble  . . . . . 15--16
                   Nigel Miller   Internet lotteries considered --- Taking
                                  a spanner to the microchip . . . . . . . 16--19
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20


Network Security
Volume 2000, Number 1, January, 2000

                      Anonymous   Editorial Board  . . . . . . . . . . . . 1--1
                      Anonymous   PGP encryption software granted global
                                  export license . . . . . . . . . . . . . 1--1
                      Anonymous   Alliance enhances trust in PCs . . . . . 2--2
                      Anonymous   Secure mobile E-payment system for
                                  Europe . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   PKI solution for Microsoft Smart Card
                                  for Windows  . . . . . . . . . . . . . . 2--3
                      Anonymous   Protect against Internet intruders and
                                  hackers  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Unix server vulnerability  . . . . . . . 3--3
                      Anonymous   Solaris \tt snoop vulnerability  . . . . 3--3
                      Anonymous   New tool identifies the root cause of
                                  network vulnerability  . . . . . . . . . 3--3
                John Sterlicchi   Software companies disappointed by
                                  encryption draft . . . . . . . . . . . . 4--4
                Barbara Gengler   JavaScript ban may happen  . . . . . . . 4--4
                 Kevin Townsend   Carraig Ltd: Latches for Windows . . . . 5--7
               Clive Blatchford   Information security, business and the
                                  Internet --- Part 1  . . . . . . . . . . 8--12
                  Ted Humphreys   Signing the E-word . . . . . . . . . . . 13--13
                  Steve Barnett   Top 10 challenges to securing a network  14--16
                      Bill Boni   New means --- Old crimes . . . . . . . . 17--17
                     Fred Cohen   Digital forensics  . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2000, Number 2, February 1, 2000

                      Anonymous   TFN2K causes denial-of-service attack    1--2
                      Anonymous   Security scanning guidelines for
                                  Singapore ISPs . . . . . . . . . . . . . 2--2
                  Paul Scarrott   Consortium to define common standards    2--2
                      Anonymous   Network Associates plans to divide . . . 3--3
                      Anonymous   Radicchio to secure wireless E-commerce  3--3
                     Jill Hough   Adapters help to enable LAN security . . 3--3
                      Anonymous   HP provides security for Microsoft Web
                                  servers  . . . . . . . . . . . . . . . . 3--3
                       Ed Wehde   Microsoft to beef up SQL Server security 4--4
                Barbara Gengler   US ISP requires password changes . . . . 4--4
                Barbara Gengler   Check Point creates broadband Internet
                                  company  . . . . . . . . . . . . . . . . 4--5
                       Ed Wehde   IBM, Microsoft in encryption effort  . . 5--5
              E. Eugene Schultz   Intrusion Detection Revisited  . . . . . 6--9
               Clive Blatchford   Information Security, Business and the
                                  Internet --- Part 2  . . . . . . . . . . 10--14
                      Bill Boni   The Russian Connection . . . . . . . . . 15--16
                      Anonymous   E-commerce survey shows that security is
                                  the greatest concern . . . . . . . . . . 16--16
                     Fred Cohen   Worker Monitoring  . . . . . . . . . . . 17--19

Network Security
Volume 2000, Number 3, March 1, 2000

                      Anonymous   Denial-of-service with PMTU strategy . . 1--1
                      Anonymous   Vulnerability in Microsoft RTF files . . 2--2
                      Anonymous   Service failure resulting from attack    2--2
                      Anonymous   Prevention of DoS attacks  . . . . . . . 2--3
                      Anonymous   European encryption still safer than US
                                  versions . . . . . . . . . . . . . . . . 3--3
          Jüergen Dierickx   European guidelines for digital
                                  signatures . . . . . . . . . . . . . . . 3--4
                      Anonymous   Companies provide firewall and VPN
                                  solution . . . . . . . . . . . . . . . . 4--4
                      Anonymous   National extranet further secured  . . . 4--4
                      Anonymous   Aussies lack security for E-commerce . . 4--5
                      Anonymous   Further security for mobile transactions 5--5
                      Anonymous   Mobile E-commerce links secured  . . . . 5--5
                      Anonymous   Wireless E-commerce security
                                  strengthened . . . . . . . . . . . . . . 5--6
                      Anonymous   VPN offers secure Internet connectivity  6--6
                    Lucy Bunker   Symantec offers safer Internet . . . . . 6--6
                 Scott Crenshaw   Speedy public key cryptography system    6--6
                       Ed Wehde   AOL in trouble on two fronts . . . . . . 7--7
                John Sterlicchi   BugNet confirms Active Directory bug . . 7--8
                   Wayne Madsen   Revised Draft US Crypto Export
                                  Regulations leaked . . . . . . . . . . . 8--8
                 Kevin Townsend   Reflex Magnetics Ltd: MailSafe . . . . . 9--11
                    Dario Forte   Auditing and Security Policy: The
                                  Cornerstone of Company Information
                                  Protection . . . . . . . . . . . . . . . 12--13
                    John Hughes   Enabling E-Commerce Through PKI  . . . . 14--16
                     Fred Cohen   Collaborative Defence  . . . . . . . . . 17--20

Network Security
Volume 2000, Number 4, April 1, 2000

                      Anonymous   `Screen-melting' worm on the loose . . . 1--1
                      Anonymous   Teenage hacker denies Web attacks  . . . 2--2
                      Anonymous   Credit cards stolen through known
                                  weakness . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Unsafe sites reported  . . . . . . . . . 2--3
                      Anonymous   Sophos attempts to educate Internet
                                  users  . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Exploitable vulnerability in atsar . . . 3--3
                      Anonymous   Clip Art buffer overflow vulnerability   3--3
                      Anonymous   wmcdplay local root compromise . . . . . 3--4
                      Anonymous   Managing traffic flow to stop DOS attack 4--4
                      Anonymous   Vulnerability in FireWall-1  . . . . . . 4--4
                      Anonymous   China relaxes rules on encryption
                                  products . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Chinese Web site hacked  . . . . . . . . 5--5
                      Anonymous   Baltimore buys stake in Japanese market  5--5
                    John Curran   Rapid integration of digital
                                  certificates . . . . . . . . . . . . . . 5--5
                      Anonymous   Companies provide secure online
                                  brokering  . . . . . . . . . . . . . . . 5--6
                      Anonymous   Firewall vendors target smaller
                                  companies  . . . . . . . . . . . . . . . 6--6
                      Anonymous   Virus scanner for E-mail as it arrives   6--6
                      Anonymous   Gigabit security appliance launched  . . 6--6
                      Anonymous   Java-based secure application
                                  environment created  . . . . . . . . . . 6--6
                  Nigel Hickson   Government Support for Secure Electronic
                                  Commerce . . . . . . . . . . . . . . . . 7--10
                      Anonymous   Where Will Your E-Commerce Disputes Be
                                  Resolved?  . . . . . . . . . . . . . . . 11--12
                  Peter Landrok   Challenging the Conventional View of
                                  PKI: Will it Really Work?  . . . . . . . 12--15
                     Fred Cohen   Countering DCAs  . . . . . . . . . . . . 15--19
                      Bill Boni   Hackers, Crackers, Lawyers and Other
                                  Dangers  . . . . . . . . . . . . . . . . 19--20

Network Security
Volume 2000, Number 5, May 1, 2000

                      Anonymous   Malicious codes get more mobility  . . . 1--1
                      Anonymous   Bug could slow down servers  . . . . . . 1--2
                      Anonymous   Tighter permissions for Windows Registry
                                  key  . . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Cyber attacks reported by 90% of survey
                                  respondents  . . . . . . . . . . . . . . 2--3
                  Andy McCathie   Internet security fears prompt IT
                                  security measures  . . . . . . . . . . . 3--3
                      Anonymous   Internet attacks will replace military
                                  conflicts  . . . . . . . . . . . . . . . 3--3
                      Anonymous   2:20% of companies liable to suffer DoS
                                  attacks  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Governments back down on encryption
                                  regulations  . . . . . . . . . . . . . . 3--4
                      Tim Smith   Company expands to support PKI demands   4--4
                      Anonymous   Privacy threatened by digital signatures 4--4
                    Naeem Zafar   Authentication company buys smart card
                                  firm . . . . . . . . . . . . . . . . . . 4--5
              Christophe Decaux   European online stores secured . . . . . 5--5
                  David Bridson   Companies form E-business alliance . . . 5--5
                      Anonymous   E-commerce portals securely managed  . . 5--6
                 Jim St. Pierre   Two-factor authentication added to PKI
                                  solutions  . . . . . . . . . . . . . . . 6--6
                      Anonymous   Signing and encryption software system
                                  launched . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Enhancement for PKI security . . . . . . 6--6
                      Anonymous   Visitor's PC scanned before trading  . . 6--6
                      Anonymous   Security enhancements for wireless VPN
                                  connections  . . . . . . . . . . . . . . 6--7
                    Rachael Ott   Cybersquatting . . . . . . . . . . . . . 7--7
                      Anonymous   Product guarantees origin of E-mail  . . 7--7
                   Paul Helmich   Public Key Infrastructures: a Panacea
                                  Solution?  . . . . . . . . . . . . . . . 8--11
                   Simon Corell   Ten Risks of PKI: In Favour of Smart
                                  Card-Based PKI . . . . . . . . . . . . . 12--14
                     Fred Cohen   Eliminating IP Address Forgery --- Five
                                  Years Old and Going Strong . . . . . . . 15--18
                      Bill Boni   The More Things Change, the More They
                                  Stay the Same!: Headline: ``DTI Survey
                                  Finds Most UK Companies Experienced
                                  Security Breaches.'' Headline: ``FBI
                                  Study Finds U.S. Losses to Computer
                                  Crime Increased 100%.''  . . . . . . . . 18--19

Network Security
Volume 2000, Number 6, June 1, 2000

                      Anonymous   NewLove virus changes to avoid detection 1--1
                      Anonymous   Virus spreads unopened . . . . . . . . . 1--2
                      Anonymous   Bugs allow compromising of SSL sessions  2--2
                      Anonymous   Server forced to halt and then reload    2--3
                      Anonymous   Experts find potential for cookie
                                  stealing . . . . . . . . . . . . . . . . 3--3
                      Anonymous   IP fragment reassembly vulnerability . . 3--4
                    Carol Moore   Zaxus launches PKI solution for
                                  E-commerce . . . . . . . . . . . . . . . 4--4
                    Sara Parker   Companies unite to secure EBPP market    4--4
                      Anonymous   UK initiative to secure E-commerce . . . 4--4
                      Anonymous   Convenience lost for increased security  4--5
                      Tim Smith   Authentication by biometric smart card   5--5
                      Anonymous   Backup to save files from virus  . . . . 5--5
                      Anonymous   Creation of VPN tunnels simplified . . . 5--5
                    Lucy Bunker   Anti-virus technology for Yahoo! . . . . 5--6
                      Anonymous   Love bugged! . . . . . . . . . . . . . . 6--6
               Michael Spalding   Deciding whether or not to use a third
                                  party certificate authority  . . . . . . 7--8
                    Henk Tobias   To be or not to be --- Legally Binding
                                  Digital Certificates . . . . . . . . . . 9--11
               H. S. Venter and   
                 J. H. P. Eloff   Network Security: Important Issues . . . 12--16
                     Fred Cohen   Why Can't We Do DNS Right? . . . . . . . 17--18
                      Bill Boni   Ode to `Digital Defenders' . . . . . . . 19--19

Network Security
Volume 2000, Number 7, July 1, 2000

                      Anonymous   Flaw in firewall could lead to DoS
                                  attack . . . . . . . . . . . . . . . . . 1--1
                      Anonymous   The Serbian Badman Trojan  . . . . . . . 1--2
                      Anonymous   IPCS denial-of-service attack  . . . . . 2--2
                      Anonymous   Kerberos at risk from DoS attacks  . . . 3--3
                      Anonymous   SSL certificate validation vulnerability 3--3
                      Anonymous   AIX \tt cdmount vulnerability  . . . . . 3--4
                      Anonymous   New viruses run without being opened . . 4--4
                      Anonymous   Powerful virus protection through
                                  partnership  . . . . . . . . . . . . . . 4--4
                      Anonymous   BT gives anti-virus contract to NAI  . . 4--4
                      Anonymous   Alliance provides enhanced Internet
                                  security . . . . . . . . . . . . . . . . 4--5
                      Anonymous   UK launches code of best practice for
                                  e-business . . . . . . . . . . . . . . . 5--5
                      Anonymous   Product enhances secure file transfers   5--5
                      Anonymous   Attempt number two to protect against
                                  ILOVEYOU . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Anti-virus technology for the Palm OS
                                  platform . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Businesses urged to protect performance  6--6
                      Anonymous   Intelligent content filtering offering   6--6
                    Alison Webb   Auditing Electronic Mail . . . . . . . . 7--10
                Marie A. Wright   Virtual Private Network Security . . . . 11--14
                     Fred Cohen   What Does it do Behind Your Back?  . . . 15--17
                      Bill Boni   What to Do When the Worst Happens! . . . 18--19
                     Berni Dwan   Time-Based Security  . . . . . . . . . . 19--19

Network Security
Volume 2000, Number 8, August 1, 2000

                      Anonymous   Don't use the `Crayon of Doom' . . . . . 1--2
                      Anonymous   ``Active Setup Download'' vulnerability  2--2
                      Anonymous   LISTSERV Web archive remote overflow . . 2--2
                      Anonymous   OpenSSH UseLogin security risk . . . . . 2--3
                      Anonymous   PIX Firewall TCP reset vulnerability . . 3--3
                      Anonymous   Powergen customer finds debit card
                                  details  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Hackers/viruses cost businesses \$1.6
                                  trillion . . . . . . . . . . . . . . . . 3--4
                      Anonymous   Internet poses serious threat to
                                  national security  . . . . . . . . . . . 4--4
                      Anonymous   Investigation into wireless hacks  . . . 4--4
                      Anonymous   Mission-critical E-business security . . 4--4
                      Anonymous   Secure wireless access to applications   4--4
                      Anonymous   Microsoft and ISS unite to secure ISA
                                  Server 2000  . . . . . . . . . . . . . . 5--5
                      Anonymous   New Web security solution  . . . . . . . 5--5
                      Anonymous   Tool prevents employee computer misuse   5--5
                      Anonymous   Firewall suitable for large data centres 5--5
                 Graham Wheeler   Denial-of-service: courting disaster . . 6--6
                   Wayne Madsen   Whitehouse unveils new cyber-crime,
                                  crypto export policies . . . . . . . . . 7--7
                      Peter Cox   Exactly What it Says on the Tin \ldots 
                                  Says Who?  . . . . . . . . . . . . . . . 8--10
                     Fred Cohen   Understanding Viruses Bio-logically  . . 11--16
                      Bill Boni   The US Mob Gets Savvy to Cyber Crime . . 17--18
              E. Eugene Schultz   Book Review: \booktitleIntrusion
                                  Detection: Rebecca Bace [Macmillan
                                  Technical Publishing, Indianapolis, IN,
                                  USA, ISBN 1-57870-185-6] . . . . . . . . 19--19

Network Security
Volume 2000, Number 9, September 1, 2000

                      Anonymous   32-bit Internet worm `\tt Sysid.exe' . . 1--1
                      Anonymous   Mobile phone targeted by virus writers   1--2
                      Anonymous   Trojan gives hackers control . . . . . . 2--2
                      Anonymous   Weak security for E-commerce servers . . 2--3
                      Anonymous   Java applets read protected resources    3--3
                      Anonymous   IE opens Microsoft Access and executes
                                  code . . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Remote and local compromise allowed  . . 3--4
                      Anonymous   Linux capability vulnerability . . . . . 4--4
                      Anonymous   PGP ADKs vulnerability . . . . . . . . . 4--4
                      Anonymous   WorldView Wnn vulnerability  . . . . . . 4--4
                      Anonymous   FBI wants global Internet security
                                  organization . . . . . . . . . . . . . . 4--5
                      Anonymous   Banking on network security basics . . . 5--5
                      Anonymous   Online shopping hindered by security
                                  fears  . . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Ultimo secures insurance group . . . . . 5--5
                      Anonymous   Bolero.net and WISekey join forces . . . 5--5
                      Anonymous   Virus protection for mobile phones and
                                  handheld computers . . . . . . . . . . . 5--6
                      Anonymous   Secure E-mail technology unveiled  . . . 6--6
                      Anonymous   Plug-and-play VPN security box . . . . . 6--6
                      Anonymous   AES IP hardware encryptor introduced . . 6--7
                      Anonymous   User authentication via smart card . . . 7--7
                      Anonymous   Managed security service enables
                                  outsourcing of security  . . . . . . . . 7--7
                      Anonymous   iSolve clamp down on online credit card
                                  fraud  . . . . . . . . . . . . . . . . . 7--7
                Barbara Gengler   US President Clinton signs Digital
                                  Signature Bill . . . . . . . . . . . . . 7--8
                 Allan Donnelly   US national lab fights viruses . . . . . 8--8
                   Burt Kaliski   Considerations for New Public-Key
                                  Algorithms . . . . . . . . . . . . . . . 9--10
                    Furqan Syed   Children of DES: a Look at the Advanced
                                  Encryption Standard  . . . . . . . . . . 11--12
                Marie A. Wright   The Impact of Quantum Computing on
                                  Cryptography . . . . . . . . . . . . . . 13--15
                     Fred Cohen   Chipping . . . . . . . . . . . . . . . . 16--17
                      Bill Boni   Carnivores, Predators and Civil
                                  Liberties  . . . . . . . . . . . . . . . 18--19

Network Security
Volume 2000, Number 10, October 1, 2000

                      Anonymous   Federal security found lacking . . . . . 1--1
                      Anonymous   Indian IT out of reach . . . . . . . . . 2--2
                      Anonymous   International legislation at last  . . . 2--2
                      Anonymous   Privacy suit against \tt About.com . . . 2--2
                      Anonymous   Czech W2K.Stream virus discovered  . . . 2--3
                      Anonymous   Virus inoculation by satellite . . . . . 3--3
                      Anonymous   Home networking on increase  . . . . . . 3--3
                      Anonymous   Equant provides extranet . . . . . . . . 3--4
                      Anonymous   Music industry enlists help of hackers   4--4
                      Anonymous   Crime pays . . . . . . . . . . . . . . . 4--4
                      Anonymous   43% of credit card fraud not reported    4--4
                      Anonymous   Advanced intrusion detection . . . . . . 4--4
                      Anonymous   E-mail scanner detects porn  . . . . . . 4--5
                      Anonymous   Voice authentication smart card  . . . . 5--5
                      Anonymous   Security a competitive advantage?  . . . 5--6
                   Wayne Madsen   Carnivore's voracious appetite . . . . . 6--7
                 Graham Wheeler   RIP Bill . . . . . . . . . . . . . . . . 7--8
                   Wayne Madsen   Employer Monitoring Act proposed . . . . 8--8
                  Colin L. Bond   Big Brother Has Been Here All Along  . . 9--9
                 Paul McDermott   Building Trust Into Online Business  . . 10--12
                     Janet Osen   The Thorny Side of Jurisdiction and the
                                  Internet . . . . . . . . . . . . . . . . 13--16
                     Fred Cohen   Revisiting Risk  . . . . . . . . . . . . 17--18
                      Bill Boni   Lights In The Darkness . . . . . . . . . 19--20

Network Security
Volume 2000, Number 11, November, 2000

                      Anonymous   Microsoft hacked \ldots Twice  . . . . . 1--2
                      Anonymous   Hackers boycott industry olive-branch    2--2
                      Anonymous   Curiosity killed the CueCat  . . . . . . 2--2
                      Anonymous   Anti-hackers to be unleashed . . . . . . 2--3
                      Anonymous   China muzzles Internet . . . . . . . . . 3--3
                      Anonymous   Mexicans have trouble getting online . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Ireland wins cyber champion award  . . . 3--4
                      Anonymous   Columbia University host crystal ball
                                  gazing . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Branding key to financial services . . . 4--4
                      Anonymous   CA warns about E-mail interception . . . 4--4
                      Anonymous   Consumers want security  . . . . . . . . 4--4
                      Anonymous   Free Web-based security assessment . . . 4--4
                      Anonymous   Working patterns impact security . . . . 4--5
                      Anonymous   BIND 9 plugs DNS . . . . . . . . . . . . 5--5
                      Anonymous   Xinetica monitor modems  . . . . . . . . 5--5
                      Anonymous   Plug-and-play eToken . . . . . . . . . . 5--5
                      Anonymous   Cost-cutting Web server  . . . . . . . . 5--5
                   Wayne Madsen   FBI releases Carnivore documents . . . . 6--6
                 Allan Donnelly   Consumers bombard fraud reporting centre 6--7
                Barbara Gengler   Cisco's SAFE . . . . . . . . . . . . . . 7--7
                      Jon David   The Vanishing Firewall . . . . . . . . . 8--11
                 Graham Roberts   Tangled Web --- Tales of Digital Crime
                                  from the Shadows of Cyberspace: Richard
                                  Power, Que Corporation, 2000 . . . . . . 8--8
                 Paul McDermott   Personal firewalls \ldots One more step
                                  towards comprehensive security . . . . . 11--14
                 Melissa Zieger   Boost in electronic courier traffic ---
                                  traditional UK couriers left stranded in
                                  petrol shortage: Internet proved to be
                                  best vehicle for secure and trackable
                                  document transfer  . . . . . . . . . . . 14--15
                     Fred Cohen   Why everything keeps failing . . . . . . 16--18
                      Bill Boni   Meteors and managers . . . . . . . . . . 18--19
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2000, Number 12, December 1, 2000

                      Anonymous   Hybris hits international scene  . . . . 1--1
                      Anonymous   PKI may carry viruses  . . . . . . . . . 2--2
                      Anonymous   IBM to adopt open source . . . . . . . . 2--2
                      Anonymous   Standards lobby on hold  . . . . . . . . 2--2
                      Anonymous   Non-contact smart cards for M-commerce   2--3
                      Anonymous   M-spam, spam, spam . . . . . . . . . . . 3--3
                      Anonymous   Graffiti growing trend . . . . . . . . . 3--3
                      Anonymous   German land registry goes electronic . . 3--3
                      Anonymous   Cyber crime can hit directors  . . . . . 4--4
                      Anonymous   Can you trust your bank? . . . . . . . . 4--4
                      Anonymous   Biometric screensaver for notebook . . . 4--4
                      Anonymous   Layered system preferred . . . . . . . . 4--4
                   Wayne Madsen   Health Care Industry Debate: Electronic
                                  Versus Digital Signatures  . . . . . . . 5--5
                  Elspeth Wales   DNSSEC Emerges to Protect Internet
                                  Infrastructure . . . . . . . . . . . . . 5--5
                   Wayne Madsen   Data Protection Commissioners Explore
                                  New Ground . . . . . . . . . . . . . . . 6--6
                 Paul McDermott   Security in IP Networks  . . . . . . . . 7--9
                 Matthew Pemble   Washing Your Laundry in Public --- An
                                  Analysis of Recent High-Publicity
                                  Security Incidents . . . . . . . . . . . 10--12
            John S. Kakalik and   
                Marie A. Wright   Privacy and Security in Wireless
                                  Computing  . . . . . . . . . . . . . . . 12--15
                     Fred Cohen   The Millennium Article --- Yet Again!:
                                  The Bots are Coming!!! The Bots are
                                  Coming!!!  . . . . . . . . . . . . . . . 15--18
                      Bill Boni   Tricks and Treats from the Hacker
                                  Underground! . . . . . . . . . . . . . . 18--19


Network Security
Volume 2001, Number 1, January 1, 2001

                      Anonymous   Three million credit cards compromised   1--1
                      Anonymous   Singapore backs E-money  . . . . . . . . 2--2
                      Anonymous   Port scanning legal in US  . . . . . . . 2--2
                      Anonymous   Canadian privacy law worries US  . . . . 2--2
                      Anonymous   Cybercrime laws need overhaul  . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   NIPC worried about DoS . . . . . . . . . 3--4
                      Anonymous   Indian teens to police Net . . . . . . . 4--4
                      Anonymous   Security on scale of 1 to 10 . . . . . . 4--4
                      Anonymous   FTC investigates wireless privacy  . . . 4--4
                   Wayne Madsen   Carnivore Documents Reveal Enhanced
                                  Tapping Abilities  . . . . . . . . . . . 5--5
                  Elspeth Wales   McAfee Targets Corporates with its ASP
                                  Security Software  . . . . . . . . . . . 5--6
                  Jackie Groves   Security for Application Service
                                  Providers  . . . . . . . . . . . . . . . 6--9
                 Matthew Pemble   Always Trust Content from Microsoft
                                  Corporation? . . . . . . . . . . . . . . 10--12
                   Arlene Brown   VPNs: Only Part of the Remote Access
                                  Security Solution  . . . . . . . . . . . 12--14
                     Fred Cohen   Marketing Hyperbole at its Finest  . . . 15--17
                      Bill Boni   The Year Just Past and the One Ahead . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 2, February 1, 2001

                      Anonymous   TV station blasts hacked smartcards  . . 1--1
                      Anonymous   Champagne is on MIS  . . . . . . . . . . 2--2
                      Anonymous   More businesses reporting piracy . . . . 2--3
                      Anonymous   CPRM to protect movies and music . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   PDA policy needed  . . . . . . . . . . . 3--3
                      Anonymous   Marconi cracks secure M-commerce . . . . 3--4
                      Anonymous   Buchanan to provide security blanket . . 4--4
                      Anonymous   Entercept secures \$33 million . . . . . 4--4
                      Anonymous   Unisys acquires Balance  . . . . . . . . 4--4
                      Anonymous   SCM get EMV seal of approval . . . . . . 4--4
                 Allan Donnelly   How To Reduce Risks With ActiveX . . . . 5--5
                Barbara Gengler   Workplace Monitoring Tops Privacy
                                  Hit-List . . . . . . . . . . . . . . . . 5--6
                   Wayne Madsen   Computer Security Board Criticized . . . 6--6
                Barbara Gengler   HP and Nokia Secure Wireless
                                  Transactions . . . . . . . . . . . . . . 7--7
                      Anonymous   Anti-virus Vendors Urge Valentine's Day
                                  Caution  . . . . . . . . . . . . . . . . 7--7
                 Graham Roberts   Book Review: \booktitleInside Internet
                                  Security --- What Hackers Don't Want You
                                  To Know: Jeff Crume, Pearson Education
                                  Limited, \pounds 29.95 . . . . . . . . . 8--8
                    Dario Forte   Peer-To-Peer File Sharing Is Here To
                                  Stay: Napster's definitive shift to a
                                  pay service means more problems for
                                  system administrators. Meanwhile, other
                                  similar systems are gaining a foothold   9--11
                 Matthew Pemble   W(h)ither Regulation?  . . . . . . . . . 11--12
                     Jan Hruska   Is The Virus Problem Getting Worse?  . . 13--16
                     Fred Cohen   Testing Your Security Defence by
                                  Breaking In?: Maybe Not  . . . . . . . . 16--18
                      Bill Boni   Balancing The Scales . . . . . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 3, March 1, 2001

                      Anonymous   US says 2600 can't link to DeCSS . . . . 1--2
                      Anonymous   UK legislates against hackers as
                                  cyber-terrorists . . . . . . . . . . . . 2--2
                      Anonymous   Swiss police arrest suspect in WEF hack  2--3
                      Anonymous   McDonalds in BIND exploitation . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   BT profits from cybercrime . . . . . . . 3--4
                      Anonymous   Stock-market sensitive data not secured  4--4
                      Anonymous   EU says fraud has doubled  . . . . . . . 4--4
                      Anonymous   Users click on Naked Wife  . . . . . . . 4--4
                 Allan Donnelly   DNS Software Hole Allows Web Attacks . . 5--5
                      Anonymous   Security Left Out of Investment
                                  Decisions  . . . . . . . . . . . . . . . 5--6
                Barbara Gengler   Trusted Computing Platform Alliance  . . 6--6
                   Oscar Silver   AOL Files Another Lawsuit To Stop Junk
                                  E-mail . . . . . . . . . . . . . . . . . 7--7
                      Anonymous   Post Office Enabled PKI Helps Kids Shop
                                  Online . . . . . . . . . . . . . . . . . 7--7
                   Wayne Madsen   Troubled Waters At NSA . . . . . . . . . 8--10
                 Matthew Pemble   Poking at the Borders: The
                                  Internationally-Minded Toad  . . . . . . 10--11
                     Fred Cohen   Corporate Security Intelligence: An
                                  Oxymoron?  . . . . . . . . . . . . . . . 12--17
                      Bill Boni   The Threat of Cyber-Sabotage: The new
                                  Internet economy has recently seen a
                                  spate of layoffs. E-business had better
                                  watch out for their ex-technical
                                  employees --- and guard against the
                                  potentially crippling effects of
                                  cyber-sabotage . . . . . . . . . . . . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 4, April 1, 2001

                      Anonymous   VeriSign duped into issuing fraudulent
                                  certificates . . . . . . . . . . . . . . 1--2
                      Anonymous   Massive identity theft by NY dish washer 2--2
                      Anonymous   Processes at fault in extortion scam . . 2--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Open source movement turns tables on IP
                                  laws . . . . . . . . . . . . . . . . . . 3--4
                      Anonymous   Defamatory poster exposed  . . . . . . . 4--4
                      Anonymous   Germany to require ISPs to monitor Web   4--4
                      Anonymous   UK trials first mobile electronic
                                  signatures . . . . . . . . . . . . . . . 4--4
                      Anonymous   Wireless WAN standard gets industry
                                  backing  . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Lion eats penguin  . . . . . . . . . . . 5--5
                      Anonymous   Virus can hit Linux or Windows . . . . . 5--5
                   Oscar Silver   Wireless Networks Vulnerable to Attack   6--6
                Barbara Gengler   Network Solutions Selling Database
                                  Information  . . . . . . . . . . . . . . 6--7
                   Wayne Madsen   EU and Council of Europe Showdown
                                  Looming on Internet Surveillance . . . . 7--8
                      Anonymous   Cisco E-business Forum `Scared To Death' 8--9
                  Andrea Kirkby   Cryptography and E-Commerce: a Wiley
                                  Tech Brief . . . . . . . . . . . . . . . 9--9
                 Matthew Pemble   Confidentiality: From Encryption, to
                                  Where? . . . . . . . . . . . . . . . . . 10--11
               Norbert Pohlmann   Smart cards: The Authenticated Solution
                                  For E-business User  . . . . . . . . . . 12--15
                     Fred Cohen   To Prosecute or Not to Prosecute?  . . . 15--18
                      Bill Boni   E-Biz Blitz  . . . . . . . . . . . . . . 18--19
                      Anonymous   My kingdom for a sandbox . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 5, May 1, 2001

                      Anonymous   US and China fight it out online . . . . 1--2
                      Anonymous   Microsoft plasters big hole in W2K . . . 2--2
                      Anonymous   Hacking group plays Peekabooty with
                                  censorship . . . . . . . . . . . . . . . 2--3
                      Anonymous   L0phtCrack v. 3.0 at large . . . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Vigilantes to go after hackers . . . . . 3--3
                      Anonymous   Microsoft offers worm to best US
                                  customers  . . . . . . . . . . . . . . . 3--4
                      Anonymous   FBI sting sets dangerous precedent . . . 4--4
                      Anonymous   Medical records open book in UK  . . . . 4--4
                Barbara Gengler   UN Global E\_security  . . . . . . . . . 5--5
                      Anonymous   DeCSS Linking Appeal Update  . . . . . . 5--5
                   Wayne Madsen   Cybercrime Convention Steams Ahead . . . 6--6
                 Matthew Pemble   The Importance of Being Timely . . . . . 7--8
                 Richard Barber   Managing X-commerce: The importance of a
                                  security-based architecture when
                                  preparing for E-Commerce . . . . . . . . 9--12
                  Iain Franklin   Securing the Operating System: Does
                                  lesser-known mean less at risk? Is the
                                  OS an example of security though
                                  obscurity? . . . . . . . . . . . . . . . 12--13
                  Tony Anscombe   Online Secure Enterprises and The Linux
                                  Effect . . . . . . . . . . . . . . . . . 14--14
                     Fred Cohen   The New Cyber Gang --- a Real Threat
                                  Profile  . . . . . . . . . . . . . . . . 15--17
                      Bill Boni   Building Bridges, Standing Guard . . . . 18--19
                      Anonymous   SOAPBOX: Spider squishing  . . . . . . . 20--20
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 6, June 1, 2001

                      Anonymous   Attrition discontinues mirroring service 1--1
                      Anonymous   NIPC is understaffed and
                                  under-performing . . . . . . . . . . . . 2--2
                      Anonymous   Microsoft make anti-hacker film  . . . . 2--2
                      Anonymous   Protecting kids on the Net is political
                                  magnet . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   GlobalSign to provide root signatures
                                  online . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Free international privacy guide out on
                                  Internet . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Amazon cleared of customer privacy
                                  violations . . . . . . . . . . . . . . . 3--3
                      Anonymous   Worm launched to crash Echelon . . . . . 4--4
                      Anonymous   Security spending set to soar  . . . . . 4--4
                      Anonymous   70% fail to secure confidential data . . 4--4
                      Anonymous   DERA issues free virus protection  . . . 4--4
                Barbara Gengler   US Set To Improve Federal Websites,
                                  Establish CIO  . . . . . . . . . . . . . 5--5
                John Sterlicchi   CERT to sell security alerts . . . . . . 5--6
                 Allan Donnelly   Flawed Mobile Protocol Delays Release of
                                  Standard . . . . . . . . . . . . . . . . 6--6
                      Anonymous   Vulnerability Database Tops 1000 Flaws   6--6
                      Anonymous   The Lowdown on CISSP . . . . . . . . . . 7--7
                 Matthew Pemble   In Theory, It Shouldn't Be Difficult in
                                  Practice . . . . . . . . . . . . . . . . 7--8
                    Dario Forte   Vampire Techniques And How To Escape
                                  Them . . . . . . . . . . . . . . . . . . 9--11
                     Rob Graham   The Fifth Column: The biggest security
                                  threats to financial institutions may
                                  come from within --- whether employees
                                  cooperate or not . . . . . . . . . . . . 12--15
                     Fred Cohen   The Wireless Revolution  . . . . . . . . 16--17
                      Bill Boni   Corporations Caught in the Crossfire?    18--19
                      Anonymous   Events Calender  . . . . . . . . . . . . 20--20
                      Anonymous   A Partly Political Virus Problem . . . . 20--20

Network Security
Volume 2001, Number 7, July 1, 2001

                      Anonymous   SANS.org defaced, down for three days    1--1
                      Anonymous   Attrition team shares mirror's insights  2--2
                      Anonymous   White hat sent down  . . . . . . . . . . 2--3
                      Anonymous   New free vulnerability list launched . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Privacy private say US firms . . . . . . 3--3
                      Anonymous   Mac losing squeaky-clean image . . . . . 3--3
                      Anonymous   EC asks US to keep its spying ECHR
                                  compliant  . . . . . . . . . . . . . . . 3--4
                      Anonymous   EU set to secure Internet  . . . . . . . 4--4
                      Anonymous   Infosec feeling the pinch  . . . . . . . 4--4
                      Anonymous   Encryption market bolstered by hackers   4--4
                Barbara Gengler   CERT Victim of Three Day
                                  Denial-of-service Attack . . . . . . . . 5--5
                  Elspeth Wales   Tap-proof Mobile Phone is Launched . . . 5--6
                Barbara Gengler   Micron--Rambus Lawsuit Delayed . . . . . 6--6
                 Matthew Pemble   A Sceptical Pigeon Amongst The Crypto
                                  Cats: Report on the Edinburgh Financial
                                  Cryptographic Engineering Conference,
                                  2001 . . . . . . . . . . . . . . . . . . 7--9
                 Richard Barber   Social engineering: a People Problem?    9--11
                    Alison Webb   Why Audit a Web Server?: Auditing Web
                                  servers: IIS 4.0 --- Part 1  . . . . . . 11--14
                   Wayne Madsen   Pentagon Orders NSA to Monitor US
                                  Citizens: DoD panel recommends Echelon
                                  be turned on US citizens, increased
                                  domestic role for NSA  . . . . . . . . . 14--16
                     Fred Cohen   A Matter of Power  . . . . . . . . . . . 16--18
                      Bill Boni   The Price of Admission . . . . . . . . . 18--19
                      Anonymous   Don't buy security products  . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 8, August 1, 2001

                      Anonymous   Browser attacks ``can wipe out almost
                                  anything'' . . . . . . . . . . . . . . . 1--1
                      Anonymous   Encryption expert released on bail . . . 2--2
                      Anonymous   Code Red --- hype or horror? . . . . . . 2--3
                      Anonymous   SirCam stampedes mail servers  . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   PDF no longer quite so Peachy  . . . . . 3--4
                      Anonymous   WEP: ready in 15 minutes . . . . . . . . 4--4
                      Anonymous   AI used to catch pirates on Net  . . . . 4--4
                      Anonymous   Port cloaking saves zombies  . . . . . . 4--4
                Barbara Gengler   PoizonB0x Vandalizes Security Sites  . . 5--5
                John Sterlicchi   California Energy Network Under Attack   5--6
                   Gerald Johns   Watching Hackers in the Honeynet . . . . 6--6
                 Matthew Pemble   Yet Another Paradigm!: Trust: a web, a
                                  hierarchy, or something else?  . . . . . 7--9
                    Dario Forte   Web Filtering: Where, How and Why:
                                  Control of Internet use: some
                                  considerations about the implications of
                                  this type of control in the light of the
                                  Italian experience . . . . . . . . . . . 9--10
                 Winn Schwartau   Network Security: It's About Time: An
                                  Offer for a Metric . . . . . . . . . . . 11--13
                   Wayne Madsen   FBI At Centre Stage of Code Red  . . . . 14--15
                      Bill Boni   Fish, CHIPS and Worms  . . . . . . . . . 15--17
                     Fred Cohen   Bootable CDs . . . . . . . . . . . . . . 17--19
                      Anonymous   It's Time To Take Porn Seriously!  . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 9, September 1, 2001

                      Anonymous   War declared on terrorism  . . . . . . . 1--1
                      Anonymous   Hole found in NAI's Gauntlet . . . . . . 2--2
                      Anonymous   Hackers carry out revenge attacks on
                                  Islamic sites  . . . . . . . . . . . . . 2--2
                      Anonymous   Mafiaboy gets eight months . . . . . . . 2--3
                      Anonymous   Linux Trojan in the wild . . . . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Code Blue fights back against Red  . . . 3--4
                      Anonymous   Anna Kournikova author stands trial  . . 4--4
                      Anonymous   Nimda virus hits . . . . . . . . . . . . 4--4
                      Anonymous   Email survives, buildings crash  . . . . 4--4
                      Anonymous   Military remote controls foil
                                  highjackers  . . . . . . . . . . . . . . 4--4
                      Anonymous   Legal update: DMCA happenings  . . . . . 5--6
                  Andrea Kirkby   Book Review: \booktitleInternet Trust
                                  And Security: James Essinger, Addison
                                  Wesley, \pounds 31.99  . . . . . . . . . 6--6
            Stephen Farrell and   
              Michael Zolotarev   XML and PKI --- What's the story?  . . . 7--10
                    Alison Webb   Why Audit a Web Server?: Auditing Web
                                  servers: IIS 4.0 --- Part 2  . . . . . . 11--14
                 Matthew Pemble   Crying `Havoc', Crying `Wolf' or Just
                                  Howling at the Moon? . . . . . . . . . . 14--16
                     Fred Cohen   The Best Security Book Ever Written  . . 17--18
                      Bill Boni   Creating a Global Consensus Against
                                  Cybercrime . . . . . . . . . . . . . . . 18--19
                      Anonymous   When Ignorance Is Not Bliss! . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 10, October 31, 2001

                      Anonymous   Going for a song?  . . . . . . . . . . . 1--1
                      Anonymous   Napster back in court  . . . . . . . . . 2--2
                      Anonymous   Cyber-security time and people poor,
                                  Science Committee told . . . . . . . . . 2--2
                      Anonymous   Bush abandons infrastructure order . . . 2--3
                      Anonymous   Microsoft to rate bug severity . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   NSA release Secure Linux . . . . . . . . 3--4
                      Anonymous   Security incidents set to double . . . . 4--4
                      Anonymous   Nimda fix is malware . . . . . . . . . . 4--4
                      Anonymous   Finance to get secure payments . . . . . 4--4
                      Anonymous   Censoring crypto not the answer says
                                  Schneier . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Netherlands to watch strong crypto . . . 4--4
                   Wayne Madsen   Bush Creates Office of Homeland Security 5--6
                Barbara Gengler   PDAs At Risk, Says Report  . . . . . . . 6--6
                   Chloe Palmer   Cracker Court to Rule on Computer Misuse 6--6
                 Matthew Pemble   Licensed to \ldots Well, to What? And,
                                  by Whom? . . . . . . . . . . . . . . . . 7--9
                     J. J. Gray   What We Can Learn About Malicious Mobile
                                  Code . . . . . . . . . . . . . . . . . . 9--10
                Marie A. Wright   The Advanced Encryption Standard . . . . 11--13
                      Jon David   The Ins and Outs of Intrusion Detection  13--15
                     Fred Cohen   The DMCA: Why It Is Bad For InfoSec
                                  Professionals  . . . . . . . . . . . . . 16--18
                      Bill Boni   The Towers Fall and War Begins . . . . . 18--19
                      Anonymous   Abstracts of recent literature . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 11, November 30, 2001

                      Anonymous   DeCSS legal, rules Californian court . . 1--2
                      Anonymous   Security news site defaced twice . . . . 2--2
                      Anonymous   Dutch bank goes mobile . . . . . . . . . 2--2
                      Anonymous   Email trust is made cheaper  . . . . . . 2--3
                      Anonymous   Internet attracts fraud compliants . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Visa buys in AI tech to fight fraud  . . 3--4
                      Anonymous   Negligent firms support terrorism  . . . 4--4
                      Anonymous   IAAC and ICAF join up thinking . . . . . 4--4
                      Anonymous   What have firms learnt post 9/11?  . . . 4--4
                Barbara Gengler   XP a National Threat?  . . . . . . . . . 5--5
                Barbara Gengler   Princeton Poll Shows 56% Favour Crypto
                                  Regulations  . . . . . . . . . . . . . . 5--6
                Barbara Gengler   CATT --- Government and Industry Team up
                                  in US  . . . . . . . . . . . . . . . . . 6--6
                Dennis Szerszen   Wireless Networking: Nirvana or
                                  Nightmare? . . . . . . . . . . . . . . . 7--7
                 Matthew Pemble   A Moment's Reflection  . . . . . . . . . 8--10
                  Philip Hunter   Barclays Bank Prosecutes Rather Than
                                  Covering Up  . . . . . . . . . . . . . . 10--11
                 Katherine Lang   Who's Watching You?  . . . . . . . . . . 11--13
                    Dario Forte   Can Worms Be Good? . . . . . . . . . . . 14--15
                      Ben White   Fighting The Porn War: The rise of email
                                  pornography in the workplace . . . . . . 16--17
                     Fred Cohen   Should We Use Deception As An InfoSec
                                  Defence? . . . . . . . . . . . . . . . . 18--19
                      Anonymous   Do women hack?: Haxor chicks are go  . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2001, Number 12, December 1, 2001

                      Anonymous   Cybercrime treaty signed, Budapest . . . 1--1
                      Anonymous   Magic Lantern fries crypto keys  . . . . 2--2
                      Anonymous   China shuts down 18000 cyber-cafes . . . 2--2
                      Anonymous   Germany backs open source  . . . . . . . 2--2
                      Anonymous   playboy.com data probed by hackers . . . 2--3
                      Anonymous   DoS set to double again in 2002  . . . . 3--3
                      Anonymous   `Tis the season to defraud . . . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   MS doesn't want to `cry wolf'  . . . . . 3--4
                      Anonymous   IBM invests in biometrics  . . . . . . . 4--4
                      Anonymous   CCTV through your PC or PDA  . . . . . . 4--4
                Barbara Gengler   US Government To Build Own Net . . . . . 5--5
                Barbara Gengler   Network Printers Pose Security Risk,
                                  CERT . . . . . . . . . . . . . . . . . . 5--5
                John Sterlicchi   IBM Establishes Data Privacy Groups  . . 6--6
                   Wayne Madsen   Pentagon Pushes National Identification
                                  Card For US  . . . . . . . . . . . . . . 6--6
                     David Duke   Hack of the Month  . . . . . . . . . . . 7--7
                 Matthew Pemble   Nightmare on the Dot-NET, Part II
                                  (Bill's Back)  . . . . . . . . . . . . . 8--9
                    Ryon Packer   Protecting the Network: NIDS: the
                                  logical first step in intrusion
                                  detection deployment . . . . . . . . . . 10--11
                    Dario Forte   Fragmentation Attacks: Protection Tools
                                  and Techniques: Called ``true
                                  preliminaries to denial-of-service'',
                                  IpFrags are a tough nut to crack for
                                  some firewalls and intrusion detection
                                  systems  . . . . . . . . . . . . . . . . 12--13
                     Deri Jones   Web Hosting --- The Security Risks . . . 14--15
              Chloë Palmer   Review of the Year, Part I: 2001: a game
                                  of two halves  . . . . . . . . . . . . . 15--17
                      Bill Boni   Cyber-terrorists and Counter Spies . . . 17--18
                     Fred Cohen   The World Doesn't Want to be Fixed . . . 19--19
                      Anonymous   `Ethical' hacking  . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2002, Number 1, January 1, 2002

                      Anonymous   Lock up your UPnP says Microsoft . . . . 1--1
                      Anonymous   Sklyarov home for Christmas  . . . . . . 2--2
                      Anonymous   Magic Lantern snooping update  . . . . . 2--2
                      Anonymous   Bid farewell to HTML in email  . . . . . 2--3
                      Anonymous   Bunni bates news site  . . . . . . . . . 3--3
                      Anonymous   US ``somewhat concerned'' about Web
                                  security . . . . . . . . . . . . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   IDSs generate too many false alarms  . . 3--4
                      Anonymous   Biometrics boom in wake of terror  . . . 4--4
                      Anonymous   IT managers work too hard say Intel  . . 4--4
                      Anonymous   Baltimore founder sues old firm  . . . . 4--4
                      Anonymous   Supermarket has security free
                                  E-warehouse  . . . . . . . . . . . . . . 4--4
                Barbara Gengler   Unix Vendors Vulnerable to Malicious
                                  Attacks  . . . . . . . . . . . . . . . . 5--5
                Barbara Gengler   US Army Chooses Smartcard Technology . . 5--6
              Chloë Palmer   Toshiba makes Quantum Crypto
                                  Breakthrough . . . . . . . . . . . . . . 6--6
                     David Duke   Hack of the Month  . . . . . . . . . . . 7--7
              Chloë Palmer   Review of the Year, Part II: 2001: a
                                  game of two halves . . . . . . . . . . . 8--10
                 Matthew Pemble   Be Happy? Share Information??  . . . . . 10--11
                  David Pollino   How To Secure An Office Wireless Network 12--13
                      Anonymous   Ringing The Changes in the Security
                                  Cupboard . . . . . . . . . . . . . . . . 14--16
                     Fred Cohen   The End of The Internet As We Know It    16--18
                      Bill Boni   The Golden Rule? . . . . . . . . . . . . 18--19
                      Anonymous   2002: a Privacy Odyssey: Customer:
                                  Hello, I'd like to upgrade my life. Can
                                  I have some privacy please?''  . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 2, February 28, 2002

                      Anonymous   Hackers on holiday?  . . . . . . . . . . 1--2
                      Anonymous   Gates admits: we need to improve our
                                  security . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Gigger wants to reformat \tt C drives    3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Linux infected by Remote Shell Trojan b  3--4
                      Anonymous   Shock horror --- another virus . . . . . 4--4
                      Anonymous   Instant messaging vulnerability  . . . . 4--4
                      Anonymous   Online intruders enter through Solaris
                                  hole . . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Cross-site scripting closed E-commerce
                                  site . . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Users unable to download security
                                  patches  . . . . . . . . . . . . . . . . 4--4
                   Nick Sellors   Viral Hoaxes . . . . . . . . . . . . . . 5--5
                      Anonymous   Passwords Linked to User `Obsessions'    6--7
                     Paul White   Data security: the Backup Backdoor . . . 8--9
                      Anonymous   Security spending to grow in 2002  . . . 9--9
                    Dario Forte   New Worm Experiments --- a Real danger?  10--11
               Richard Kinsella   Securing E-business in a Wireless
                                  Environment  . . . . . . . . . . . . . . 12--13
                      Anonymous   Update on Amsterdam airport biometric
                                  project  . . . . . . . . . . . . . . . . 13--13
                     Fred Cohen   Strategic Security Intelligence ---
                                  Embedded Security  . . . . . . . . . . . 14--15
                      Anonymous   Another SMS vulnerability discovered . . 15--15
                      Anonymous   Does trust exist?  . . . . . . . . . . . 16--16
                      Anonymous   Events Calendar  . . . . . . . . . . . . 16--16

Network Security
Volume 2002, Number 3, March 31, 2002

                      Anonymous   SNMP security alarms ringing-- is your
                                  enterprise awake and ready?  . . . . . . 1--2
                      Anonymous   Virus poses as anti-virus program! . . . 2--2
                      Anonymous   Wireless LANs unprotected in London  . . 2--2
                      Anonymous   Ethical hackers --- can we trust them?   3--3
                      Anonymous   Don't Forget to Protect Your Custom
                                  Applications . . . . . . . . . . . . . . 4--5
                      Anonymous   The Importance of Hardware-based
                                  Cryptography for Added Security  . . . . 5--5
                      Anonymous   It's About Time: a Metric for
                                  InfoSecurity 1 . . . . . . . . . . . . . 6--9
                      Anonymous   Hidden Threats --- How Much Goes On
                                  Inside Your LAN? . . . . . . . . . . . . 9--11
                      Anonymous   Behaviour Blockers --- a New Dimension
                                  in Protection  . . . . . . . . . . . . . 11--13
                      Anonymous   Semantic Attacks --- a New Wave of
                                  Cyber-terrorism  . . . . . . . . . . . . 13--15
                      Anonymous   The Cost of Internal Threats . . . . . . 15--16
                      Anonymous   `How to Get Around Your ISP' . . . . . . 17--18
                      Anonymous   A Cool Day in Hades? . . . . . . . . . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   Oracle holes hide in the shade of SNMP
                                  limelight  . . . . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 4, April 1, 2002

                      Anonymous   Microsoft: the latest round of
                                  vulnerabilities  . . . . . . . . . . . . 1--1
                      Anonymous   `Trustworthy computing' --- delivers a
                                  new vulnerability scanner to trust!  . . 2--2
                      Anonymous   Remote dial-up numbers free for all to
                                  see  . . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   New Web services specifications from
                                  Microsoft, IBM and VeriSign  . . . . . . 2--3
                      Anonymous   Security embarrassment for UK business   3--3
                      Anonymous   New fingerprint identification
                                  technology for wireless devices  . . . . 3--3
                      Anonymous   HP CEO voicemail leaked to press . . . . 3--3
                     David Duke   Image is everything! . . . . . . . . . . 4--5
                Barbara Gengler   Wireless PANs new standard . . . . . . . 5--5
                    Dario Forte   Onion Routers: a Dangerous Response to
                                  Traffic Analysis?  . . . . . . . . . . . 6--7
                   Bruce Laurie   Managed Vulnerability Assessment (MVA)
                                  --- Improve Security By Understanding
                                  Your Own Vulnerabilities!  . . . . . . . 8--9
                  Philip Hunter   Canal Plus Versus NDS Case . . . . . . . 9--11
                      Dai Davis   Bluetooth  . . . . . . . . . . . . . . . 11--12
                     Fred Cohen   Misimpressions We Need to Extinguish . . 12--17
                      Bill Boni   The Dark Side of E-commerce --- Cracking
                                  the Code or Passing the Buck?  . . . . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   US Army opts for vulnerability
                                  assessment software to defend its global
                                  network terrain  . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 5, May 31, 2002

                      Anonymous   Telecom Security Breaches  . . . . . . . 1--2
                      Anonymous   Klez is back . . . . . . . . . . . . . . 2--2
                      Anonymous   US FAA --- hackers demonstrate what
                                  could happen \ldots  . . . . . . . . . . 2--3
                      Anonymous   US retail giant closes wireless
                                  registers as data beams at hackers . . . 3--3
                      Anonymous   Linux is target for attacks in Germany   3--3
                      Anonymous   DHCP servers subject to remote takeover  3--3
                      Anonymous   New network IDS solutions from Cisco . . 3--3
                     David Duke   What is the difference between
                                  Denial-of-Service (DoS) and
                                  Distributed-Denial-of-Service (DDoS)?    4--4
                      Anonymous   Wireless Security --- what is out there? 5--6
                   Julie Jervis   Worldwide cyber-attacks  . . . . . . . . 6--6
                   Piers Wilson   Biometrics: Here's looking at you \ldots 7--9
                  Ionut Ionescu   Secondary data --- the Poor Relative of
                                  Business Continuity  . . . . . . . . . . 9--11
                    Dario Forte   Vulnerability Management: One Problem,
                                  Several Potential Approaches . . . . . . 11--13
                    Alison Webb   Security and Windows 2000: Part 1  . . . 13--16
                     Fred Cohen   Terrorism and Cyberspace . . . . . . . . 17--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   Instant Messaging --- serious and
                                  secure?  . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 6, June 1, 2002

                      Anonymous   Linux --- to be or not to be secure  . . 1--2
                      Anonymous   Privacy activists scheme to dodge
                                  government monitoring  . . . . . . . . . 2--2
                      Anonymous   Cisco switches become even more
                                  intelligent  . . . . . . . . . . . . . . 2--3
                      Anonymous   Rogue protocol detection now possible    3--3
                      Anonymous   New virus can target more than one
                                  operating system . . . . . . . . . . . . 3--3
                      Anonymous   More new virus tactics --- JPEGS . . . . 3--3
                     David Duke   Hybrid Worms . . . . . . . . . . . . . . 4--4
                    Alison Webb   Security and Windows 2000: Part 2  . . . 5--8
                   David Watson   How To Secure Your Wireless Network  . . 8--11
                   Kerry Davies   What Next? --- A Response to Security
                                  for Business Leaders . . . . . . . . . . 12--13
            Karin Höne and   
                 J. H. P. Eloff   What Makes an Effective Information
                                  Security Policy? . . . . . . . . . . . . 14--16
                      Bill Boni   Card Fraud --- More Serious Than Given
                                  Credit For . . . . . . . . . . . . . . . 16--17
                     Fred Cohen   Academia's Vital Role in Information
                                  Protection . . . . . . . . . . . . . . . 17--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 7, July 1, 2002

                      Anonymous   Hackers demonstrate a new show of
                                  strength . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Changing the computer, as we know it . . 2--2
                      Anonymous   Major satellite hacked in China  . . . . 2--3
                      Anonymous   Apache flaws --- another premature leak  3--3
                      Anonymous   Symantec acquire three more security
                                  companies  . . . . . . . . . . . . . . . 3--3
                     David Duke   Peer-to-peer sharing . . . . . . . . . . 4--4
                    Paul Midian   Getting the most out of Intrusion
                                  Detection Systems  . . . . . . . . . . . 5--7
                 Juan C. Asenjo   The Advanced Encryption Standard ---
                                  Implementation and Transition to a New
                                  Cryptographic Benchmark  . . . . . . . . 7--9
            Abiola Abimbola and   
               David Gresty and   
                         Qi Shi   SubSeven's Honey Pot Program . . . . . . 10--14
               Andreas Mitrakas   Citizen Centric Identity Management:
                                  Chip Tricks? . . . . . . . . . . . . . . 15--16
                     Fred Cohen   Is Open Source More or Less Secure?  . . 17--19
                      Anonymous   Event: CSI NetSec, 2002, San Francisco   19--19
                      Anonymous   Event Calendar . . . . . . . . . . . . . 20--20
                      Anonymous   US Government release security
                                  benchmarks . . . . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 8, August 1, 2002

                      Anonymous   At last, a wireless honeypot . . . . . . 1--2
                      Anonymous   Security job descriptions in disarray    2--2
                      Anonymous   Hollywood crack down on piracy . . . . . 2--3
                      Anonymous   US Homeland Security Bill  . . . . . . . 3--3
                      Anonymous   Hewlett Packard --- rage after Tru64
                                  disclosure . . . . . . . . . . . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Zero day vulnerabilities . . . . . . . . 4--4
                      Anonymous   Perspectives on Penetration Testing ---
                                  What's the Deal with Web Security? . . . 5--8
                      Anonymous   Adventures in Virusland  . . . . . . . . 8--10
                      Anonymous   Alexander Galitsky, Founder &
                                  Co-Chairman, TrustWorks  . . . . . . . . 10--12
                      Anonymous   Mobile Security --- New Needs on New
                                  Devices  . . . . . . . . . . . . . . . . 13--14
                      Anonymous   Quantum Cryptography Revisited . . . . . 14--16
                      Anonymous   All Quiet on the Virus Front?  . . . . . 16--18
                      Anonymous   You're in a Bind!  . . . . . . . . . . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   New trends but the world keeps spinning  20--20

Network Security
Volume 2002, Number 9, September 1, 2002

                      Anonymous   Security Landscape Analysis  . . . . . . 1--2
                      Anonymous   NASA secret data hacked  . . . . . . . . 2--3
                      Anonymous   Security vendors move into the
                                  peer-$2$-peer space  . . . . . . . . . . 3--3
                      Anonymous   Who has been hit by the big bad DDoS?    3--3
                      Anonymous   EU to monitor Internet communications    3--3
                      Anonymous   Spyware, Adware, Systemware and Cookies  4--5
                      Anonymous   Promise From the Future --- Quantum
                                  Cryptography . . . . . . . . . . . . . . 6--6
                      Anonymous   Application Security --- a Serious
                                  Pitfall  . . . . . . . . . . . . . . . . 7--7
                      Anonymous   Firewalls, Intrusion Detection Systems
                                  and Vulnerability Assessment: a Superior
                                  Conjunction? . . . . . . . . . . . . . . 8--11
                      Anonymous   Managed Security Services --- a Buyer's
                                  Guide  . . . . . . . . . . . . . . . . . 12--15
                      Anonymous   Virtual Vigilantes vs Digital Desperados 15--16
                      Anonymous   Protection by Deception  . . . . . . . . 17--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 10, October, 2002

                      Anonymous   The Hacker Preacher  . . . . . . . . . . 1--2
                      Anonymous   The Whitehouse national strategy to
                                  secure cyberspace  . . . . . . . . . . . 2--3
                      Anonymous   New Cybersecurity Taskforce from EC  . . 3--4
                      Anonymous   A slap for Linux, a bug for Windows  . . 4--4
                      Anonymous   New organization to alleviate
                                  vulnerability slip-ups . . . . . . . . . 4--4
                      Anonymous   Out with the old and in with the new
                                  vulnerabilities  . . . . . . . . . . . . 4--4
                      Anonymous   SUN guru shines on Linux security and
                                  Web services . . . . . . . . . . . . . . 5--5
                      Anonymous   The Political Worm . . . . . . . . . . . 5--5
                      Anonymous   Compsec --- Network Security and
                                  Disaster Survival  . . . . . . . . . . . 6--6
                      Anonymous   GPRS Network Security: Welcome to Life
                                  on the Frontier! . . . . . . . . . . . . 7--7
                      Anonymous   HTML Code Injection and Cross-site
                                  Scripting  . . . . . . . . . . . . . . . 8--12
                      Anonymous   The Future of Computer and Network
                                  Forensics  . . . . . . . . . . . . . . . 13--15
                      Anonymous   When to Review Security --- Timing is
                                  Everything \ldots  . . . . . . . . . . . 15--17
                      Anonymous   Reworking Your Firewalls . . . . . . . . 18--19
                      Anonymous   Honeypots --- Not just sticking to
                                  research . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 11, November, 2002

                      Anonymous   Security industry --- disorganized . . . 1--2
                   Wayne Madsen   USA Patriot Act II --- more snooping
                                  powers . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   DDoS strikes --- industry thinks twice   3--3
                      Anonymous   Replacement for WEP  . . . . . . . . . . 3--3
                      Anonymous   Hacking for news . . . . . . . . . . . . 3--3
                     David Duke   Downloader Trojans . . . . . . . . . . . 4--5
                  Philip Hunter   VOIP the latest security concern: DoS
                                  attack the greatest threat . . . . . . . 5--7
                    Dario Forte   Logging Architecture --- Problems and
                                  Solutions  . . . . . . . . . . . . . . . 7--10
                    Paul Midian   Perspectives on Penetration Testing ---
                                  Black Box vs. White Box  . . . . . . . . 10--12
                 Eugene Schultz   Demystifying Intrusion Detection:
                                  Sorting through the Confusion, Hyperbole
                                  and Misconceptions 1 . . . . . . . . . . 12--17
                     Fred Cohen   Breaking in to Test Security?  . . . . . 17--19
                      Anonymous   A Gentle Security Player?  . . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2002, Number 12, December, 2002

                  Philip Hunter   Network security architecture without
                                  perimeters . . . . . . . . . . . . . . . 1--2
                   Wayne Madsen   Industry's attitude to US cybersecurity
                                  plan . . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   System administrators patch too late . . 3--3
                      Anonymous   ISS release vulnerability disclosure
                                  rules  . . . . . . . . . . . . . . . . . 3--3
                      Anonymous   .info domain attacked by DdoS  . . . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                     David Duke   The Peer-to-Peer Threat  . . . . . . . . 4--4
                    Kevin Regan   Designing a Secure Network for
                                  E-Business and Beyond  . . . . . . . . . 5--8
                      Anonymous   Guidelines for Securing Apache Web
                                  Servers  . . . . . . . . . . . . . . . . 8--14
                   Piers Wilson   IT Security --- State of the Nation  . . 15--17
                     Fred Cohen   Back Up a Minute . . . . . . . . . . . . 17--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   Social engineering --- gift of the gab   20--20


Network Security
Volume 2003, Number 1, January, 2003

                      Anonymous   Microsoft Security Culture Shock . . . . 1--3
                      Anonymous   Security benchmarks zap 91% of
                                  vulnerabilities  . . . . . . . . . . . . 3--3
                      Anonymous   Top 10 Web application holes exposed . . 3--3
                      Anonymous   US Government slashes security strategy  3--4
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Microsoft opens code to governments  . . 4--4
                   Wayne Madsen   NIAC calls for changes to US
                                  cybersecurity plan . . . . . . . . . . . 4--4
                     David Duke   Passwords  . . . . . . . . . . . . . . . 5--5
                  Philip Hunter   Lack of integration undermines IT
                                  security . . . . . . . . . . . . . . . . 5--7
                    Kevin Regan   Wireless LAN Security: Things You Should
                                  Know about WLAN Security . . . . . . . . 7--9
                     Steve Lord   Trouble at the Telco: When GSM Goes Bad  10--12
                  David L. King   Moving Towards a Business Continuity
                                  Culture  . . . . . . . . . . . . . . . . 12--17
                     Fred Cohen   Security Programmers --- not all the
                                  same . . . . . . . . . . . . . . . . . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   2002 --- Quick Glance  . . . . . . . . . 20--20

Network Security
Volume 2003, Number 2, February, 2003

                      Anonymous   Slammer Worm --- Lessons Learned . . . . 1--1
              Catherine Everett   Vulnerabilities --- hitting faster and
                                  harder . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   European honeypot server --- hacked
                                  sticky . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   CERT accused of profiting from research  3--3
                      Anonymous   Hacker group --- cracked . . . . . . . . 3--3
                   Wayne Madsen   New US Internet monitoring centre  . . . 3--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                     David Duke   Fooling anti-virus systems . . . . . . . 4--4
                    Vince Gallo   Secret Steganography Techniques Revealed 4--8
                    Paul Midian   Perspectives on Penetration Testing ---
                                  Finding the Right Supplier . . . . . . . 9--11
               H. S. Venter and   
                 J. H. P. Eloff   Assessment of Vulnerability Scanners . . 11--16
                    Dario Forte   Slammer --- the Return of the Network
                                  Nightmare  . . . . . . . . . . . . . . . 17--18
                     Fred Cohen   Switching Your Infrastructure  . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2003, Number 3, March, 2003

                      Anonymous   Getting Back to the Source . . . . . . . 1--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Security breach forces closure of
                                  company  . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Large online gamer paid ransom to hacker
                                  extortionists  . . . . . . . . . . . . . 3--3
                      Anonymous   IDS --- the new firewall?  . . . . . . . 3--3
                      Anonymous   USB --- Plug and Pray? . . . . . . . . . 4--4
                      Anonymous   Wireless LANs --- do they fundamentally
                                  change the conventional security model?  4--7
                      Anonymous   Internet freedom pendulum turns again
                                  \ldots and do people really care?  . . . 8--9
                      Anonymous   The MS-SQL Slammer Worm  . . . . . . . . 10--14
                      Anonymous   Network armies in a world without
                                  secrets  . . . . . . . . . . . . . . . . 14--15
                      Anonymous   Distributed Intrusion Detection Systems
                                  (DIDS) can make security more adaptive   16--18
                      Anonymous   Novelty Detection  . . . . . . . . . . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   US Insight . . . . . . . . . . . . . . . 20--20

Network Security
Volume 2003, Number 4, April, 2003

                      Anonymous   Bugtraq attacked for censorship and
                                  delay  . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Enterprise security concerns in year
                                  ahead  . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Hacktivists attack websites in war
                                  protests . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Top 10 vulnerabilites from CERT  . . . . 3--3
                      Anonymous   Is your Current Security SECURE?: John
                                  Jessop, Cryptic Software . . . . . . . . 3--3
                      Anonymous   Rogue Access Points --- threat to
                                  enterprise security: Bruce Potter  . . . 4--5
                      Anonymous   Early Alerts --- making sense of
                                  security information overload: Kevin
                                  Hawkins, Senior Principal Consultant,
                                  Symantec Corp. . . . . . . . . . . . . . 5--7
                      Anonymous   Network security in action --- can a
                                  worm teach us anything?: Paul King,
                                  Security Consultant, Cisco Systems UK
                                  and Ireland  . . . . . . . . . . . . . . 8--11
                      Anonymous   Perspectives on penetration testing ---
                                  everybody knows this, surely?: Paul
                                  Midian, Insight Consulting . . . . . . . 12--14
                  Philip Hunter   Grid computing . . . . . . . . . . . . . 15--16
                      Anonymous   Covert Channels: Covering `Malicious'
                                  Traffic: Dario Forte . . . . . . . . . . 16--18
                      Anonymous   Documenting Security: Fred Cohen . . . . 18--19
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20
                      Anonymous   Mistakes in fixes  . . . . . . . . . . . 20--20

Network Security
Volume 2003, Number 5, May, 2003

                      Anonymous   Analyst predicts infosecurity market
                                  2003--6  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   IDS switches from detection to
                                  prevention . . . . . . . . . . . . . . . 2--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Windows Server 2003 secure?  . . . . . . 3--3
                      Anonymous   New group merge physical and cyber
                                  security . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Corporates are vulnerable to minor flaws 3--4
                   Bruce Potter   Bluetooth --- Security Optional  . . . . 4--5
                    Kevin Regan   Secure VPN Design Considerations . . . . 5--10
                      Anonymous   An Inside Look at Security Operation
                                  Centres: Dario Forte outlines the role
                                  of Security Operation Centres, the
                                  gatherers of intelligence, in the future
                                  of security  . . . . . . . . . . . . . . 11--12
                  Philip Hunter   Distributed Denial of Service (DDOS)
                                  Mitigation Tools . . . . . . . . . . . . 12--14
                   Piers Wilson   Web Services Security  . . . . . . . . . 14--16
               Carsten H. Eiram   Snort, Sendmail and Samba --- Recent
                                  Risks  . . . . . . . . . . . . . . . . . 16--17
                     Fred Cohen   Operations Security for the Rest of Us   17--19
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20
                      Anonymous   Blackhats Find Vulnerabilities First . . 20--20

Network Security
Volume 2003, Number 6, June, 2003

                      Anonymous   DNS --- prone to more attacks  . . . . . 1--2
                      Anonymous   Cisco self-protecting networks . . . . . 2--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Harmful `free' applications cost
                                  corporates lots  . . . . . . . . . . . . 2--3
                      Anonymous   Security products lack integration . . . 3--3
                      Anonymous   University launches virus writers course 3--3
                   Bruce Potter   Wireless authentication options for up
                                  and down the Stack . . . . . . . . . . . 4--5
              Thomas Kristensen   Rash of IE Vulnerabilities . . . . . . . 6--6
            Paul V. Mockapetris   Defending your DNS & DHCP --- Best
                                  Practices  . . . . . . . . . . . . . . . 7--10
                  Paul Morrison   Database Security  . . . . . . . . . . . 11--12
                 Gunter Ollmann   Best Practice in Managing HTTP-Based
                                  Client Sessions  . . . . . . . . . . . . 13--17
                  Philip Hunter   Defence in depth --- protecting the
                                  queen  . . . . . . . . . . . . . . . . . 17--18
                     Fred Cohen   Background Checks: Series introduction   18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2003, Number 7, July, 2003

                      Anonymous   Web crawling spies hunt corporate
                                  pirates  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Hackers control 3 million servers  . . . 1--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Symantec push honeypot as add-on to IDS  2--3
                      Anonymous   Microsoft RMS to protect ``Digital
                                  Rights'' . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Vulnerability analysis . . . . . . . . . 4--4
                      Anonymous   Know Your Wireless Gear  . . . . . . . . 5--6
                      Anonymous   Database Security (Part II)  . . . . . . 6--8
                      Anonymous   The Perils of Security Patch Management  9--12
                      Anonymous   Part 1: Deploying Honeypots: Project
                                  background and implications  . . . . . . 13--14
                      Anonymous   Part II: Honeypots in Detail: the
                                  Variations . . . . . . . . . . . . . . . 14--15
                      Anonymous   Vulnerability Assessment Tools . . . . . 15--17
                      Anonymous   Questions to ask in information security 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2003, Number 8, August, 2003

                      Anonymous   17 Ways to Crack a Password  . . . . . . 1--2
                      Anonymous   First Predicted Worm arrives to exploit
                                  MS Flaw  . . . . . . . . . . . . . . . . 1--3
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   New Senior Editor Appointed to Network
                                  Security . . . . . . . . . . . . . . . . 3--3
                   Bruce Potter   Wireless Device Discovery  . . . . . . . 4--5
                  Philip Hunter   Security Issues with Offshore
                                  Outsourcing: Offshore coding booming,
                                  but is it safe? Answer is a qualified
                                  yes, but only if you do your homework    5--6
              E. Eugene Schultz   The Sobig Worm Variants: Letter after
                                  letter from A--E . . . . . . . . . . . . 7--10
                 Anton Chuvakin   ``Honeynets: High Value Security Data'':
                                  Analysis of real attacks launched at a
                                  honeypot . . . . . . . . . . . . . . . . 11--15
                   Piers Wilson   Rogue Servers  . . . . . . . . . . . . . 16--18
              Thomas Kristenson   A Big Picture on Recent Vulnerabilities:
                                  Active AX, Web server compromises and
                                  insecure documents . . . . . . . . . . . 19--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   US calls for Spyware law . . . . . . . . 20--20
                      Anonymous   Man steals passwords with keystroke
                                  logger . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 2003, Number 9, September, 2003

                      Anonymous   Blaster variant writers busted . . . . . 1, 3
                      Anonymous   Sobig family set to get bigger and
                                  badder . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                   Bruce Potter   Next Generation Wireless Security Tools  4--5
                      Anonymous   Black Hat Conference: Not Just Hackers:
                                  Report from the Information Security
                                  Festival. Conference Reporter  . . . . . 5--6
                      Anonymous   Unravelling Crypto Developments: Dr
                                  Nicko van Someren, founder and CTO of
                                  nCipher, sorts out fact from fiction
                                  when it comes to quantum encryption  . . 7--8
                    Stuart King   Threats and Solutions to Web Services
                                  Security . . . . . . . . . . . . . . . . 8--11
                     Geoff Shaw   Spyware & Adware: the Risks facing
                                  Businesses . . . . . . . . . . . . . . . 12--14
                  Elspeth Wales   Industry sinks teeth into spam . . . . . 15--17
                      Jon David   Incident Response  . . . . . . . . . . . 17--19
              Thomas Kristensen   The Big Picture on Big Flaws: RPC DCOM
                                  Vulnerability --- What went wrong? . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2003, Number 10, October, 2003

                      Anonymous   Microsoft bites back as blame deepens    1, 3
                      Anonymous   Why it all went wrong with Blaster . . . 1--2
                      Anonymous   Virus authors faster to the kill . . . . 2--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 2--3
              E. Eugene Schultz   The MSBlaster worm: going from bad to
                                  worse  . . . . . . . . . . . . . . . . . 4--8
                      Anonymous   Summer of worms: August's child is a
                                  virus writer . . . . . . . . . . . . . . 8--10
                   Bruce Potter   Wireless security policies . . . . . . . 10--12
                    Joe Stewart   Spam & Sobig: arm in arm  . . . . . . . . 12--16
                  Paul Sullivan   Vulnerability analysis --- what is
                                  important and what is not  . . . . . . . 17--19
              Thomas Kristensen   The Big Picture on Big Holes: SSH and
                                  Sendmail challenge Microsoft's top spot
                                  for flaws  . . . . . . . . . . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2003, Number 11, November, 2003

                      Anonymous   Virus tracking moves back to basics  . . 1, 3
                   Wayne Madsen   Computerized surveillance a top priority
                                  for Pentagon . . . . . . . . . . . . . . 1--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Expert debunks regulation in
                                  cybersecurity  . . . . . . . . . . . . . 2--3
                   Bruce Potter   Wireless-based location tracking . . . . 4--5
                     Colin Lobo   Security Log Management  . . . . . . . . 6--9
                Marcus J. Ranum   The Death of spam? . . . . . . . . . . . 10--13
                      Anonymous   Placing Blame  . . . . . . . . . . . . . 14--15
              Thomas Kristenson   The Big Picture on Big Holes . . . . . . 15--17
                     Berni Dwan   Body Mnemonics in PDA Security . . . . . 17--17
                 Gunter Ollmann   Intrusion Prevention Systems (IPS)
                                  destined to replace legacy routers . . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                      Anonymous   ISPs --- more forceful in security . . . 20--20

Network Security
Volume 2003, Number 12, December, 2003

                      Anonymous   Port 80 Apps --- wider attack avenues    1--1
              Catherine Everett   Full disclosure --- the biggest flaw?    1, 2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Sobig.F spams its way to top of 2003
                                  chart  . . . . . . . . . . . . . . . . . 3--3
                   Bruce Potter   Trends in wireless security --- the big
                                  picture  . . . . . . . . . . . . . . . . 4--5
                    Dario Forte   Principles of digital evidence
                                  collection . . . . . . . . . . . . . . . 6--7
                Richard Starnes   The Trojan Defence . . . . . . . . . . . 8--8
              E. Eugene Schultz   The myth of Homeland security  . . . . . 9--9
                      Jon David   Unpatched vulnerabilities --- the big
                                  issues . . . . . . . . . . . . . . . . . 10--14
                     Berni Dwan   Laptop thieves: Price on their head\$    15--15
                    Bill Conner   Worldwide security . . . . . . . . . . . 16--16
                   Piers Wilson   ``Top-down'' versus ``Bottom-up'' ---
                                  Different approaches to security . . . . 17--19
              Thomas Kristenson   The big picture on Blg holes . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2004, Number 1, January, 2004

              Catherine Everett   Social engineering emails get more
                                  devious  . . . . . . . . . . . . . . . . 1--1
                   Wayne Madsen   Passenger data sharing continues to be a
                                  problem between US & EU . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Sober tops December virus chart  . . . . 3--3
                      Anonymous   TruSecure launches application-based
                                  vulnerability assessment . . . . . . . . 3--3
                      Anonymous   Check Point goes inside to stop threat   3--3
                   Bruce Potter   Warchalking and Bluejacking: Myth or
                                  reality  . . . . . . . . . . . . . . . . 4--5
              E. Eugene Schultz   Windows 2000 security: a postmortem
                                  analysis . . . . . . . . . . . . . . . . 6--9
               Richard Ford and   
                    Helayne Ray   Googling for gold: Web crawlers, hacking
                                  and defense explained  . . . . . . . . . 10--13
               Roger Levenhagen   Trends, codes and virus attacks --- 2003
                                  year in review . . . . . . . . . . . . . 13--15
                      Anonymous   It's a crime . . . . . . . . . . . . . . 15--17
                  Philip hunter   IP V6: Security issues . . . . . . . . . 17--19
              Thomas Kristenson   The big picture on big holes . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 2, February, 2004

                      Anonymous   ASN.1 vulnerability --- all we can do is
                                  patch & wait  . . . . . . . . . . . . . . 1--1
                      Anonymous   Microsoft source code exploited  . . . . 1--2
                  Brian McKenna   IBM and Cisco step up security
                                  convergence  . . . . . . . . . . . . . . 2--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                   Bruce Potter   Securing the mobile device . . . . . . . 4--5
                  Andrew Miller   Is malware wrecking your computer? . . . 5--6
             Steven Furnell and   
               Stamatis Bolakis   Helping us to help ourselves: Assessing
                                  administrators' use of security analysis
                                  tools  . . . . . . . . . . . . . . . . . 7--12
                      Anonymous   MyDoom: Do you ``get it'' yet? . . . . . 13--15
              Thomas Kristensen   The big picture on big holes . . . . . . 15--15
                     Berni Dwan   Research review  . . . . . . . . . . . . 16--17
                  Philip Hunter   Combating video piracy . . . . . . . . . 18--19
                      Anonymous   Not another teenager --- where are the
                                  grown-up virus authors?  . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 3, March, 2004

                      Anonymous   Network security needs numbers say CSOs  1--1
                   Wayne Madsen   Highest level clearances planned for all
                                  US IT security pros  . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Confidentiality breaches: The biggest
                                  cost . . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Cisco fattens security product line  . . 3--3
                      Anonymous   EU forks out EUR 50 million to clean
                                  Internet . . . . . . . . . . . . . . . . 3--3
                   Bruce Potter   Bluetooth ``vulnerabilities''  . . . . . 4--5
                      Anonymous   February: Eventful horizon . . . . . . . 5--7
            Günter Ollmann   Securing against the `threat' of instant 8--11
                  Philip Hunter   Centrally controlled intrusions --- the
                                  future threat  . . . . . . . . . . . . . 12--13
                    Dario Forte   MyDoom & Co. is there really a problem?   14--14
                   Sarah Hilley   The final countdown: 3, 2, 1 \ldots Zero 15--16
                     Berni Dwan   Research review  . . . . . . . . . . . . 17--18
              Thomas Kristenson   The big picture on big holes . . . . . . 19--19
                    Jan Hichert   Opinion: The financial sector's move to
                                  open source security products  . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 4, April, 2004

                   Wayne Madsen   Former FBI Director says encryption
                                  fuels terrorists . . . . . . . . . . . . 1, 3
                      Anonymous   Microsoft squeezes 20 flaws into 4
                                  patches  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   NetScreen combines firewall and
                                  intrusion protection . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   US universities hit in planned attack    3--3
                   Bruce Potter   Wireless intrusion detection . . . . . . 4--5
                   John Heasman   Migrating to the .NET platform: an
                                  introduction . . . . . . . . . . . . . . 6--7
                    Eve Edelson   Security in network attached storage
                                  (NAS) for workgroups . . . . . . . . . . 8--12
                Pieter Claassen   The state of the hack  . . . . . . . . . 12--13
                    Dario Forte   The importance of text searches in
                                  digital forensics  . . . . . . . . . . . 13--15
                   David Morgan   Network security and custom Web
                                  applications . . . . . . . . . . . . . . 15--17
                     Peter Wood   Real IT security on a limited budget?    18--18
                  Brian McKenna   Interview --- Remote access at the BBC   19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 5, May, 2004

                      Anonymous   Microsoft bounty hunt leads to German
                                  youths . . . . . . . . . . . . . . . . . 1--1
                      Anonymous   Online betting site beats blackmail DDoS 1, 3
                   Wayne Madsen   House considers security and privacy
                                  proposals  . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                   Cath Everett   Eurovision secures borders . . . . . . . 3--3
                   Bruce Potter   GSM Security . . . . . . . . . . . . . . 4--5
                   Piers Wilson   Technical challenges faced when
                                  companies merge \ldots . . . . . . . . . 5--7
                   David Morgan   Securing high availability Web
                                  applications . . . . . . . . . . . . . . 8--11
                     Berni Dwan   Open source vs closed  . . . . . . . . . 11--13
              Steven M. Furnell   Getting caught in the phishing net . . . 14--18
                    Jakob Balle   The big picture on big holes . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 6, June, 2004

                      Anonymous   HP exploits new bugs to fix its systems  1--1
                      Anonymous   US Government agencies struggle at patch
                                  management . . . . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                  Brian McKenna   Bug-fixed applications still insecure    2--3
                  Brian McKenna   Cisco and Trend Micro tighten
                                  collaboration around Sasser-like attacks 3--3
                   Bruce Potter   Fixing wireless security . . . . . . . . 4--5
              E. Eugene Schultz   RPC in Windows systems: what you don't
                                  know could hurt you  . . . . . . . . . . 5--8
                    Chris Paget   Hack Chaining: Attacks that become
                                  possible when a server is compromised    8--11
                 Steven Furnell   When vulnerability reports can work
                                  against us . . . . . . . . . . . . . . . 11--15
                  Philip Hunter   Integrated security and network
                                  management remain elusive  . . . . . . . 15--16
                   Sarah Gordon   A short course in antivirus software
                                  testing: seven simple rules for
                                  evaluating tests . . . . . . . . . . . . 17--18
                    Jakob Balle   Bruised Apple to fight back? . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 7, July, 2004

                  Brian McKenna   UK MPs call for Computer Misuse Act
                                  upgrade: CMA in dire need of reform,
                                  says report  . . . . . . . . . . . . . . 1, 3
                   Cath Everett   Testing times for beleagured Internet
                                  Explorer . . . . . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Microsoft unleash 7 updates  . . . . . . 3--3
                   Bruce Potter   802.16 security: getting there?  . . . . 4--5
                     Kevin Dunn   Automatic update risks: can patching let
                                  a hacker in? . . . . . . . . . . . . . . 5--8
                  Andrew Miller   PDA security concerns  . . . . . . . . . 8--10
                 Stefan Gorling   Parasites: what you can't see can hurt
                                  you  . . . . . . . . . . . . . . . . . . 11--13
                     Berni Dwan   The mobile phone virus . . . . . . . . . 14--15
             Maria Papadaki and   
                 Steven Furnell   IDS or IPS: what is best?  . . . . . . . 15--19
              Thomas Kristensen   The big picture on big holes . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 8, August, 2004

                      Anonymous   Stealth bomber screen to block wireless
                                  hackers: BAE makes WLANs disappear . . . 1--2
                      Anonymous   Pfizer to exterminate Viagra spammers    1--3
                 Joe O'Halloran   Fashion sharpens wireless risk . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   MyDoom gags Google . . . . . . . . . . . 3--3
                   Bruce Potter   Wireless updates from Black Hat and
                                  DefCon . . . . . . . . . . . . . . . . . 4--5
                   Gareth James   Malicious threats to Smartphones . . . . 5--7
                  Philip Hunter   Linux security: separating myth from
                                  reality  . . . . . . . . . . . . . . . . 8--9
                 Anton Chuvakin   Linux intrusion discovery: when security
                                  fails  . . . . . . . . . . . . . . . . . 10--12
                   Sarah Hilley   Trusted computing --- path to security
                                  or road to servitude?  . . . . . . . . . 12--15
                     Colin Lobo   Where's my data gone!? . . . . . . . . . 15--17
                      Anonymous   Google's Gmail --- will ads, privacy
                                  concerns or security fears spoil the
                                  free lunch?  . . . . . . . . . . . . . . 18--19
               Andreas Sandblad   The big picture on big holes . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 9, September, 2004

                      Anonymous   UK Government to push greater public
                                  awareness of Internet trust  . . . . . . 1, 3
                      Anonymous   Research pinpoints 10 deadly sins  . . . 1--2
                      Anonymous   German police arrest eBay hi-jacker  . . 2--2
                      Anonymous   Sasser author charged  . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--3
                      Anonymous   VPN for the masses . . . . . . . . . . . 3--3
                   Bruce Potter   Security to the edge . . . . . . . . . . 4--5
                   Piers Wilson   Tips to stop your users from being
                                  phished  . . . . . . . . . . . . . . . . 5--9
                   Michael Kemp   Ghosts in the machine  . . . . . . . . . 9--12
                      Jon David   New threats bring new treatments . . . . 12--15
                     Berni Dwan   Honeynets aim to sting blackhats . . . . 15--18
                  Carsten Eiram   The big picture on big holes . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 10, October, 2004

                      Anonymous   Top 20 fear list unleashed . . . . . . . 1--2
                      Anonymous   Infosec wages buoyant  . . . . . . . . . 2--2
                  Brian McKenna   Accelerated IP v6 shift caught at Check
                                  Point  . . . . . . . . . . . . . . . . . 3--3
                  Brian McKenna   Combination tools to oust point products 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Bruce Potter   Software & network security . . . . . . . 4--5
                      Anonymous   US NSF to spend \$30m to defeat malware  5--6
                   Gene Schultz   Using ssh: Do security risks outweigh
                                  the benefits?  . . . . . . . . . . . . . 7--10
             Steven Furnell and   
                    Jeremy Ward   Malware comes of age: The arrival of the
                                  true computer parasite . . . . . . . . . 11--15
                   Michael Kemp   Basic incident response for system
                                  administrators . . . . . . . . . . . . . 16--18
              Thomas Kristensen   Lethal pictures  . . . . . . . . . . . . 19--20
                  Brian McKenna   Lumeta adds visuals to network discovery
                                  tool . . . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 11, November, 2004

                      Anonymous   Security firms leap into Cahoot debate   1--2
                  Brian McKenna   American Express deploys appliance for
                                  secure file transfer . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   IBM's support for the Liberty Alliance
                                  brings standard convergence for
                                  federated identity a step closer . . . . 3, 20
                   Bruce Potter   The value of Internet alerts . . . . . . 4--4
                     Dale Young   Human Resources have a vital role to
                                  play within employee identity and access
                                  management . . . . . . . . . . . . . . . 5--7
                   David Morgan   Does IT hang together? . . . . . . . . . 8--10
          Stilianos Vidalis and   
                 Andy Jones and   
                   Andrew Blyth   Assessing cyber-threats in the
                                  information environment  . . . . . . . . 10--16
              Thomas Kristensen   Microsoft leaves Win2000, XPSP1 users in
                                  lurch  . . . . . . . . . . . . . . . . . 16--17
               Katrin Shechtman   Divide and conquer . . . . . . . . . . . 18--19
                      Anonymous   USB sticks to be audited --- no escape   20--20
                      Anonymous   Government regulations drive job demand  20--20
                      Anonymous   MS source code fence busted  . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2004, Number 12, December, 2004

                      Anonymous   Viruses in 2004 --- technology stifles
                                  tenacious variants . . . . . . . . . . . 1--2
                      Anonymous   Skewed audit files scupper IDS . . . . . 3--3
                      Anonymous   Company spotlights five flaws that will
                                  be worms . . . . . . . . . . . . . . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--4
                      Anonymous   Year in review . . . . . . . . . . . . . 4--4
                   Bruce Potter   Big Boss is watching you --- but should
                                  he?  . . . . . . . . . . . . . . . . . . 5--6
                    Walter Fumy   IT security standardisation  . . . . . . 6--11
                   David Morgan   Deploying extranets? . . . . . . . . . . 12--14
                  Philip Hunter   Testing security products  . . . . . . . 15--16
                 William Knight   Mobile working drives switch to
                                  federated access rights  . . . . . . . . 16--19
              Thomas Kristensen   Winamp still vulnerable  . . . . . . . . 19--20
                  Brian McKenna   New York mayor, Giuliani, says ``be
                                  prepared'' . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2005, Number 1, January, 2005

              Nova Dudley-Gough   Wave of deceit crashes on the charitable 1--1
                  Brian McKenna   Reuters steps up outsourced monitoring   2--2
                  Brian McKenna   Symantec buys Veritas to broaden
                                  enterprise appeal  . . . . . . . . . . . 2--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                  Philip Hunter   Tsunami spares global IT but shakes up
                                  disaster recovery plans  . . . . . . . . 4--5
              E. Eugene Schultz   Internet Explorer security: is there any
                                  hope?  . . . . . . . . . . . . . . . . . 6--10
                  Ionut Ionescu   Embedded security and the drivers behind
                                  it . . . . . . . . . . . . . . . . . . . 10--13
                   David Morgan   Low-level network assessment: firewalls  14--16
                   Bruce Potter   Is big boss watching you?  . . . . . . . 17--18
              Thomas Kristensen   More holes than a phishing net . . . . . 18--19
                     Berni Dwan   Pervasive spyware  . . . . . . . . . . . 19--19
                  Brian McKenna   Bullish British SMEs poised to splash on
                                  IT security  . . . . . . . . . . . . . . 20--20
              Nova Dudley-Gough   Jail for bug finding researcher? . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 2, February, 2005

                  Brian McKenna   Symantec's Thompson pronounces old style
                                  IT security dead . . . . . . . . . . . . 1, 3
                      Anonymous   Microsoft pushes further into anti-virus
                                  and anti-spyware territory . . . . . . . 1--2
                   SA Mathieson   Profession drive gathers momentum  . . . 2--2
                   Sarah Hilley   Cisco widens security span in network    2--3
                  Brian McKenna   Gates announces security invasion  . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Eve Edelson   Voice over IP: security pitfalls . . . . 4--7
                    Ray Stanton   Getting ahead in security  . . . . . . . 8--10
                      Mike Kemp   When ignorance is not bliss  . . . . . . 10--12
                 William Knight   Worm cure is a hard act  . . . . . . . . 12--14
                   Bruce Potter   Bluetooth attacks start to bite  . . . . 14--15
                  Philip Hunter   Microsoft tackles viruses and spyware at
                                  last, but will it be trusted on
                                  security?  . . . . . . . . . . . . . . . 16--17
                  Craig Pollard   Telecom fraud: the cost of doing nothing
                                  just went up . . . . . . . . . . . . . . 17--19
              Thomas Kristensen   IE patched after `extremely critical'
                                  warning  . . . . . . . . . . . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 3, March, 2005

                   Cath Everett   CA exposure provokes disclosure debate   1--3
                      Anonymous   US election-voting systems blamed for
                                  Bush win . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Ivy League schools bar wanna-B students  3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--4
                  Brian McKenna   Close shave for Japanese bank  . . . . . 4--4
                   Bruce Potter   Dangerous URLs: Unicode & IDN . . . . . . 5--6
                      Mike Kemp   Building security credibility  . . . . . 6--8
                 Steven Furnell   Authenticating ourselves: will we ever
                                  escape the password? . . . . . . . . . . 8--13
                   Mark Heywood   Keeping your data available in 10 steps  14--16
                   Paul Gosling   Trojans & spyware: an electronic Achilles 17--18
                   SA Mathieson   Mobile phone tracking threatens privacy  19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 4, April, 2005

                      Anonymous   Tips to defeat DDoS  . . . . . . . . . . 1--2
                  Brian McKenna   Qualys ticks compliance box  . . . . . . 2--2
                  Brian McKenna   Russian hackers are world class  . . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Ray Stanton   Inside out security: de-perimeterisation 4--6
                 Andrew Stewart   A contemporary approach to network
                                  vulnerability assessment . . . . . . . . 7--10
                   Sarah Hilley   Crypto race for mathematical infinity    10--11
                      Mike Kemp   Biometrics: the eye of the storm . . . . 11--13
                  Philip Hunter   Proactive security latest: vendors wire
                                  the cage but has the budgie flown \ldots 14--15
                     Roger Dean   Management aspects of secure messaging
                                  between organizations  . . . . . . . . . 16--17
                   Bruce Potter   RFID: misunderstood or untrustworthy?    17--18
                Galen A. Grimes   Network security managers' preferences
                                  for the Snort IDS and GUI add-ons  . . . 19--20

Network Security
Volume 2005, Number 5, May, 2005

                      Anonymous   Vulnerabilities so far this year ---
                                  A-V, Oracle, Media Players and Microsoft 1--2
                  Brian McKenna   Cisco unveils integrated security
                                  appliance family . . . . . . . . . . . . 2--3
                      Anonymous   Check Point upgrades security platform   3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                     Joe Licari   Best practices for instant messaging in
                                  business . . . . . . . . . . . . . . . . 4--7
             Terry Ernest-Jones   US National Science Foundation: \$19m
                                  security research programme  . . . . . . 8--9
                     Barry Beal   IT security: the product vendor
                                  landscape  . . . . . . . . . . . . . . . 9--10
                Laurent Marteau   Mac OS X & security --- an overview . . . 11--13
                   Bruce Potter   IT security needs hierarchy  . . . . . . 14--15
                      Mike Kemp   For whom the bells toll: effective IDS
                                  deployment strategies  . . . . . . . . . 16--18
                  Garry Sidaway   The rise and rise of bot networks  . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 6, June, 2005

                   SA Mathieson   UK crypto regulation option dies . . . . 2--2
                      Anonymous   IT security professionals devil-may-care
                                  about USB sticks . . . . . . . . . . . . 2--2
                  Brian McKenna   Dorothy Denning on infosec and physical
                                  security . . . . . . . . . . . . . . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                  Paul Simmonds   Users fight back by breaking the
                                  boundaries . . . . . . . . . . . . . . . 4--6
                   Lannon Rowan   Security in a Web services world . . . . 7--10
                      Mike Kemp   Barbarians inside the gates: addressing
                                  internal security threats  . . . . . . . 11--13
                   Bruce Potter   Wireless vulnerability assessment  . . . 14--15
                      James Kay   Low volume viruses: new tools for
                                  criminals  . . . . . . . . . . . . . . . 16--18
                 Martin Lambert   Blackberry Security  . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 7, July, 2005

                      Anonymous   US state police leaders confront
                                  CardSystems  . . . . . . . . . . . . . . 1--1
                  Brian McKenna   Cyber-terrorist assault will happen,
                                  says Conservative MP . . . . . . . . . . 2--2
                  Brian McKenna   Credit card details in the clear and up
                                  for sale in India  . . . . . . . . . . . 2--2
                  Brian McKenna   Bank starts to sell PKI  . . . . . . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Bruce Potter   Quantum crypto: Star trek or real
                                  science? . . . . . . . . . . . . . . . . 4--5
                 Steven Furnell   Internet threats to end-users: Hunting
                                  easy prey  . . . . . . . . . . . . . . . 5--9
                Dafydd Stuttard   Security & obscurity  . . . . . . . . . . 10--12
                      Paul Rowe   VOIP --- extra threats in the converged
                                  environment  . . . . . . . . . . . . . . 12--16
                   Mark O'Conor   The implications of Sarbanes--Oxley for
                                  non-US IT departments  . . . . . . . . . 17--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 8, August, 2005

                  Brian McKenna   New Symantec to avoid ``over
                                  integration''  . . . . . . . . . . . . . 2--2
                  Brian McKenna   Enterasys CTO blasts Cisco and ISS over
                                  hole controversy . . . . . . . . . . . . 2--2
                      Anonymous   Bidding war for bug hunter rewards . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--4
                   Cath Everett   Godfathers of the net  . . . . . . . . . 4--20
             Terry Ernest-Jones   Business continuity strategy --- the
                                  life line  . . . . . . . . . . . . . . . 5--9
            Christophe Bertrand   Business continuity and mission critical
                                  applications . . . . . . . . . . . . . . 9--11
                  Brian McKenna   Dig deep and look sideways . . . . . . . 12--13
                  Mike Kemp and   
                   Michael Kemp   Beyond trust: security policies and
                                  defence-in-depth . . . . . . . . . . . . 14--16
                   Bruce Potter   Securing the network: changing
                                  priorities . . . . . . . . . . . . . . . 16--17
                 Danny Bradbury   Bits and bridles for free speech . . . . 17--19
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 9, September, 2005

                      Anonymous   FBI arrests young Turk and Moroccan for
                                  Zotob  . . . . . . . . . . . . . . . . . 1--2
                 Joe O'Halloran   Zotob and VoIP . . . . . . . . . . . . . 2--20
                      Anonymous   US researchers to invent new Internet    3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Dario Forte   Log management for effective incident
                                  response . . . . . . . . . . . . . . . . 4--7
                   Bruce Potter   Are passwords dead?  . . . . . . . . . . 7--8
                   David Morgan   Fool-proofing firewalls  . . . . . . . . 9--11
                     Peter Wood   Implementing identity management
                                  security --- an ethical hacker's view    12--15
              Roger K. Sullivan   The case for federated identity  . . . . 15--19
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 10, October, 2005

                   SA Mathieson   Gone phishing in Halifax . . . . . . . . 2--2
                      Anonymous   Microsoft's October patch-fest causes
                                  pain . . . . . . . . . . . . . . . . . . 2--20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                 Matthew Pemble   Evolutionary trends in bank
                                  customer-targeted malware  . . . . . . . 4--7
                       Kev Dunn   Dig yourself out of the data crater ---
                                  database security isn't new, so why
                                  can't we get it right? . . . . . . . . . 7--10
                   Bruce Potter   The end of zero days?  . . . . . . . . . 10--11
           Phillip Hallam-Baker   Prevention strategies for the next wave
                                  of cyber crime . . . . . . . . . . . . . 12--15
               Martin Whitworth   Outsourced security --- the benefits and
                                  risks  . . . . . . . . . . . . . . . . . 16--19
                      Anonymous   QualysGuard to work with Cisco NAC . . . 20--20
                      Anonymous   Lloyds TSB hook up 30,000 customers to
                                  anti-phishing token  . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 11, November, 2005

                      Anonymous   Microsoft investigates spammers with
                                  trick computer . . . . . . . . . . . . . 1--2
                  Brian McKenna   Espionage-linked exploits grow in threat
                                  potential  . . . . . . . . . . . . . . . 2--2
                   SA Mathieson   DoS attack not illegal, says London
                                  judge  . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3, 20
                   Mark Crosbie   Biometrics for enterprise security . . . 4--8
                   Adrian Davis   Return on security investment ---
                                  proving it's worth it  . . . . . . . . . 8--10
                   David Morgan   The evolution of security purchasing . . 11--12
                    Tim Keanini   Protecting TCP/IP  . . . . . . . . . . . 13--16
                    Sal Viveros   Changing malware threats --- AV vendor's
                                  view . . . . . . . . . . . . . . . . . . 16--18
                   Bruce Potter   Layer 2 security: in vogue . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2005, Number 12, December, 2005

                      Anonymous   Microsoft start playing hardball with
                                  anti-virus . . . . . . . . . . . . . . . 1--2
                  Brian McKenna   Internal system vulnerabilities poorly
                                  patched  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Sober worm returns as largest outbreak
                                  of 2005  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Mark Sunner   Email security best practice . . . . . . 4--7
                    Dario Forte   Spyware: more than a costly annoyance    8--10
                Graham Starkins   Outside the safety net --- communicating
                                  beyond traditional network boundaries    10--12
                    Alan Newson   Network threats and vulnerability
                                  scanners . . . . . . . . . . . . . . . . 13--15
                    Chris Voice   Online authentication: matching security
                                  levels to the risk . . . . . . . . . . . 15--18
                   Bruce Potter   Safe and Secure Infrastructure Upgrades  19--20
                      Anonymous   Spam and phish are coming to town  . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2006, Number 1, January, 2006

                   SA Mathieson   Apps under fire  . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
             Steven Furnell and   
                    Leith Zekri   Replacing passwords: in search of the
                                  secret remedy  . . . . . . . . . . . . . 4--8
                   Lannon Rowan   Securing converged networks --- pitfalls
                                  and procedures . . . . . . . . . . . . . 8--10
                Andrew Philpott   Identity theft --- dodging the own-goals 11--13
                  Calum Macleod   The password that's overstayed its
                                  welcome  . . . . . . . . . . . . . . . . 13--15
                   Bruce Potter   Open source firewall alternatives  . . . 16--17
                   John Heasman   Rootkit threats  . . . . . . . . . . . . 18--19
                 Joe O'Halloran   Skype --- an attack surface here to stay 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 2, February, 2006

                      Anonymous   Spyware spikes in northern Europe  . . . 1--2
                   SA Mathieson   Fine-tuning for Olympic IT security  . . 2--2
                  Brian McKenna   Gates and McNeally commit to sharing on
                                  Valentine's Day  . . . . . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Bruce Potter   New threat of Apple Mac OS X . . . . . . 4--5
                     Peter Wood   The hacker's top five routes into the
                                  network (and how to block them)  . . . . 5--9
                   David Morgan   Risk management --- getting properly
                                  valued . . . . . . . . . . . . . . . . . 10--11
                   Mark Stevens   UTM: one-stop protection . . . . . . . . 12--14
             Everett C. Johnson   Security awareness: switch to a better
                                  programme  . . . . . . . . . . . . . . . 15--18
                 Darren Cassidy   Network printing security --- getting to
                                  grips with the multifunction device  . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 3, March, 2006

                   SA Mathieson   John Lewis monitors moves on CCTV  . . . 1--2
                      Anonymous   ISS's CTO on 2006 --- botnet armies and
                                  security services online . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
             Steven Furnell and   
                   Bogdan Ghita   Usability pitfalls in Wireless LAN
                                  security . . . . . . . . . . . . . . . . 4--8
                   David Morgan   Web Injection Attacks  . . . . . . . . . 8--10
                    Steve Waite   Securing online business with SSL  . . . 10--12
                     Ian McGurk   Stealing data on small devices --- tools
                                  to wipe out the iPod predator  . . . . . 13--16
                     Nick Frost   VoIP threats --- getting louder  . . . . 16--18
                   Bruce Potter   Bluetooth security moves . . . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 4, April, 2006

                      Anonymous   UK business careless with online data    1--2
                   Sarah Hilley   HSBC to secure online business customers 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   David Morgan   Web application security --- SQL
                                  injection attacks  . . . . . . . . . . . 4--5
                 Rafael Khokhar   Smartphones --- a call for better safety
                                  on the move  . . . . . . . . . . . . . . 6--7
                  Omer Rana and   
                  Jeremy Hilton   Securing the virtual organization ---
                                  Part 1: Requirements from Grid computing 7--10
               Martin Whitworth   VoIP --- a call for better protection    11--12
          Fernando de la Cuadra   The art of security budgeting --- a new
                                  structure  . . . . . . . . . . . . . . . 12--15
                   Bruce Potter   User education --- how valid is it?  . . 15--16
                    Dario Forte   Keeping up to standard --- incident
                                  management in ISO 17799  . . . . . . . . 16--17
                  Paul A. Henry   Two-factor authentication --- a look
                                  behind the headlines . . . . . . . . . . 18--19
                      Anonymous   Fix for critical IE flaw . . . . . . . . 20--20
                      Anonymous   Small botnets are threat . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20
                   Sarah Hilley   Secret Service dismantles web forums . . 20--20

Network Security
Volume 2006, Number 5, May, 2006

                      Anonymous   New McAfee study reveals risk of using
                                  search engines . . . . . . . . . . . . . 1--2
                      Anonymous   Hacker to be extradited  . . . . . . . . 2--2
                      Anonymous   Mac and Windows systems at risk  . . . . 2--2
                      Anonymous   Money makes e-crime go round . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
              Alisa Bergman and   
               Agnieszka Verlet   Security breaches: to notify or not to
                                  notify --- that is the question  . . . . 4--6
                  Omer Rana and   
                  Jeremy Hilton   Securing the virtual organization, Part
                                  2 --- Grid computing in action . . . . . 6--10
                   Dave Spencer   Vulnerability analysis --- discovery to
                                  disclosure . . . . . . . . . . . . . . . 11--12
               Valerie Surgenor   Setting the records straight \ldots and
                                  staying on the right side of the law . . 13--15
                    Alan Walker   Business continuity and outsourcing ---
                                  moves to take out the risk . . . . . . . 15--17
                   Bruce Potter   The times they are a'changing: trends
                                  that impact security strategy  . . . . . 18--19
                  Daniel Murton   Crypto goes to the heart . . . . . . . . 19--19
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20
                      Anonymous   Success for quantum encryption?  . . . . 20--20

Network Security
Volume 2006, Number 6, June, 2006

                   Sarah Hilley   Five years for Californian botmaster . . 1--2
                  Brian McKenna   Real world security model for infosec,
                                  says Microsoft security guru . . . . . . 2--2
                      Anonymous   Trojan uses pornography trap to steal
                                  bank details . . . . . . . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      David Emm   Focus on Trojans --- holding data to
                                  ransom . . . . . . . . . . . . . . . . . 4--7
                    Dario Forte   Endpoint and perimeter security: a new
                                  symbiosis  . . . . . . . . . . . . . . . 7--8
             Terry Ernest-Jones   Pinning down a security policy for
                                  mobile data  . . . . . . . . . . . . . . 8--12
                   Mark Crosbie   Trusted Computing --- closing that
                                  lingering doubt  . . . . . . . . . . . . 13--15
                   David Morgan   Maintaining state in Web applications    16--18
                   Andy McKewan   Botnets --- zombies get smarter  . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 7, July, 2006

                      Anonymous   Is Apple the best security of all? . . . 1--2
                      Anonymous   Germany wins the European Cup  . . . . . 2--2
                      Anonymous   Theft of 26.5m US war veterans' details  2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
             Shirley O'Sullivan   Instant Messaging vs. instant compromise 4--6
                    Wade Alcorn   Cross-site scripting viruses and worms
                                  --- a new attack vector  . . . . . . . . 7--8
                     Ian Watson   Securing portable storage devices  . . . 8--11
                     Mike Small   Unify and simplify: re-thinking identity
                                  management . . . . . . . . . . . . . . . 11--14
          Matt Gordon-Smith and   
                   Stephen Wing   VoIP and multimedia protocols in
                                  wireless and firewalled environments . . 14--17
                    Soeren Bech   Shedding light on dark traffic attacks   17--19
                      Anonymous   Data security worries still top the list 20--20
                      Anonymous   Just 12% of handheld devices encrypted   20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 8, August, 2006

                      Anonymous   In brief . . . . . . . . . . . . . . . . 2--2
                   Stephen Lamb   Security features in Windows Vista and
                                  IE7 --- Microsoft's view . . . . . . . . 3--7
                Mike Broomfield   NTFS Alternate Data Streams: focused
                                  hacking  . . . . . . . . . . . . . . . . 7--9
                 Steven Furnell   Securing mobile devices: technology and
                                  attitude . . . . . . . . . . . . . . . . 9--13
                      David Emm   Phishing update, and how to avoid
                                  getting hooked . . . . . . . . . . . . . 13--15
                  Lance Mueller   Webjacking, and how to boot it out . . . 15--18
                Michael Marsanu   VoIP: carrying the most sensitive data?  19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 9, September, 2006

                      Anonymous   Upturn in Trojans and Bots . . . . . . . 1--2
                      Anonymous   No more the virus  . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                  Graeme Powell   `Tmobile' --- wising up to wireless
                                  exposure . . . . . . . . . . . . . . . . 4--6
             Terry Ernest-Jones   Threat analysis --- stretching the
                                  limits . . . . . . . . . . . . . . . . . 6--8
                     Paul Byrne   Application firewalls in a
                                  defence-in-depth design  . . . . . . . . 9--11
                   Peter Titmus   Securing IP telephony systems --- best
                                  practices  . . . . . . . . . . . . . . . 11--13
                Andy Solterbeck   Protecting data at rest and in motion    14--17
               Richard Braganza   Cross-site scripting --- an alternative
                                  view . . . . . . . . . . . . . . . . . . 17--20
                      Anonymous   IBM brings ISS into the family . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 10, October, 2006

                      Anonymous   Microsoft to the fore at ISSE 2006 . . . 1--2
                      Anonymous   Security vendors barred from Microsoft's
                                  Vista  . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Dario Forte   Sharpening incident response . . . . . . 4--5
                Michael Marsanu   Is size still a problem for wireless
                                  LANs?  . . . . . . . . . . . . . . . . . 6--8
               Valerie Surgenor   The price of data sharing  . . . . . . . 8--10
                     Chris Boyd   Rogue browsers --- keeping Browsezilla &
                                  Co at bay  . . . . . . . . . . . . . . . 11--12
                  Paul Williams   Cappuccino, muffin, WiFi --- but what
                                  about the security?  . . . . . . . . . . 13--17
                 Martin Murfitt   The case for a tiered internal network   17--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 11, November, 2006

                      Anonymous   BT buys Counterpane to boost IT security
                                  services . . . . . . . . . . . . . . . . 1--2
                  Brian McKenna   Senior infosec pros shift gears from
                                  technology to management . . . . . . . . 2--2
                      Anonymous   `Social networking' study shows
                                  cybercrime risk  . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      David Emm   Mobile malware --- new avenues . . . . . 4--6
             Steven Furnell and   
         Network Research Group   Securing the home worker . . . . . . . . 6--12
                     Peter Wood   In search of the uncrackable Windows
                                  password . . . . . . . . . . . . . . . . 12--13
                   Angus Peacey   Teleworkers --- extending security
                                  beyond the office  . . . . . . . . . . . 14--16
                   Bruce Potter   The changing face of IT security . . . . 16--17
                       Kev Dunn   Poor lockdown practices pave the way to
                                  the domain controller  . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2006, Number 12, December, 2006

                      Anonymous   81% of IT managers report greynet
                                  incidents  . . . . . . . . . . . . . . . 2--2
                      Anonymous   Botnets behind spam surge  . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                     Roger Dean   Identity management --- back to the user 4--7
            Mike Neuenschwander   Identity management market shifts ---
                                  who's out there? . . . . . . . . . . . . 7--10
                    Simon Perry   Network forensics and the inside job . . 11--13
                   Bruce Potter   Cryptographic key management for the
                                  masses . . . . . . . . . . . . . . . . . 13--14
                       Tim Best   Eying up biometrics --- time to go
                                  multimodal?  . . . . . . . . . . . . . . 15--17
                  Adam Matthews   Side-channel attacks on smartcards . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2007, Number 1, January, 2007

                      Anonymous   UK Government drops single-database ID
                                  registry . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Phishing increases as users get wise . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   David Watson   Honeynets: a tool for
                                  counterintelligence in online security   4--8
                    Simon Heron   Working the botnet: how dynamic DNS is
                                  revitalising the zombie army . . . . . . 9--11
                    Steve Kinge   Freedom of speech: Using speech
                                  biometrics for user verification . . . . 12--14
                    Dario Forte   Security standardization in incident
                                  management: the ITIL approach  . . . . . 14--16
                   Bruce Potter   Running Vista --- big OS, big change . . 17--18
                    Donal Casey   Building a secure instant messaging
                                  environment  . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 2, February, 2007

                      Anonymous   Security through uncertainty . . . . . . 1--1
                      Anonymous   Pen test certifications prepare to
                                  compete  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Root name servers come under attack  . . 2--2
                      Anonymous   Peacomm worm takes net by surprise . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
             Keith Harrison and   
                 Bill Munro and   
                    Tim Spiller   Security through uncertainty . . . . . . 4--7
                Stefan Fafinski   The security ramifications of the Police
                                  and Justice Act 2006 . . . . . . . . . . 8--11
                   Bruce Potter   The widening disclosure gap  . . . . . . 11--12
                   Adrian Davis   Authentication across the airwaves . . . 13--19
                    Dario Forte   The negative effects of e-discovery
                                  rules  . . . . . . . . . . . . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 3, March, 2007

                      Anonymous   Vista security verdicts roll in  . . . . 1--2
                      Anonymous   Expert pushes envelope with passport
                                  RFID crack . . . . . . . . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Paul Ritchie   The security risks of AJAX/web 2.0
                                  applications . . . . . . . . . . . . . . 4--8
                  Ross Westcott   Maximizing the ROI of a security audit   8--11
               Stephen de Vries   Software testing for security  . . . . . 11--15
                 Dominic Storey   Network discovery and its security
                                  applications . . . . . . . . . . . . . . 15--18
                   Bruce Potter   Our changing network borders . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 4, April, 2007

                      Anonymous   Symantec tracks commercialisation of
                                  malware  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Animated cursor points to trouble for
                                  Microsoft  . . . . . . . . . . . . . . . 2--2
                      Anonymous   UK plc pinpoints IM, VoIP as security
                                  risks  . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Tom Rowan   Application firewalls: filling the void  4--7
                   Michael Owen   Fun with onion routing . . . . . . . . . 8--12
                    Simon Heron   Botnet command and control techniques    13--16
                      Anonymous   Data breach activity is getting worse    16--16
          Fernando de la Cuadra   The genealogy of malware . . . . . . . . 17--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 5, May, 2007

                      Anonymous   UK Internet voting comes under attack    1--2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                  Kent Anderson   Convergence: a holistic approach to risk
                                  management . . . . . . . . . . . . . . . 4--7
                 Stephen Gleave   The mechanics of lawful interception . . 8--11
               Bruce Potter and   
                    Shmoo Group   Being a good security citizen  . . . . . 11--12
                Bernard Everett   Tapping into fibre optic cables  . . . . 13--16
                 Gunter Ollmann   Writing secure code  . . . . . . . . . . 16--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 6, June, 2007

                      Anonymous   FBI still lax on security  . . . . . . . 1--2
                      Anonymous   Better Business Bureau phishing attacks
                                  continue . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Simon Heron   The rise and rise of the keyloggers  . . 4--6
                      Ken Munro   Wireless worms . . . . . . . . . . . . . 6--8
               Michael Owen and   
                    Colin Dixon   A new baseline for cardholder security   8--12
                  Ram Dantu and   
          Herman Oosterwijk and   
              Prakash Kolan and   
                   Husain Husna   Securing medical networks  . . . . . . . 13--16
                 Richard LeVine   Putting the spirit into security . . . . 17--20
                      Anonymous   Seattle spammer indicted . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 7, July, 2007

                      Anonymous   YouTube hit by security concerns . . . . 1--2
                      Anonymous   MPack packs a nasty punch  . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                Andrew J. Clark   Document metadata, tracking and tracing  4--7
                   Bruce Potter   Alternative web browsers: friend or foe? 7--8
                  Mohamad Badra   Alternative wireless client
                                  authentication and key distribution  . . 9--13
                   Ulf Mattsson   Defending the database . . . . . . . . . 14--17
                Duncan de Borde   Selecting a two-factor authentication
                                  system . . . . . . . . . . . . . . . . . 17--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 8, August, 2007

                      Anonymous   WabiSabiLabi launches vulnerability
                                  market . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Spam formats shift again . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    David Frith   Steganography approaches, options, and
                                  implications . . . . . . . . . . . . . . 4--7
                  Shane Coursen   The future of mobile malware . . . . . . 7--11
                  Paul Williams   Executive and board roles in information
                                  security . . . . . . . . . . . . . . . . 11--14
                      Tim Hwang   Herdict: a distributed model for threats
                                  online . . . . . . . . . . . . . . . . . 15--18
                   Bruce Potter   Mobile security risks: ever evolving . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 9, September, 2007

                      Anonymous   Lords want banks, tech firms held
                                  responsible  . . . . . . . . . . . . . . 1--2
                      Anonymous   Attachment-based malware takes back seat
                                  to spam  . . . . . . . . . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Adam Laurie   Practical attacks against RFID . . . . . 4--7
                 Neil Armstrong   Network infiltration with client-side
                                  attacks  . . . . . . . . . . . . . . . . 8--10
                      Tom Rowan   Intrusion prevention systems: superior
                                  security . . . . . . . . . . . . . . . . 11--15
                Jamie De Guerre   The mechanics of Vipul's Razor
                                  technology . . . . . . . . . . . . . . . 15--17
                   Bruce Potter   Security automation  . . . . . . . . . . 18--19
                      Anonymous   monster.com suffers web attack . . . . . 20--20
                      Anonymous   \booktitleNetwork Security's new look    20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 10, October, 2007

                      Anonymous   US DoD, DHS criticised for security
                                  flaws  . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   VMware patches security flaws  . . . . . 2--2
                      Anonymous   Erratum  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                Kevin Skapinetz   Virtualisation as a blackhat tool  . . . 4--7
                  Miles Clement   Securing the iPod generation . . . . . . 7--9
                   David Watson   Web application attacks  . . . . . . . . 10--14
                    Paul Midian   Networks at risk: detection, defence and
                                  dealing with it  . . . . . . . . . . . . 14--18
                   Bruce Potter   Converging wired and wireless
                                  authentication . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 11, November, 2007

                      Anonymous   IBM launches security offensive  . . . . 1--2
                      Anonymous   Humans + porn = solved Captcha . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Simon Heron   Gang culture in the online world . . . . 4--7
                   David Watson   The evolution of web application attacks 7--12
                    Steve Moyle   The blackhat's toolbox: SQL injections   12--14
                    David Frith   E-voting security: hope or hype? . . . . 14--16
                  Miles Clement   Issues in endpoint security  . . . . . . 17--18
                   Bruce Potter   From concept to production . . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2007, Number 12, December, 2007

                      Anonymous   Data breach casts pall on UK ID card
                                  scheme . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   2008 security predictions roll in  . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Mark Sunner   The rise of targeted Trojans . . . . . . 4--7
                 Kenneth Newman   Home invasion: securing home access to
                                  business networks  . . . . . . . . . . . 8--10
                Abiola Abimbola   Information security incident response   10--13
                      Tom Rowan   VPN technology: IPSEC vs SSL . . . . . . 13--17
                   Bruce Potter   Network flow analysis  . . . . . . . . . 18--19
                      Anonymous   Password crackers see bigger picture . . 20--20
                      Anonymous   \booktitleNetwork Security goes online   20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2008, Number 1, January, 2008

                      Anonymous   More data losses in UK government  . . . 1--1
                      Anonymous   Banking Trojan causes account havoc  . . 2--2
                      Anonymous   Microsoft tests inky password solution   2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Ken Munro   SCADA --- a critical situation . . . . . 4--6
                   Bruce Potter   Controlling JavaScript with Caja . . . . 7--8
        Johannes B. Ullrich and   
                      Jason Lam   Defacing websites via SQL injection  . . 9--10
                  Nollaig Dunne   ID theft for beginners . . . . . . . . . 10--13
                     Mike Small   Managing entitlements  . . . . . . . . . 13--17
                  Lloyd Bridges   The changing face of malware . . . . . . 17--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 2, February, 2008

                      Anonymous   Most malicious web sites are hacked  . . 1--2
                      Anonymous   Business worried about data loss --- but
                                  probably not enough  . . . . . . . . . . 2--2
                      Anonymous   Ontario issues guidance on RFID use  . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Donal Casey   Turning log files into a security asset  4--7
                 Steven J. Ross   Enforcing information security:
                                  architecture and responsibilities  . . . 7--10
            Luigi Lo Iacono and   
                       Jun Wang   Web service layer security (WSLS)  . . . 10--13
                    Dario Forte   An integrated approach to security
                                  incident management  . . . . . . . . . . 14--16
                     Mike Small   Entitlement management --- a practical
                                  approach . . . . . . . . . . . . . . . . 16--19
                      Anonymous   Spammers turn to search engines  . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 3, March, 2008

                      Anonymous   Symantec prepares for managed security
                                  services . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Microsoft downplays BitLocker claim  . . 2--2
                      Anonymous   Google unveils drive-by download details 2--2
                      Anonymous   Ponemon evaluates cost of UK breaches    2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Kerry Dye   Website abuse for search engine
                                  optimisation . . . . . . . . . . . . . . 4--6
               Luis Corrons and   
                Dominic Hoskins   Exploring MBR rootkits . . . . . . . . . 7--9
                   Bruce Potter   Is security really everyone's
                                  responsibility?  . . . . . . . . . . . . 9--10
                   George Fyffe   Addressing the insider threat  . . . . . 11--14
                    Simon Heron   Parasitic malware: The resurgence of an
                                  old threat . . . . . . . . . . . . . . . 15--18
                    Dario Forte   Selling security to top management . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 4, April, 2008

                      Anonymous   SEO poisoning epidemic explodes  . . . . 1--1
                      Anonymous   EU launches PrimeLife project  . . . . . 2--2
                      Anonymous   Attackers target epilepsy site . . . . . 2--2
                      Anonymous   Adware tops charts in Q1 . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                 Charlie Miller   Virtual worlds, real exploits  . . . . . 4--6
                      Don Smith   The challenge of federated identity
                                  management . . . . . . . . . . . . . . . 7--9
                 Dario V. Forte   The PTK: An alternative advanced
                                  interface for Sleuth Kit . . . . . . . . 10--13
                  Fraser Howard   Modern web attacks . . . . . . . . . . . 13--15
                   George Fyffe   Managing multinational compliance
                                  efforts while addressing corporate
                                  security needs . . . . . . . . . . . . . 16--18
                   Bruce Potter   Scalable malware analysis  . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 5, May, 2008

                      Anonymous   SQL attackers strike again . . . . . . . 1--1
                      Anonymous   Researchers crack bot net secrets  . . . 2--2
                      Anonymous   BERR: More work to do on security  . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Mark Sunner   Developing world, developing problems    4--7
                    John Colley   Managing both careers and risks  . . . . 7--9
                    Kurt Roemer   Treating employees as a threat . . . . . 9--11
               Iván Arce   Vulnerability management at the
                                  crossroads . . . . . . . . . . . . . . . 11--13
             Iñaki Urzay   Collective intelligence approaches to
                                  malware recognition  . . . . . . . . . . 14--16
                 Dario V. Forte   Security for safety in railways  . . . . 17--19
                      Anonymous   Symantec: Spammers using AdWords . . . . 20--20
                      Anonymous   Mozilla serves up infected files . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 6, June, 2008

                      Anonymous   Open source software getting better  . . 1--2
                      Anonymous   UK plans Big Brother database  . . . . . 2--2
                      Anonymous   Researcher demonstrates Cisco rootkit    2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Ken Munro   Breaking into Bluetooth  . . . . . . . . 4--6
                 Jane Frankland   IT security metrics: implementation and
                                  standards compliance . . . . . . . . . . 6--9
                      Ivan Arce   Vulnerability management at the
                                  crossroads, part 2 . . . . . . . . . . . 9--12
                 Dario V. Forte   Volatile data vs. data at rest: the
                                  requirements of digital forensics  . . . 13--15
                Thomas Hardjono   Strengthening enterprise applications
                                  using trusted platform modules . . . . . 15--18
                   Bruce Potter   Proxies: a good idea whose time has
                                  passed . . . . . . . . . . . . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 7, July, 2008

                      Anonymous   Kaspersky asks for decryption help . . . 1--2
                      Anonymous   Verizon: External breaches more common   2--2
                      Anonymous   Researchers encode secret messages in
                                  VoIP calls . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
               Victor DeMarines   Obfuscation --- how to do it and how to
                                  crack it . . . . . . . . . . . . . . . . 4--7
                   Jose Nazario   DDoS attack evolution  . . . . . . . . . 7--10
                      Tom Rowan   The secure virtual computer on your
                                  keychain . . . . . . . . . . . . . . . . 11--14
                         Ed Ray   It's the software, stupid  . . . . . . . 14--17
                     Josh Shaul   Implementing database security: using
                                  attack analysis to improve your defences 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 8, August, 2008

                      Anonymous   DNS flaw rocks web . . . . . . . . . . . 1--2
                      Anonymous   City worker holds San Francisco to
                                  ransom . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Online crime networks mimic mafia  . . . 2--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                    Ari Takanen   Fuzzing for the masses . . . . . . . . . 4--6
                Guillaume Lovet   Cybercrime is in a state of flux . . . . 6--8
               Ingo Naumann and   
                   Giles Hogben   Privacy features of European eID card
                                  specifications . . . . . . . . . . . . . 9--13
                       Gene Kim   Seven steps to a secure virtual
                                  environment  . . . . . . . . . . . . . . 14--18
                    Dario Forte   2008: Six months of information security 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 9, September, 2008

                      Anonymous   Home Office: Pass go, do not collect
                                  \pounds 200  . . . . . . . . . . . . . . 1--2
                      Anonymous   Black hats hit Red Hat . . . . . . . . . 2--2
                      Anonymous   Google firms up Gmail security . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Dan Kaminsky   Catching up with Kaminsky  . . . . . . . 4--7
         Steve Mansfield-Devine   OS X --- is it time to start worrying?   7--9
            Siraj A. Shaikh and   
             Howard Chivers and   
              Philip Nobles and   
              John A. Clark and   
                       Hao Chen   Characterising intrusion detection
                                  sensors  . . . . . . . . . . . . . . . . 10--12
                   Bruce Potter   Document protection  . . . . . . . . . . 13--14
                   Clifford May   Approaches to user education . . . . . . 15--17
                    Dario Forte   Do storage and security go arm in arm?   18--19
                      Anonymous   Customer records turn up on auctioned
                                  machine  . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Web security flaws up  . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 10, October, 2008

                      Anonymous   McAfee snaps up Secure Computing . . . . 1--2
                      Anonymous   Security experts: US trailing on
                                  cybersecurity  . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Dave Hartley   Defending Windows servers  . . . . . . . 4--8
            Siraj A. Shaikh and   
             Howard Chivers and   
              Philip Nobles and   
              John A. Clark and   
                       Hao Chen   Characterising intrusion detection
                                  sensors, part 2  . . . . . . . . . . . . 8--11
                 Aditya K. Sood   Hiding a knife behind a smile --- OBS
                                  hacking threats  . . . . . . . . . . . . 12--16
                    Dario Forte   An overview of the best known virtual
                                  solutions  . . . . . . . . . . . . . . . 16--18
                   Bruce Potter   How bad is it? . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 11, November, 2008

                      Anonymous   Microsoft issues emergency patch for RPC
                                  flaw . . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   CSI promotes more sophisticated security
                                  measures . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Alcatel Lucent ships laptop protection
                                  system . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
         Steve Mansfield-Devine   Anti-social networking: exploiting the
                                  trusting environment of Web 2.0  . . . . 4--7
             Carlo Gebhardt and   
            Chris I. Dalton and   
                  Richard Brown   Preventing hypervisor-based rootkits
                                  with trusted execution technology  . . . 7--12
            Siraj A. Shaikh and   
             Howard Chivers and   
              Philip Nobles and   
              John A. Clark and   
                       Hao Chen   Network reconnaissance . . . . . . . . . 12--16
                    Dario Forte   Technological alternatives in incident
                                  response . . . . . . . . . . . . . . . . 16--18
                   Bruce Potter   An everyman SIM  . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2008, Number 12, December, 2008

                      Anonymous   Microsoft axes OneCare . . . . . . . . . 1--2
                      Anonymous   Marshal and 8e6 merge  . . . . . . . . . 2--2
                      Anonymous   NetWitness makes software tool free  . . 2--2
                      Anonymous   BNP members revealed by list leak  . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Ken Munro   Desktop encryption . . . . . . . . . . . 4--6
                  Fabian Libeau   Automating security events management    6--9
         Steve Mansfield-Devine   Danger in the clouds . . . . . . . . . . 9--11
            Siraj A. Shaikh and   
             Howard Chivers and   
              Philip Nobles and   
              John A. Clark and   
                       Hao Chen   False positive response  . . . . . . . . 11--15
                    Jack Danahy   The `phasing-in' of security governance
                                  in the SDLC  . . . . . . . . . . . . . . 15--17
                    Dario Forte   Dealing with forensic software
                                  vulnerabilities: is anti-forensics a
                                  real danger? . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2009, Number 1, January, 2009

                      Anonymous   Downadup worm takes net by storm . . . . 1--1
                      Anonymous   New botnets on the prowl . . . . . . . . 2--2
                      Anonymous   Proof of concept attack further
                                  discredits MD5 . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                Jacques Erasmus   Anatomy of a malware attack  . . . . . . 4--7
                 Maksym Schipka   Dollars for downloading  . . . . . . . . 7--11
                    Simon Heron   Technologies for spam detection  . . . . 11--15
                   Bruce Potter   Microsoft SDL Threat Modelling Tool  . . 15--18
                    Dario Forte   So are we going to govern this security
                                  business?  . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 2, February, 2009

                      Anonymous   Cybersecurity: Obama takes care of
                                  business . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Kyrgyzstan comes under cyberattack . . . 2--2
                      Anonymous   Cost of breaches rises . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Tom Rowan   Password protection: the next generation 4--7
                 Alastair Broom   De-perimeterisation: inevitable and
                                  essential  . . . . . . . . . . . . . . . 7--10
                     Tamas Biro   A window to the world? . . . . . . . . . 11--13
                 Aditya K. Sood   From vulnerability to patch: the window
                                  of exposure  . . . . . . . . . . . . . . 14--16
                   Bruce Potter   Three tips for your network  . . . . . . 16--18
                    Dario Forte   The death of MD5 . . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 3, March, 2009

                      Anonymous   BBC botnet investigation causes
                                  controversy  . . . . . . . . . . . . . . 1--2
                      Anonymous   Anti-phishing organisation launches
                                  common reporting standard  . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
         Steve Mansfield-Devine   Google hacking 101 . . . . . . . . . . . 4--6
                  Vitaly Kamluk   Here's looking at you Kido . . . . . . . 6--8
                      Ori Eisen   In-session phishing and knowing your
                                  enemy  . . . . . . . . . . . . . . . . . 8--11
                 Aditya K. Sood   Is your system pwned?  . . . . . . . . . 11--13
                 Steve Southern   Creating risk management strategies for
                                  IT security  . . . . . . . . . . . . . . 13--16
                    Dario Forte   Security audits in mixed environments    17--19
                      Anonymous   McAfee: Beware the spam of March . . . . 20--20
                      Anonymous   `Monroe Doctrine' needed for cyberspace  20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 4, April, 2009

                      Anonymous   Cyber-espionage operation discovered . . 1--2
                      Anonymous   Rogueware continues to grow  . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Aviram Jenik   Cyberwar in Estonia and the Middle East  4--6
         Steve Mansfield-Devine   Simple website footprinting  . . . . . . 7--9
                   Dennis Dwyer   Chinese cyber-attack tools continue to
                                  evolve . . . . . . . . . . . . . . . . . 9--11
                    Simon Heron   A good policy  . . . . . . . . . . . . . 12--14
                   Ulf Mattsson   Real security for virtual machines . . . 15--17
                    Dario Forte   Anatomy of a phishing attack: a
                                  high-level overview  . . . . . . . . . . 17--19
                      Anonymous   Researcher blows lid off retail networks 20--20
                      Anonymous   US electrical grid compromised . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 5, May, 2009

                      Anonymous   Security groups launch anti-malware
                                  effort . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Gumblar Google attack takes web by storm 2--2
                      Anonymous   Conficker fails, but bots increase . . . 2--2
                      Anonymous   Cyber-swine cash in on real-world flu    2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Aviram Jenik   Fuzzing tools: making sense out of
                                  nonsense . . . . . . . . . . . . . . . . 4--6
                Bruno Rodriguez   The cyber-crime threat to online
                                  transactions . . . . . . . . . . . . . . 7--8
            Shafiullah Khan and   
                  Kok-Keong Loo   Real-time cross-layer design for a
                                  large-scale flood detection and attack
                                  trace-back mechanism in IEEE 802.11
                                  wireless mesh networks . . . . . . . . . 9--16
                Richard Walters   Joining the dots . . . . . . . . . . . . 16--19
                    Dario Forte   Phishing in depth  . . . . . . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 6, June, 2009

                      Anonymous   Chinese protection tool pegged as
                                  badware  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Feds unveil Hathaway review  . . . . . . 2--2
                      Anonymous   Researcher promises smart grid botnet    2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Simon Heron   Online privacy and browser security  . . 4--7
         Steve Mansfield-Devine   A matter of trust  . . . . . . . . . . . 7--9
                     Steve Gold   Not-so-smart meters? . . . . . . . . . . 9--11
            Siraj A. Shaikh and   
             Howard Chivers and   
              Philip Nobles and   
              John A. Clark and   
                       Hao Chen   Towards scalable intrusion detection . . 12--16
                  Ben Rexworthy   Intrusion detections systems --- an
                                  outmoded network protection model  . . . 17--19
                      Anonymous   Browser vendors in patch blitz . . . . . 20--20
                      Anonymous   Researchers build browser-based darknet  20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 7, July, 2009

                      Anonymous   In a recession, disgruntled employees
                                  could pose a security threat from within 1--1
                      Anonymous   Finger pointed at North Korea after
                                  denial of service attacks on the South
                                  and the US . . . . . . . . . . . . . . . 1--2
                      Anonymous   NHS computer viruses impact on patient
                                  healthcare . . . . . . . . . . . . . . . 2--2
                      Anonymous   Bonn discovers partial solution to
                                  Conficker infections . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
         Steve Mansfield-Devine   The promise of whitelisting  . . . . . . 4--6
                    Dario Forte   Are you court validated? . . . . . . . . 6--8
                Luca Caviglione   Understanding and exploiting the reverse
                                  patterns of peer-to-peer file sharing
                                  applications . . . . . . . . . . . . . . 8--12
                  Wendy Goucher   The enemy within . . . . . . . . . . . . 12--14
                   Bruce Potter   A review of L0phtCrack 6 . . . . . . . . 14--17
                    Dario Forte   The importance of log files in security
                                  incident prevention  . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 8, August, 2009

                      Anonymous   Cyber attacks increasingly target
                                  wealthy smartphone owners, says Cisco    1--1
                      Anonymous   Flaws and patching in Las Vegas  . . . . 1--2
                      Anonymous   Rogueware now a major menace . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                 Dario V. Forte   The role of the Information Security
                                  Manager in cutting-edge companies  . . . 4--5
                  Jim Mortleman   Behavioural analysis . . . . . . . . . . 5--7
            Daniel Joseph Barry   Special problems of securing 10Gbps
                                  networks . . . . . . . . . . . . . . . . 8--11
                 Jane Frankland   Numeric data integrity: piercing the
                                  corporate veil . . . . . . . . . . . . . 11--14
                    Kevin Sloan   Security in a virtualised world  . . . . 15--18
                     Steve Gold   The SCADA challenge: securing critical
                                  infrastructure . . . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 9, September, 2009

                      Anonymous   Failed firm banned from selling
                                  customers' personal data . . . . . . . . 1--1
                      Anonymous   Massive website infection avoids
                                  detection by search engine security
                                  scanners . . . . . . . . . . . . . . . . 1--1
                      Anonymous   ID theft malware on the increase . . . . 1--2
                      Anonymous   US lab develops federated model for
                                  defence against cyber attack . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Dave Abraham   Why 2FA in the cloud?  . . . . . . . . . 4--5
               Nick Garlick and   
        Nebulas Solutions Group   The hidden benefits of optimising your
                                  firewall . . . . . . . . . . . . . . . . 6--9
                   Cath Everett   Moving across to the dark side . . . . . 10--12
                 R. Sridevi and   
               A. Damodaram and   
            S. V. L. Narasimham   A novel architecture for enhanced
                                  security through virtualisation and
                                  spoofing . . . . . . . . . . . . . . . . 12--16
                    Dario Forte   Compliance vs business security  . . . . 16--18
                  Wendy Goucher   Carpe sus: security in the time of swine
                                  flu  . . . . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 10, October, 2009

                      Anonymous   Wireless researchers learn to see
                                  through walls  . . . . . . . . . . . . . 1--2
                      Anonymous   DHS needs to fix web site security . . . 2--2
                      Anonymous   Spam-borne malware is on the rise  . . . 2, 19
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Nick Lowe   Shields Up! Protecting browsers,
                                  endpoints and enterprises against
                                  web-based attacks  . . . . . . . . . . . 4--7
               Patrick J. Walsh   The brightening future of cloud security 7--10
                 Dominic Storey   Securing process control networks  . . . 10--13
                 A. Agrawal and   
                     R. A. Khan   Measuring the vulnerability of an
                                  object-oriented design . . . . . . . . . 13--17
                    Dario Forte   SSL VPN and return on investment: a
                                  possible combination . . . . . . . . . . 17--19
                      Anonymous   Advertising malware scammers get smarter 19--20
                      Anonymous   Europe leaves door open for
                                  three-strikes policy . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 11, November, 2009

                      Anonymous   Adobe design flaw alleged  . . . . . . . 1--2
                      Anonymous   IPS equipment fails to make grade  . . . 2--2
                      Anonymous   Web applications vulnerabilities severe,
                                  says Cenzic  . . . . . . . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                     Sudha Iyer   New approaches to securing the database  4--8
                     Andy Jones   Recycling more than your IT equipment    8--9
           Sindhu Xirasagar and   
                Masoud Mojtahed   Securing IP networks, Part I . . . . . . 10--14
                 Dominic Storey   Catching flies with honey tokens . . . . 15--18
                    Dario Forte   Is it really important to have a
                                  structured security budget?  . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2009, Number 12, December, 2009

                      Anonymous   WPA cracking tool launched . . . . . . . 1--2
                      Anonymous   Google launches DNS server . . . . . . . 2--2
                      Anonymous   Malware rebounds as data loss cause  . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                    Phillip Lin   Anatomy of the Mega-D takedown . . . . . 4--7
                    Simon Heron   Advanced Encryption Standard (AES) . . . 8--12
              Seung S. Yang and   
                   Hongsik Choi   A complement to the GridOne
                                  authentication method  . . . . . . . . . 12--18
                    Dario Forte   Application delivery: pros and cons both
                                  virtual and real . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2010, Number 1, January, 2010

                      Anonymous   Aurora hack spawns widespread concern    1--2
                      Anonymous   Google challenged on search privacy  . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                Rik Fergusonnam   Back to the future . . . . . . . . . . . 4--7
                 Steven Furnell   Mac security: An Apple that can't be
                                  bitten?  . . . . . . . . . . . . . . . . 7--11
         Steve Mansfield-Devine   The perils of sharing  . . . . . . . . . 11--13
           Sindhu Xirasagar and   
                Masoud Mojtahed   Securing IP networks . . . . . . . . . . 13--17
                 Dario V. Forte   The responsibilities of an incident
                                  responder  . . . . . . . . . . . . . . . 18--19
                      Anonymous   Online criminals replacing brawn with
                                  brain  . . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 2, February, 2010

                      Anonymous   New Internet Explorer bug emerges  . . . 1--2
                      Anonymous   SpyEye continues battle of the botnets   2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
              Andrew Brandt and   
                  Zachary Wolff   When admins attack: 30 hours in the life
                                  of a Gumblar victim  . . . . . . . . . . 4--8
                      Tom Rowan   Negotiating WiFi security  . . . . . . . 8--12
                     Alan Goode   Managing mobile security: How are we
                                  doing? . . . . . . . . . . . . . . . . . 12--15
                Danny McPherson   Cybercrime --- a game of cat and mouse
                                  in 2009  . . . . . . . . . . . . . . . . 15--18
                    Dario Forte   Preventing and investigating hacking by
                                  auditing web applications  . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 3, March, 2010

                      Anonymous   Botherders battle to stay online . . . . 1--2
                      Anonymous   Researcher issues code for yet another
                                  IE flaw  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   SSD used to speed up password cracking   2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
         Steve Mansfield-Devine   Divide and conquer: the threats posed by
                                  hybrid apps and HTML 5 . . . . . . . . . 4--6
                Georg Wicherski   Placing a low-interaction honeypot
                                  in-the-wild: A review of mwcollectd  . . 7--8
                 Robert Janssen   VDI and security . . . . . . . . . . . . 8--11
                   Luis Corrons   The rise and rise of NDR . . . . . . . . 12--16
                 S. Chandra and   
                     R. A. Khan   Confidentiality checking an
                                  object-oriented class hierarchy  . . . . 16--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 4, April, 2010

                      Anonymous   PDF attacks on the rise, says Symantec   1--2
                      Anonymous   Extortion malware scares file sharers
                                  with fake copyright messages . . . . . . 2--2
                      Anonymous   PAC attack redirects browsers to
                                  malicious sites using proxy hack . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                  Aaron Portnoy   Pwn2Own wrap up and analysis . . . . . . 4--5
                      Paul Wood   Bot wars: the spammers strike back . . . 5--8
                  Graham Cluley   Sizing up the malware threat --- key
                                  malware trends for 2010  . . . . . . . . 8--10
                      Ori Eisen   Catching the fraudulent
                                  Man-in-the-Middle and Man-in-the-Browser 11--12
                   James Carnie   Preserving security in a multi-tenanted
                                  hosting environment  . . . . . . . . . . 12--15
             Paul Vlissidis and   
                 Matthew Hickey   Thin clients: slim security? . . . . . . 16--19
                      Anonymous   Network Security fixes WordPress
                                  configuration hole . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 5, May, 2010

                      Anonymous   Facebook under attack on all fronts  . . 1--2
                      Anonymous   Google `accidentally' snooped on wifi
                                  data . . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
         Steve Mansfield-Devine   Battle of the botnets  . . . . . . . . . 4--6
                   Paul Steiner   Why FTP is no longer up to the job . . . 7--9
                    Simon Heron   Denial of service: motivations and
                                  trends . . . . . . . . . . . . . . . . . 10--12
                   Adrian Davis   Managing third parties --- an
                                  information security perspective . . . . 13--15
                 Danny Bradbury   Shadows in the cloud: Chinese
                                  involvement in advanced persistent
                                  threats  . . . . . . . . . . . . . . . . 16--19
                      Anonymous   Browsers uniquely identify users . . . . 19--19
                      Anonymous   India fears cyberspying by China . . . . 19--20
                      Anonymous   Twitter commands DIY botnets . . . . . . 20--20
                      Anonymous   Virtualisation worries . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 6, June, 2010

                      Anonymous   Reduce IT security costs without
                                  increasing risk  . . . . . . . . . . . . 1--2
                      Anonymous   New ventures help developers in fight
                                  against security flaws . . . . . . . . . 2--2
                      Anonymous   Windows flaw disclosure causes fierce
                                  debate . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
              Daniel Karrenberg   DNSSEC: Securing the global
                                  infrastructure of the Internet . . . . . 4--6
           Shadi Aljawarneh and   
              Shadi Masadeh and   
               Faisal Alkhateeb   A secure wifi system for wireless
                                  networks: an experimental evaluation . . 6--12
                 Danny Bradbury   A hole in the security wall: ATM hacking 12--15
                Michael Hamelin   Preventing firewall meltdowns  . . . . . 15--16
                  Luther Martin   Protecting credit card information:
                                  encryption vs tokenisation . . . . . . . 17--19
                      Anonymous   AT&T leaks private data of Apple
                                  customers --- twice  . . . . . . . . . . 20--20
                      Anonymous   Facebook suffers from rash of
                                  clickjacking . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 7, July, 2010

                      Anonymous   Smartphone vulnerabilities . . . . . . . 2--2
                      Anonymous   Malware-infested spam on the rise  . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                  Rodney Joffee   Cybercrime: the global epidemic at your
                                  network door . . . . . . . . . . . . . . 4--7
                 Danny Bradbury   Hands-on with Metasploit Express . . . . 7--11
                    Jay Schiavo   Code signing for end-user peace of mind  11--13
                      Ori Eisen   Online security --- a new strategic
                                  approach . . . . . . . . . . . . . . . . 14--15
                       Des Ward   The cost of saving money: no longer the
                                  company reputation . . . . . . . . . . . 15--19
                      Anonymous   Disclosure and non-disclosure  . . . . . 19--20
                      Anonymous   Software flaws set to double . . . . . . 20--20
                      Anonymous   Twitter told to tighten security . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 8, August, 2010

                      Anonymous   Intel buys McAfee  . . . . . . . . . . . 1--2
                      Anonymous   Black Hat and DefCon highlights  . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                     Steve Gold   Cracking passwords . . . . . . . . . . . 4--7
                 Dominic Storey   Ten consequences of network blindness    7--9
             Seong-Hwan Kim and   
           Sundar Vedantham and   
                  Pravin Pathak   SMB gateway firewall implementation
                                  using a network processor  . . . . . . . 10--15
                   Graham Smith   Countering datacentre security pressures 15--17
                Stephen Midgley   The state of encryption in Europe: some
                                  cultural comparisons . . . . . . . . . . 18--19
                      Anonymous   Did malware cause Spanair crash? . . . . 20--20
                      Anonymous   Phishing down, Zeus up . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 9, September, 2010

                      Anonymous   Stuxnet may be the work of state-backed
                                  hackers  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Wins and losses in the botnet war  . . . 2, 19
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
         Simon Bransfield-Garth   Mobile phone calls as a business risk    4--11
                Mark Taylor and   
              John Haggerty and   
               David Gresty and   
                    Paul Fergus   Forensic investigation of peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 12--15
                     Steve Gold   Password alternatives  . . . . . . . . . 16--19
                      Anonymous   Corporate attacks focus on web . . . . . 19--20
                      Anonymous   Smartphones present major threat . . . . 20--20
                      Anonymous   Hacking popular among students . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 10, October, 2010

                      Anonymous   Stuxnet: rumours increase, infections
                                  spread . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Threat round-up  . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
             Maria Papadaki and   
                 Steven Furnell   Vulnerability management: an attitude of
                                  mind?  . . . . . . . . . . . . . . . . . 4--8
                 Patrice Perche   Network latency: avoid paying a tax on
                                  time . . . . . . . . . . . . . . . . . . 9--12
                   Oleg Zaitsev   Skeleton keys: the purpose and
                                  applications of keyloggers . . . . . . . 12--17
                    Eric Knight   Investigating digital fingerprints:
                                  advanced log analysis  . . . . . . . . . 17--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 11, November, 2010

                      Anonymous   Bredolab botnet taken down . . . . . . . 1--2
                      Anonymous   Zeus makes final appearance? . . . . . . 2--2
                      Anonymous   Anti-virus for Macs  . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                 Danny Bradbury   Avoiding URL hell  . . . . . . . . . . . 4--6
                Richard Walters   Managing privileged user activity in the
                                  datacentre . . . . . . . . . . . . . . . 6--10
                     Steve Gold   Social engineering today: psychology,
                                  strategies and tricks  . . . . . . . . . 11--14
                Marc Boroditsky   Click, click, who's there? . . . . . . . 14--16
                    Rob Warmack   Compliance today --- and tomorrow  . . . 16--18
                Nick Cavalancia   Preventing data loss by securing USB
                                  ports  . . . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2010, Number 12, December, 2010

                      Anonymous   Predictions for the New Year . . . . . . 1--2
                      Anonymous   More users means security challenges . . 2--2
                      Anonymous   Higher priority for security . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                  Shlomi Dinoor   Privileged identity management: securing
                                  the enterprise . . . . . . . . . . . . . 4--6
                  Philip Ridley   Outsmarting the smartphone fraudsters    7--9
                     Steve Gold   Protecting the cloud: attack vectors and
                                  other exploits . . . . . . . . . . . . . 10--12
                 Steven Furnell   Usability versus complexity --- striking
                                  the balance in end-user security . . . . 13--17
                   Marcus Ranum   The well-meaning threat  . . . . . . . . 17--19
                      Anonymous   US public-private partnership for
                                  cyber-security . . . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2011, Number 1, January, 2011

                      Anonymous   Security professionals focus on
                                  yesterday's skills . . . . . . . . . . . 1--2
                      Anonymous   Wifi security cracked  . . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
         Steve Mansfield-Devine   Anonymous: serious threat or mere
                                  annoyance? . . . . . . . . . . . . . . . 4--10
              Edward G. Amoroso   Cyber attacks: awareness . . . . . . . . 10--16
                     Steve Gold   Advanced evasion techniques  . . . . . . 16--19
                      Anonymous   Passwords not up to the task . . . . . . 20--20
                      Anonymous   Data leaks result from malicious intent  20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 2, February, 2011

                      Anonymous   Sinister trends in cyberthreats  . . . . 2--2
                      Anonymous   European guidelines for resilience and
                                  cyber-security . . . . . . . . . . . . . 2, 19--20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                   Steve Durbin   Information security without boundaries  4--8
                 Danny Bradbury   Hacking wifi the easy way  . . . . . . . 9--12
                     Steve Gold   The future of the firewall . . . . . . . 13--15
                     David Ting   Thinking thin: addressing the challenges
                                  of client computing  . . . . . . . . . . 16--17
                Michael Hamelin   Preparing for a firewall audit . . . . . 18--19
                      Anonymous   Zeus and SpyEye hybrid emerges . . . . . 20--20
                      Anonymous   Waledac makes a comeback . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 3, March, 2011

                      Anonymous   The resurgence of Zeus and other banking
                                  Trojans  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Nearly half of organisations are not
                                  protected  . . . . . . . . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                Mark Taylor and   
              John Haggerty and   
               David Gresty and   
                     David Lamb   Forensic investigation of cloud
                                  computing systems  . . . . . . . . . . . 4--10
              Russell Sanderson   A secure data protection strategy  . . . 10--12
               Shadi Aljawarneh   A web engineering security methodology
                                  for e-learning systems . . . . . . . . . 12--15
                     Steve Gold   IPv6 migration and security  . . . . . . 15--18
                 Alexei Lesnykh   Data loss prevention: a matter of
                                  discipline . . . . . . . . . . . . . . . 18--19
                      Anonymous   OS X Trojan now in beta  . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 4, April, 2011

                      Anonymous   RSA hack leaves status of SecurID
                                  uncertain  . . . . . . . . . . . . . . . 1--2
                      Anonymous   Few aware of smartphone vulnerability    2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleSecurity for
                                  Microsoft Windows Systems
                                  Administrators, by Derrick Rountree.
                                  Published by Syngress (ISBN
                                  978-1-59749-594-3, e-ISBN
                                  978-1-59749-595-0) . . . . . . . . . . . 4--4
                      Anonymous   Microsoft Windows 7 Administrator's
                                  Reference  . . . . . . . . . . . . . . . 4--4
                      Anonymous   News in Brief  . . . . . . . . . . . . . 4--4
                Tracey Caldwell   Smart security . . . . . . . . . . . . . 5--9
                  Andy Kemshall   Why mobile two-factor authentication
                                  makes sense  . . . . . . . . . . . . . . 9--12
                     Steve Gold   Cracking GSM . . . . . . . . . . . . . . 12--15
              Richard Blandford   Information security in the cloud  . . . 15--17
                  Steve Jenkins   Learning to love SIEM  . . . . . . . . . 18--19
                      Anonymous   Utilities still under threat . . . . . . 20--20
                      Anonymous   Calendar . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 5, May, 2011

                      Anonymous   US Government takes over Coreflood
                                  botnet . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   NSS uncovers firewall shortcomings . . . 2, 19
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleComputer
                                  Networks: a systems approach, by Larry
                                  Peterson and Bruce Davie. Fifth Edition.
                                  Morgan Kaufman. ISBN 978-0-12-385059-1   4--4
                      Anonymous   News in Brief  . . . . . . . . . . . . . 4--4
                 Danny Bradbury   Routing around censorship  . . . . . . . 5--8
             Aditya K. Sood and   
              Richard J. Enbody   Spying on the browser: dissecting the
                                  design of malicious extensions . . . . . 8--12
                     Steve Gold   Taking down botnets  . . . . . . . . . . 13--15
 Ravi Chandra Jammalamadaka and   
            Sharad Mehrotra and   
  Nalini Venkatasubramanian and   
                   Kent Seamons   DataVault: secure mobile access and data
                                  sharing  . . . . . . . . . . . . . . . . 16--19
                      Anonymous   EU questions stability of the Internet   19--20
                      Anonymous   Hackers may be `pimping' data  . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 6, June, 2011

                      Anonymous   RSA replacing SecurID tokens . . . . . . 1--2
                      Anonymous   Google spear-phishing targets
                                  governments and military . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleIPv6 for
                                  Enterprise Networks, by Shannon
                                  McFarland, Muninder Sambi, Nikhil
                                  Sharma, and Sanjay Hooda. Cisco Press.
                                  ISBN 978-1-58714-227-7 . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitlePKI Uncovered,
                                  Andre Karamanian, Srinivas Tenneti,
                                  François Dessart. Cisco Press. ISBN
                                  978-1-58705-916-2  . . . . . . . . . . . 4--4
                   Steve Durbin   Tackling converged threats: building a
                                  security-positive environment  . . . . . 5--8
                Tracey Caldwell   When worlds collide: the security of
                                  converged networks . . . . . . . . . . . 8--12
                    Jeff Hudson   Weaponised malware: how criminals use
                                  digital certificates to cripple your
                                  organisation . . . . . . . . . . . . . . 12--14
                     Steve Gold   The rebirth of phreaking . . . . . . . . 15--17
                   Marc Hocking   Thin client security in the cloud  . . . 17--19
                      Anonymous   More malware for Android . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 7, July, 2011

                      Anonymous   High costs but higher profits with
                                  targeted attacks . . . . . . . . . . . . 1--2
                      Anonymous   Firms turn down free data breach audits  2--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleCisco Firewalls,
                                  by Alexandre Moraes. Cisco Press. ISBN
                                  978-1-58714-109-6  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleCisco Firewalls,
                                  by Alexandre Moraes. Cisco Press. ISBN
                                  978-1-58714-109-6  . . . . . . . . . . . 4--4
                     Steve Gold   Terrorism and Bluetooth  . . . . . . . . 5--7
                   Will Gragido   Beyond zero: analysing threat trends . . 7--9
                Tracey Caldwell   Ethical hackers: putting on the white
                                  hat  . . . . . . . . . . . . . . . . . . 10--13
       R. Sreeram Sreenivas and   
                      R. Anitha   Detecting keyloggers based on traffic
                                  analysis with periodic behaviour . . . . 14--19
                      Anonymous   Wins and losses in the war on botnets    20--20
                      Anonymous   Al-Qaeda forum knocked offline . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 8, August, 2011

                      Anonymous   Black Hat and DefCon highlights  . . . . 2, 19--20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitlePractical Packet
                                  Analysis: using Wireshark to solve
                                  real-world network problems, by Chris
                                  Sanders. Second Edition. No Starch
                                  Press. ISBN 978-1-59327-266-1  . . . . . 4--4
                      Anonymous   Correction . . . . . . . . . . . . . . . 4--4
         Steve Mansfield-Devine   Hacktivism: assessing the damage . . . . 5--13
                     Avi Turiel   IPv6: new technology, new threats  . . . 13--15
                  Colin Tankard   Advanced Persistent threats and how to
                                  monitor and deter them . . . . . . . . . 16--19
                      Anonymous   Mobile users face mounting threats . . . 20--20
                      Anonymous   Web apps attacked every two minutes  . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 9, September, 2011

                      Anonymous   APT hype is a distraction from real
                                  security needs, says Gartner . . . . . . 1--2
                      Anonymous   Android is most-attacked mobile platform 2, 20
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleMetasploit: The
                                  Penetration Tester's Guide, by David
                                  Kennedy, Jim O'Gorman, Devon Kearns, and
                                  Mati Aharoni. No Starch Press. ISBN
                                  978-1-59327-288-3  . . . . . . . . . . . 4--4
                     Steve Gold   Cracking cellular networks via
                                  femtocells . . . . . . . . . . . . . . . 5--8
                   Cath Everett   Printers: the neglected threat . . . . . 8--11
 Ravi Chandra Jammalamadaka and   
            Sharad Mehrotra and   
      Nalini Venkatasubramanian   Protecting personal data from untrusted
                                  web-based data services  . . . . . . . . 11--16
                  Alex de Joode   Effective corporate security and
                                  cybercrime . . . . . . . . . . . . . . . 16--18
                 Graeme Creasey   Protecting the datacentre  . . . . . . . 18--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 10, October, 2011

                      Anonymous   Web security under threat  . . . . . . . 1--2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThe Book of Ruby,
                                  Huw Collingbourne. No Starch Press. ISBN
                                  978-1-59327-294-4  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleSecurity Risk
                                  Management, Evan Wheeler. Syngress. ISBN
                                  978-1-59749-615-5  . . . . . . . . . . . 4--4
                     Steve Gold   Android insecurity . . . . . . . . . . . 5--7
             Aditya K. Sood and   
              Richard J. Enbody   Frametrapping the framebusting defence   8--12
                   James Harris   Defending the network several times over 12--14
                Rohan Nanda and   
             P. Venkata Krishna   Mitigating denial of service attacks in
                                  hierarchical wireless sensor networks    14--18
            Richard Morrell and   
            Akash Chandrashekar   Cloud computing: new challenges and
                                  opportunities  . . . . . . . . . . . . . 18--19
                      Anonymous   Social networking in the workplace . . . 20--20
                      Anonymous   Lurid launches attack on Russia  . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 11, November, 2011

                      Anonymous   Governments warn of cyber-security . . . 1--2
                      Anonymous   Certificate ecosystem suffers further
                                  blows  . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   Nitro attack targets chemical firms  . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleCompTIA Security
                                  + Deluxe Study Guide, by Emmett Dulaney.
                                  Second edition. Sybex ISBN
                                  978-1-118-01474-5  . . . . . . . . . . . 4--4
                   Frank Andrus   Beyond scan and block: an adaptive
                                  approach to network access control . . . 5--9
                 Gordon Thomson   APTs: a poorly understood challenge  . . 9--11
                    Klaus Gheri   The benefits of application detection    12--14
                     Steve Gold   Cracking wireless networks . . . . . . . 14--18
                   Stuart Facey   Who's in control: a six-step strategy
                                  for secure IT  . . . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2011, Number 12, December, 2011

                      Anonymous   DDoS used to disrupt elections . . . . . 1--2
                      Anonymous   Security message fails to get through    2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitlePenetration
                                  Tester's Open Source Toolkit, by Jeremy
                                  Faircloth. Third edition. Syngress. ISBN
                                  978-1-59749-627-8  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleThe Basics of
                                  Hacking and Penetration Testing, by
                                  Patrick Engebretson. Syngress. ISBN
                                  978-1-59749-655-1  . . . . . . . . . . . 4--4
         Steve Mansfield-Devine   DDoS: threats and mitigation . . . . . . 5--12
  Jérémy D'Hoinne   Could `wait and see' be the best IPv6
                                  strategy?  . . . . . . . . . . . . . . . 12--14
                     Steve Gold   Understanding the hacker psyche  . . . . 15--17
                Florian Malecki   A deeper, broader look at network
                                  security . . . . . . . . . . . . . . . . 18--19
                      Anonymous   Big boost in cyber-security spending . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2012, Number 1, January, 2012

                      Anonymous   Hackers attack security organisations    1--2
                      Anonymous   Hackers warring in Middle East . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleA Bug Hunter's
                                  Diary, by Tobias Klein. No Starch Press.
                                  ISBN 978-1-59327-385-9 . . . . . . . . . 4--4
                   David Harley   AMTSO: the test of time? . . . . . . . . 5--10
                 Simon Woodhead   Monitoring bad traffic with darknets . . 10--14
                     Jaime Ryan   Rethinking the ESB: building a secure
                                  bus with an SOA gateway  . . . . . . . . 14--17
           Shadi R. Masadeh and   
                Nedal Turab and   
                  Farhan Obisat   A secure model for building e-learning
                                  systems  . . . . . . . . . . . . . . . . 17--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 2, February, 2012

                      Anonymous   Hacktivists hit out at Symantec, police
                                  and anti-piracy groups . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThe Web
                                  Application Hacker's Handbook, 2nd
                                  Edition. Dafydd Stuttard and Marcus
                                  Pinto. Wiley. ISBN 978-1-118-02647-2 . . 4--4
                 Gordon Thomson   BYOD: enabling the chaos . . . . . . . . 5--8
                    Melvyn Wray   From server consolidation to network
                                  consolidation  . . . . . . . . . . . . . 8--11
            Luca Caviglione and   
                  Alessio Merlo   The energy impact of security mechanisms
                                  in modern mobile devices . . . . . . . . 11--14
                David Schneider   The state of network security  . . . . . 14--20
                      Anonymous   Tough times for SSL  . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 3, March, 2012

                      Anonymous   Anonymous --- arrests, leaks and
                                  infections . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThor's Microsoft
                                  Security Bible, by Timothy `Thor'
                                  Mullen. Syngress. ISBN 978-1-59749-572-1 4--4
                      Anonymous   Book Review: \booktitleLow Tech Hacking:
                                  Street Smarts for Security
                                  Professionals, by Jack Wiles, Terry
                                  Gudaitis, Jennifer Jabbusch, Russ
                                  Rogers, and Sean Lowther. Syngress. ISBN
                                  978-1-59749-665-0  . . . . . . . . . . . 4--4
                   Simon Denman   Why multi-layered security is still the
                                  best defence . . . . . . . . . . . . . . 5--7
                    Ross Brewer   Protecting critical control systems  . . 7--10
                    Jason Rouse   Mobile devices --- the most hostile
                                  environment for security?  . . . . . . . 11--13
                     Steve Gold   Securing VoIP  . . . . . . . . . . . . . 14--17
                   Mike Dowling   Enabling remote working: protecting the
                                  network  . . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 4, April, 2012

                      Anonymous   Mac gets first serious malware . . . . . 1--2
                      Anonymous   Cybercrime a growing threat to financial
                                  services . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   The Tangled Web  . . . . . . . . . . . . 4--4
                      Anonymous   Cyber Warfare  . . . . . . . . . . . . . 4--4
           Michael de Crespigny   Building cyber-resilience to tackle
                                  threats  . . . . . . . . . . . . . . . . 5--8
                  Colin Tankard   Taking the management pain out of Active
                                  Directory  . . . . . . . . . . . . . . . 8--11
                Brian Robertson   Security: virtualisation's last frontier 12--15
                Bernard Everett   The encryption conundrum . . . . . . . . 15--18
                Christy Serrato   Identity assurance and network security  19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 5, May, 2012

                      Anonymous   Trustworthy Internet Movement aims to
                                  solve SSL issues . . . . . . . . . . . . 1--2
                      Anonymous   Android's popularity makes it a prime
                                  target . . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThe Basics of
                                  Digital Forensics, by John Sammons.
                                  Syngress. ISBN 978-1-59749-661-2 . . . . 4--4
                      Anonymous   Book Review: \booktitleThe Basics of
                                  Digital Forensics, by John Sammons.
                                  Syngress. ISBN 978-1-59749-661-2 . . . . 4--4
                   Andrew Mason   Caught in the cross-site scripting fire  5--9
                     Steve Gold   Wireless cracking: there's an app for
                                  that . . . . . . . . . . . . . . . . . . 10--14
                Rushdi Hamamreh   Routing path authentication in
                                  link-state routing protocols . . . . . . 14--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 6, June, 2012

                      Anonymous   Flame creates heated debate  . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitleWindows Forensic
                                  Analysis Toolkit, by Harlan Carvey.
                                  Third edition. Syngress. ISBN
                                  978-1-59749-727-5. Price: \$69.95, 272
                                  pgs, paperback}  . . . . . . . . . . . . 4--4
                     Greg Jones   Mobile menace: why SDR poses such a
                                  threat . . . . . . . . . . . . . . . . . 5--7
                    Paul Kenyon   What Australia can teach the world about
                                  least privilege  . . . . . . . . . . . . 7--10
                     Kurt Bager   Remote access: don't be a victim . . . . 11--14
                Tracey Caldwell   Locking down the VPN . . . . . . . . . . 14--18
                      Ori Eisen   Catching the fraudulent
                                  Man-in-the-Middle  . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 7, July, 2012

                      Anonymous   Android malware growth and possible
                                  botnet . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Big increase in critical infrastructure
                                  attacks  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitlePrivacy and Big
                                  Data: the players, regulators and
                                  stakeholders, by Terence Craig and Mary
                                  E. Ludloff. O'Reilly. ISBN
                                  978-1-4493-0500-0  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitlePrivacy and Big
                                  Data: the players, regulators and
                                  stakeholders, by Terence Craig, and Mary
                                  E. Ludloff. O'Reilly. ISBN
                                  978-1-4493-0500-0  . . . . . . . . . . . 4--4
                  Colin Tankard   Big data security  . . . . . . . . . . . 5--8
                     Mike Potts   The state of information security  . . . 9--11
         Steve Mansfield-Devine   Estonia: what doesn't kill you makes you
                                  stronger . . . . . . . . . . . . . . . . 12--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 8, August, 2012

                      Anonymous   Black Hat highlights . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitlePlanning for
                                  IPv6, by Silvia Hagen. O'Reilly. ISBN
                                  978-1-4493-0538-3 (e-book),
                                  978-1-4493-0539-0 (print)  . . . . . . . 4--4
                           SM-D   Book Review: \booktitlePlanning for
                                  IPv6, by Silvia Hagen. O'Reilly. ISBN
                                  978-1-4493-0538-3 (e-book),
                                  978-1-4493-0539-0 (print)  . . . . . . . 4--4
                   James Conrad   Seeking help: the important role of
                                  ethical hackers  . . . . . . . . . . . . 5--8
                Tracey Caldwell   The perimeter is dead --- what next for
                                  the appliance? . . . . . . . . . . . . . 8--12
                 Danny Bradbury   Fighting botnets with sinkholes  . . . . 12--15
                     Steve Gold   Cellular jamming . . . . . . . . . . . . 15--18
                Florian Malecki   Simple ways to dodge the DDoS bullet . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 9, September, 2012

                      Anonymous   Anonymous hacks FBI laptop. Or maybe not 1--2
                      Anonymous   Middle East oil firms hit by massive
                                  attacks  . . . . . . . . . . . . . . . . 2, 19
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitleSecuring Cloud
                                  Services: a pragmatic, approach to
                                  security architecture in, the cloud, by
                                  Lee Newcombe. Published by IT Governance
                                  Publishing. ISBN 978-1-84928-398-4 . . . 4--4
         Steve Mansfield-Devine   Paranoid Android: just how insecure is
                                  the most popular mobile platform?  . . . 5--10
                  Colin Tankard   The promise of managed security services 10--15
                Tracey Caldwell   Seek and destroy . . . . . . . . . . . . 15--19
                      Anonymous   Another major Java panic . . . . . . . . 19--20
                      Anonymous   New research institute to study threats  20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 10, October, 2012

                      Anonymous   Avoid Chinese equipment firms, says
                                  Congress . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Mobile exploits increase . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleOnce More Unto
                                  the Breach, by Andrea C Simmons. IT
                                  Governance Publishing. ISBN
                                  978-1-84928-390-8  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitlePCI Compliance,
                                  Branden R. Williams and Anton Chuvakin.
                                  Third edition. Syngress. ISBN
                                  978-1-59749-948-4  . . . . . . . . . . . 4--4
         Steve Mansfield-Devine   Android architecture: attacking the weak
                                  points . . . . . . . . . . . . . . . . . 5--12
                 Michael Jordon   Cleaning up dirty disks in the cloud . . 12--15
                 Danny Bradbury   Spreading fear on Facebook . . . . . . . 15--17
  Madeleine A. Bihina Bella and   
             J. H. P. Eloff and   
              Martin S. Olivier   Improving system availability with
                                  near-miss analysis . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 11, November, 2012

                      Anonymous   Georgia hacks hacker, allegedly  . . . . 1--2
                      Anonymous   Latest Android problems and fixes  . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleRegular
                                  Expressions Cookbook, Jan Goyvaerts and
                                  Steven Levithan, Second edition,
                                  O'Reilly, ISBN 978-1-4493-1943-4 . . . . 4--4
                      Anonymous   Book Review: \booktitleHacking Web Apps,
                                  Mike Shema. Syngress. ISBN
                                  978-1-59749-951-4  . . . . . . . . . . . 4--4
                  Colin Tankard   Cultural issues in security and privacy  5--8
                  Dirk Paessler   Monitoring private clouds  . . . . . . . 8--12
         Steve Mansfield-Devine   Android malware and mitigations  . . . . 12--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2012, Number 12, December, 2012

                      Anonymous   A look back at 2012  . . . . . . . . . . 1--2
                      Anonymous   How good is anti-virus?  . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitlePractical Malware
                                  Analysis, by Michael Sikorski and Andrew
                                  Honig. No Starch Press. ISBN
                                  978-1-59327-290-6  . . . . . . . . . . . 4--4
                           SM-D   Book Review: \booktitleEncyclopedia of
                                  Electronic Components, Volume 1, Charles
                                  Platt. Make/O'Reilly, ISBN
                                  978-1-4493-3389-8  . . . . . . . . . . . 4--4
                    Bill Morrow   BYOD security challenges: control and
                                  protect your most sensitive data . . . . 5--8
             Aditya K. Sood and   
                Peter Greko and   
              Richard J. Enbody   Abusing Glype proxies: attacks, exploits
                                  and defences . . . . . . . . . . . . . . 8--15
                     Steve Gold   Virtual jihad: how real is the threat?   15--18
                Florian Malecki   Next-generation firewalls: security with
                                  performance  . . . . . . . . . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2013, Number 1, January, 2013

                      Anonymous   CA error results in certificate blunder  1--2
                      Anonymous   US banks attacked --- but by whom? . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitleCUDA Programming,
                                  Shane Cook. Morgan Kaufmann. ISBN
                                  978-0-12-415933-4  . . . . . . . . . . . 4--4
                           SM-D   Book Review: \booktitleThink Like a
                                  Programmer, V Anton Spraul. No Starch
                                  Press. ISBN 978-1-59327-424-5  . . . . . 4--4
                 Danny Bradbury   Verifying software security --- is it
                                  possible?  . . . . . . . . . . . . . . . 5--7
              Thorsten Kurpjuhn   The evolving role of the UTM appliance   8--11
                     Jason Hart   Why the traditional approach to
                                  information security is no longer
                                  working  . . . . . . . . . . . . . . . . 12--14
           Wasim Ahmad Bhat and   
                S. M. K. Quadri   Understanding and mitigating security
                                  issues in Sun NFS  . . . . . . . . . . . 15--18
            Andrew Walker-Brown   Managing VPNs in the mobile worker's
                                  world  . . . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 2, February, 2013

                      Anonymous   Bit9 bitten by hackers . . . . . . . . . 1--2
                      Anonymous   Microsoft and Symantec cripple botnet    2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleLogging and Log
                                  Management, Anton Chuvakin, Kevin
                                  Schmidt and Christopher Phillips.
                                  Syngress. ISBN 978-1-59749-635-3 . . . . 4--4
                      Anonymous   Book Review: \booktitleCISSP Study
                                  Guide, Eric Conrad, Seth Misenar and
                                  Joshua Feldman. Syngress. ISBN
                                  978-1-59749-961-3  . . . . . . . . . . . 4--4
                     Greg Jones   Penetrating the cloud  . . . . . . . . . 5--7
                     Mark Hirst   Securing your telemetry: making DCIM
                                  unsniffable  . . . . . . . . . . . . . . 8--9
               Marc Meulensteen   A smart grid must also be streetwise . . 10--12
                       Jane Goh   Moving security testing into the
                                  developer's domain . . . . . . . . . . . 13--15
                     Steve Gold   Electronic countersurveillance
                                  strategies . . . . . . . . . . . . . . . 15--18
                      Don Smith   Life's certainties: death, taxes and
                                  APTs . . . . . . . . . . . . . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 3, March, 2013

                      Anonymous   Facebook, Apple and Microsoft hit by
                                  Java exploit at watering hole  . . . . . 1--2
                      Anonymous   US report points finger at China's
                                  military cyberwar unit . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleWindows
                                  PowerShell 3.0 Step by Step, by Ed
                                  Wilson. Microsoft Press. ISBN
                                  978-0-7356-6339-8 (print),
                                  978-0-7356-6337-4 (ebook)  . . . . . . . 4--4
                       Dan Pitt   Trust in the cloud: the role of SDN  . . 5--6
               Corey Nachreiner   Beat security auditors at their own game 7--11
                  Robert Winter   SSD vs HDD --- data recovery and
                                  destruction  . . . . . . . . . . . . . . 12--14
                  Peter Bassill   The holistic approach to security  . . . 14--17
                   Shannon Fehr   Flexible networks for better security    17--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 4, April, 2013

                      Anonymous   Spamhaus DDoS attack fails to take down
                                  Internet . . . . . . . . . . . . . . . . 1--2
                      Anonymous   US bans Chinese technology . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleInstant
                                  Penetration Testing: Setting Up a Test
                                  Lab How-to, by Vyacheslav Fadyushin.
                                  Packt Publishing. ISBN 1-84969-412-5 . . 4--4
                Richard Walters   Bringing IT out of the shadows . . . . . 5--11
                Brian Tokuyoshi   The security implications of BYOD  . . . 12--13
                Tracey Caldwell   Identity --- the new perimeter . . . . . 14--18
                   Gary Newbold   Secure mobility in healthcare networks
                                  for optimal patient care . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 5, May, 2013

                      Anonymous   US blames China for hacking, again . . . 1--2
                      Anonymous   US takes down Syrian domains . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleTallinn Manual on
                                  the International Law Applicable to
                                  Cyber Warfare, edited by Michael
                                  Schmitt. Cambridge University Press.
                                  ISBN 978-1-107-61377-5 (paperback),
                                  978-1-107-02443-4 (hardback) . . . . . . 4--4
                Steve McGregory   Preparing for the next DDoS attack . . . 5--6
                Tracey Caldwell   Security at the data level . . . . . . . 6--12
                   Jane Grafton   Avoiding the five pitfalls of privileged
                                  accounts . . . . . . . . . . . . . . . . 12--14
                     Steve Gold   Black Hat Europe: mobile attack vectors
                                  in the spotlight . . . . . . . . . . . . 14--18
                     Mark Hirst   Rack security and protection . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 6, June, 2013

                      Anonymous   PandaLabs says the fight against
                                  cybercrime is being won  . . . . . . . . 1--2
                      Anonymous   McAfee says it's business as usual . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleViolent Python,
                                  by T. J. O'Connor. Syngress. ISBN
                                  978-1-59749-957-6  . . . . . . . . . . . 4--4
                   Keith Barker   The security implications of IPv6  . . . 5--9
                     Steve Gold   Getting lost on the Internet: the
                                  problem with anonymity . . . . . . . . . 10--13
                     Tim Brooks   Classic enterprise IT: the castle
                                  approach . . . . . . . . . . . . . . . . 14--16
         Steve Mansfield-Devine   Q&A: Colin Tankard --- raising security
                                  awareness  . . . . . . . . . . . . . . . 16--19
                      Anonymous   US warns of increased cyber-attacks by
                                  Iran . . . . . . . . . . . . . . . . . . 19--20
                      Anonymous   Journalists threatened with data
                                  protection laws after using exposed
                                  information  . . . . . . . . . . . . . . 20--20
                      Anonymous   NATO under attack  . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 7, July, 2013

                      Anonymous   Web is still the weakest point . . . . . 1--2
                      Anonymous   Crypto flaw found in Android . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleHacking Web Apps,
                                  by Mike Shema. Syngress. ISBN
                                  978-1-59749-951-4  . . . . . . . . . . . 4--4
                       Tim Ring   IT's megatrends: the security impact . . 5--8
                 Danny Bradbury   Offensive defence  . . . . . . . . . . . 9--12
                 Patrick Scully   Under lock and key: protecting the
                                  network from attack  . . . . . . . . . . 12--15
                    Norman Begg   Securely sharing access to sensitive
                                  data . . . . . . . . . . . . . . . . . . 15--18
             Patrick Kerpan and   
                   Sam Mitchell   Bringing control to the business
                                  application layer  . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 8, August, 2013

                      Anonymous   TOR attacked --- possibly by the NSA . . 1--2
                      Anonymous   Mobile insecurities multiply . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThe Basics of Web
                                  Hacking, by Josh Pauli. Syngress. ISBN
                                  978-0-12-416600-4  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleThe Basics of Web
                                  Hacking, by Josh Pauli. Syngress. ISBN
                                  978-0-12-416600-4  . . . . . . . . . . . 4--4
                  John Thielens   Why APIs are central to a BYOD security
                                  strategy . . . . . . . . . . . . . . . . 5--6
                    Tom Gaffney   Following in the footsteps of Windows:
                                  how Android malware development is
                                  looking very familiar  . . . . . . . . . 7--10
         Steve Mansfield-Devine   Interview: Mick Ebsworth --- a matter of
                                  trust  . . . . . . . . . . . . . . . . . 11--13
                     Steve Gold   Subverting cellular technology:
                                  evolution, not revolution  . . . . . . . 14--19
                      Anonymous   Firms making it easy for attackers, says
                                  KMPG . . . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 9, September, 2013

                      Anonymous   NSA has cracked Internet encryption
                                  protocols  . . . . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Instant OSSEC Host-based Intrusion
                                  Detection  . . . . . . . . . . . . . . . 4--4
                      Anonymous   Simple Steps to Data Encryption  . . . . 4--4
                    Oscar Arean   Disaster recovery in the cloud . . . . . 5--7
                    Tony Kenyon   The role of ADCs within secure
                                  application delivery . . . . . . . . . . 8--12
                    Dan Dunford   Managed file transfer: the next stage
                                  for data in motion?  . . . . . . . . . . 12--15
                Richard Hibbert   Calling time on compliance spreadsheet
                                  overload . . . . . . . . . . . . . . . . 15--17
         Steve Mansfield-Devine   Interview: Jon Callas, Silent Circle . . 17--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 10, October, 2013

                      Anonymous   Silk Road online drug market taken down  1--2
                      Anonymous   Mobile malware tops one million, but
                                  Google says problem exaggerated  . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Introduction to Cyber-Warfare  . . . . . 4--4
                      Anonymous   Applied Cyber-security and the Smart
                                  Grid . . . . . . . . . . . . . . . . . . 4--4
                     Mike Small   From data breach to information
                                  stewardship  . . . . . . . . . . . . . . 5--8
                    Sam Erdheim   Deployment and management with
                                  next-generation firewalls  . . . . . . . 8--12
                 Brian Chappell   Privilege management --- the industry's
                                  best kept secret . . . . . . . . . . . . 12--14
                    Scott Baker   IP-based technology --- the future of
                                  the security industry  . . . . . . . . . 14--17
         Steve Mansfield-Devine   Interview: Seth Hallem, Mobile Helix ---
                                  the right way to mobile security . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 11, November, 2013

                      Anonymous   Women may be the future of infosecurity  1--2
                      Anonymous   Security officers get greater voice in
                                  boardrooms . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Introduction to Computer and Network
                                  Security . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Metasploit Penetration Testing Cookbook
                                  [Book Review: \booktitleMobile Security:
                                  How to Secure, Privatize, and Recover
                                  Your Devices, by Abhinav Singh. Packt
                                  Publishing. ISBN 978-1-84951-742-3]  . . 4--4
                Alistair Macrae   Identifying threats in real time . . . . 5--8
                      John Shaw   Dealing with encryption  . . . . . . . . 8--11
                     Phil Allen   The importance of data protection inside
                                  your enterprise  . . . . . . . . . . . . 12--14
                     EJ Hilbert   Living with cybercrime . . . . . . . . . 15--17
         Steve Mansfield-Devine   Colin Tankard, Digital Pathways:
                                  confusion in the cloud . . . . . . . . . 17--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2013, Number 12, December, 2013

                      Anonymous   Firms failing to cope with targeted
                                  attacks  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   CryptoLocker runs rampant, but drops
                                  ransom price . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleMalware Forensics
                                  Field Guide for Windows Systems, James
                                  Aquilina, Syngress, ISBN
                                  978-1-59749-472-4  . . . . . . . . . . . 4--4
                      Anonymous   Introduction to Information Security . . 4--4
                  Steve Johnson   Bringing IT out of the shadows . . . . . 5--6
                 Shaun Hipgrave   Smarter fraud investigations with big
                                  data analytics . . . . . . . . . . . . . 7--9
               Marc Meulensteen   Critical infrastructure gets streetwise  10--11
         Steve Mansfield-Devine   John Lyons, ICSPA: Resetting the clock
                                  on international co-operation  . . . . . 12--15
                     Steve Gold   Understanding the digital fingerprint    15--18
                   Tim Austwick   Using Oracle Apex securely . . . . . . . 19--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2014, Number 1, January, 2014

                      Anonymous   More NSA revelations: backdoors,
                                  snooping tools and worldwide reactions   1--2, 19--20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Cyber-security . . . . . . . . . . . . . 4--4
                      Anonymous   Investigating Internet Crimes  . . . . . 4--4
                    Steve Watts   Protecting your identity when working
                                  remotely . . . . . . . . . . . . . . . . 5--7
                 Barry Shteiman   Why CMS platforms are breeding security
                                  vulnerabilities  . . . . . . . . . . . . 7--9
                 Mike Patterson   An index for network threat detection    9--11
         Steve Mansfield-Devine   Interview: Corey Nachreiner, WatchGuard
                                  --- security visibility  . . . . . . . . 11--15
                 Richard Moulds   The global data protection conundrum . . 16--17
             Conrad Constantine   Big data: an information security
                                  context  . . . . . . . . . . . . . . . . 18--19
                      Anonymous   Yahoo ads spread malware . . . . . . . . 20--20
                      Anonymous   CryptoLocker success leads to more
                                  malware  . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 2, February, 2014

                      Anonymous   Encryption on the rise, but not enough   1--2
                      Anonymous   DDoS attacks on the rise --- by
                                  criminals and spies  . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Mobile Security: How to secure,
                                  privatize and recover your devices . . . 4--4
                      Anonymous   Computer Incident Response and Forensics
                                  Team Management  . . . . . . . . . . . . 4--4
                   Mark Kedgley   File integrity monitoring in the modern
                                  threat landscape . . . . . . . . . . . . 5--8
                     Peter Heim   The quest for clarity on data protection
                                  and security . . . . . . . . . . . . . . 8--10
                  Stephen Allen   Medical device software under the
                                  microscope . . . . . . . . . . . . . . . 11--12
                  Hongwen Zhang   A vision for cloud security  . . . . . . 12--15
                     Steve Gold   In search of a new perimeter . . . . . . 15--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 3, March, 2014

                      Anonymous   Threats increase on mobile platforms ---
                                  especially Android --- as popularity
                                  grows  . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Nearly all web and mobile applications
                                  have flaws . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleProfessional
                                  Penetration Testing, Second Edition.
                                  Thomas Wilhelm. Syngress. ISBN
                                  978-1-59749-993-4  . . . . . . . . . . . 4--4
                Tracey Caldwell   Call the digital fire brigade  . . . . . 5--8
                     Pat Barnes   Using DNS to protect networks from
                                  threats within . . . . . . . . . . . . . 9--11
      Daniëlle van Leeuwen   Bring your own software  . . . . . . . . 12--13
                 Danny Bradbury   Can we make email secure?  . . . . . . . 13--16
                Florian Malecki   The cost of network-based attacks  . . . 17--18
                 Mike Keightley   The looming XP disaster in industrial
                                  environments . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 4, April, 2014

                      Anonymous   `Heartbleed' flaw leaves millions of
                                  websites, email servers and other
                                  services vulnerable to attack  . . . . . 1--2
                      Anonymous   Windows XP now more vulnerable than ever
                                  as Microsoft support ends  . . . . . . . 2--2
                      Anonymous   In Brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Cybersecurity and Cyberwar . . . . . . . 4--4
                    Ross Brewer   Advanced persistent threats: minimising
                                  the damage . . . . . . . . . . . . . . . 5--9
                Harry Sverdlove   The Java vulnerability landscape . . . . 9--14
                 Danny Bradbury   Unveiling the dark web . . . . . . . . . 14--17
                     Keith Bird   Sandboxing: a line in the sand against
                                  malware  . . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 5, May, 2014

                      Anonymous   Heartbleed bug leads to forking and
                                  funding  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   High-profile breaches failing to make
                                  financial firms tighten their security   2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Digital Forensics Processing and
                                  Procedures . . . . . . . . . . . . . . . 4--4
                  Martin Maisey   Moving to analysis-led cyber-security    5--12
                   Mark Southam   DNSSEC: What it is and why it matters    12--15
                       Jon Inns   The evolution and application of SIEM
                                  systems  . . . . . . . . . . . . . . . . 16--17
                 Sonia Blizzard   Don't feed the hackers: how your
                                  attitude to data security could affect
                                  business . . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 6, June, 2014

                      Anonymous   TrueCrypt project cancelled by its
                                  developers . . . . . . . . . . . . . . . 1--2
                      Anonymous   Cyber tensions with China heat up after
                                  US indicts members of the PLA  . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Targeted Cyber-attacks . . . . . . . . . 4--4
                     CJ Radford   Challenges and solutions protecting data
                                  within Amazon Web Services . . . . . . . 5--8
                 Danny Bradbury   Testing the defences of bulletproof
                                  hosting companies  . . . . . . . . . . . 8--12
                     Steve Gold   Challenges ahead on the digital
                                  forensics and audit trails . . . . . . . 12--17
                 Chris Marrison   DNS as an attack vector --- and how
                                  businesses can keep it secure  . . . . . 17--20
                      Anonymous   Gartner warns of big data security
                                  problems . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 7, July, 2014

                      Anonymous   Western energy firms come under
                                  concerted and successful cyber-attack    1--2
                      Anonymous   One in five firms hit by APTs  . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Penetration Testing  . . . . . . . . . . 4--4
              Jean-Yves Bisiaux   DNS threats and mitigation strategies    5--9
                   Allen Storey   There's nothing `smart' about insecure
                                  connected devices  . . . . . . . . . . . 9--12
                Patrick Bedwell   Finding a new approach to SIEM to suit
                                  the SME environment  . . . . . . . . . . 12--16
         Steve Mansfield-Devine   Building in security . . . . . . . . . . 16--19
                      Anonymous   Cybercrime and espionage are a threat to
                                  Internet itself  . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 8, August, 2014

                      Anonymous   Russian gang amasses biggest-ever haul
                                  of stolen credentials, claims security
                                  firm . . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Lack of security in Internet of Things
                                  devices  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Kali Linux --- Assuring Security by
                                  Penetration Testing  . . . . . . . . . . 4--4
                    Phil Bridge   EU puts pressure on businesses to erase
                                  data . . . . . . . . . . . . . . . . . . 5--8
                    Andrew Tang   A guide to penetration testing . . . . . 8--11
                      Mark Lowe   Defending against cyber-criminals
                                  targeting business websites  . . . . . . 11--13
         Steve Mansfield-Devine   Not coping with change . . . . . . . . . 14--17
                    Steve Watts   Intelligent combination --- the benefits
                                  of tokenless two-factor authentication   17--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 9, September, 2014

                      Anonymous   NATO adopts new policy calling for
                                  collective defence against cyber-attacks 1--2
                      Anonymous   `One-day wonder' websites used to launch
                                  attacks  . . . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitlePython Forensics,
                                  Chet Hosmer, Syngress. ISBN
                                  978-0-12-418676-7 (print),
                                  978-0-12-418683-5 (e-book) . . . . . . . 4--4
                      Anonymous   The Basics of Information Security . . . 4--4
                 Simon Saunders   Protecting against espionage . . . . . . 5--7
                   Phil Beckett   BYOD --- popular and problematic . . . . 7--9
                  Julie Lockner   Do you know where your sensitive data is
                                  kept?  . . . . . . . . . . . . . . . . . 10--12
         Steve Mansfield-Devine   Hacking on an industrial scale . . . . . 12--16
                     Oded Gonda   Understanding the threat to SCADA
                                  networks . . . . . . . . . . . . . . . . 17--18
                 Lasse Andresen   Open sourcing the future of IAM  . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 10, October, 2014

                      Anonymous   Shellshock bug has security experts in a
                                  panic and hackers searching for exploits 1--2
                      Anonymous   Spam creates major disruption  . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   The Practice of Network Security
                                  Monitoring . . . . . . . . . . . . . . . 4--4
                    Jody Brazil   Security metrics to manage change  . . . 5--7
        Alexandra Boldyreva and   
                    Paul Grubbs   Making encryption work in the cloud  . . 8--10
                 Danny Bradbury   Anonymity and privacy: a guide for the
                                  perplexed  . . . . . . . . . . . . . . . 10--14
                   Paul Martini   A secure approach to wearable technology 15--17
         Steve Mansfield-Devine   Masking sensitive data . . . . . . . . . 17--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 11, November, 2014

                      Anonymous   Insider threat becoming more
                                  significant, says Kaspersky  . . . . . . 1--2
                      Anonymous   Four-fold increase in DDoS attacks . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Windows Forensic Analysis Toolkit  . . . 4--4
                      Anonymous   Social Engineering Penetration Testing   4--4
                      Ken Munro   Android scraping: accessing personal
                                  data on mobile devices . . . . . . . . . 5--9
                Mark Taylor and   
              John Haggerty and   
               David Gresty and   
               Peter Almond and   
                      Tom Berry   Forensic investigation of social
                                  networking applications  . . . . . . . . 9--16
         Steve Mansfield-Devine   Mobile security: it's all about
                                  behaviour  . . . . . . . . . . . . . . . 16--20
                      Anonymous   Russian Government likely behind APTs,
                                  says FireEye . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2014, Number 12, December, 2014

                      Anonymous   Sony suffers major data breach as
                                  attackers leak files and destroy hard
                                  drives . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Is Regin the son of Stuxnet? . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Hacking and Penetration Testing with Low
                                  Power Devices  . . . . . . . . . . . . . 4--4
                  David Tipping   The rising threats from Voice over IP    5--6
             Gursev Singh Kalra   Threat analysis of an enterprise
                                  messaging system . . . . . . . . . . . . 7--13
               Robert Jones and   
                  Tony Dearsley   Time for a data detox  . . . . . . . . . 13--15
                   Joe Goldberg   Tackling unknown threats . . . . . . . . 16--17
                    Ashley Lane   Cross domain solutions --- and why they
                                  matter . . . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2015, Number 1, January, 2015

                      Anonymous   Doubts remain over whether North Korea
                                  was responsible for massive hack of Sony
                                  Pictures . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Tor under attack, again  . . . . . . . . 2--2
                      Anonymous   Steve Gold --- 1956--2015  . . . . . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitlePenetration
                                  Testing with the Bash Shell, by Keith
                                  Makan. Packt Publishing. ISBN
                                  978-1-84969-510-7  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleLearning PHP,
                                  MySQL, JavaScript, CSS & HTML5, by Robin
                                  Nixon. Third Edition. O'Reilly. ISBN
                                  978-1-4919-4946-7  . . . . . . . . . . . 4--4
                    Ben Densham   Three cyber-security strategies to
                                  mitigate the impact of a data breach . . 5--8
                   Ashish Patel   Network performance without compromising
                                  security . . . . . . . . . . . . . . . . 9--12
             Guillermo Lafuente   The big data security challenge  . . . . 12--14
         Steve Mansfield-Devine   Managing identity for a competitive edge 14--18
                  Hongwen Zhang   Bring your own encryption: balancing
                                  security with practicality . . . . . . . 18--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 2, February, 2015

                      Anonymous   European organisations are still not
                                  ready for forthcoming data protection
                                  rules  . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Linux hit by another long-term flaw  . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book review\booktitleKali Linux Network
                                  Scanning Cookbook, by Justin Hutchens.
                                  Packt Publishing. ISBN 978-1-78398-214-1 4--4
         Steve Mansfield-Devine   The privacy dilemma  . . . . . . . . . . 5--10
                   Poul Nielsen   The importance of context in keeping end
                                  users secure . . . . . . . . . . . . . . 10--13
                     John Green   Staying ahead of cyber-attacks . . . . . 13--16
                  Gavin Millard   Continuous monitoring for transient
                                  devices  . . . . . . . . . . . . . . . . 16--18
                   Phil Beckett   An intelligent approach to security  . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 3, March, 2015

                      Anonymous   More Snowden leaks reveal hacking by NSA
                                  and GCHQ against communications firm . . 1--2
                      Anonymous   NSA also targets hard drives . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleIndustrial
                                  Network Security, by Eric Knapp and Joel
                                  Langill. Syngress. ISBN
                                  978-0-12-420114-9  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleGoogle Earth
                                  Forensics, by Michael Harrington and
                                  Michael Cross. Syngress. ISBN
                                  978-0-12-800216-2  . . . . . . . . . . . 4--4
                  Colin Tankard   How secure is your building? . . . . . . 5--8
                      Sol Cates   The evolution of security intelligence   8--10
                   Cath Everett   Should the dark net be taken out?  . . . 10--13
                    Guy Buesnel   Threats to satellite navigation systems  14--18
                      Gary Newe   Delivering the Internet of Things  . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 4, April, 2015

                      Anonymous   Mobile vulnerabilities are opening the
                                  door to cyber-attacks on corporates  . . 1--2
                      Anonymous   British Airways among latest breaches    2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleBlack Hat Python,
                                  Justin Seitz. No Starch Press. ISBN
                                  978-1-59327-590-7  . . . . . . . . . . . 4--4
                     Peter Clay   A modern threat response framework . . . 5--10
                   Mark Kedgley   If you can't stop the breach, at least
                                  spot the breach  . . . . . . . . . . . . 11--12
                      Mike Auty   Anatomy of an advanced persistent threat 13--16
      François Amigorena   Relevance is the key to users' security
                                  understanding  . . . . . . . . . . . . . 17--18
                   Phil Beckett   Getting your back-up data back up to
                                  date . . . . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 5, May, 2015

                      Anonymous   Mobile malware goes straight for the
                                  money, says Kaspersky  . . . . . . . . . 1--2
                      Anonymous   DDoS attacks grow  . . . . . . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleBuilding an
                                  Information Security Awareness Program,
                                  Bill Gardner and Valerie Thomas.
                                  Syngress. ISBN 978-0-12-419967-5 . . . . 4--4
                      Anonymous   Book Review: \booktitleThe GNU Make
                                  Book, John Graham-Cumming. No Starch
                                  Press. ISBN 978-1-59327-649-2  . . . . . 4--4
                    Ross Brewer   Cyber threats: reducing the time to
                                  detection and response . . . . . . . . . 5--8
                  Colin Tankard   Data classification --- the foundation
                                  of information security  . . . . . . . . 8--11
                Tracey Caldwell   Hacktivism goes hardcore . . . . . . . . 12--17
                    Paul German   The dangers of unsecured voice . . . . . 18--19
                      Anonymous   IoT multiplies risk of attack  . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 6, June, 2015

                      Anonymous   Darknet less secure than many think, say
                                  researchers  . . . . . . . . . . . . . . 1--2
                      Anonymous   Logjam is latest long-term flaw  . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleAndroid Security
                                  Internals, Nikolay Elenkov. No Starch
                                  Press. ISBN 978-1-59327-581-5  . . . . . 4--4
                       Tim Ring   Keeping tabs on tracking technology  . . 5--8
                  Stuart Hooson   Smarten your data security before new EU
                                  legislation or risk corporate loss . . . 8--10
                 Szilard Stange   Detecting malware across operating
                                  systems  . . . . . . . . . . . . . . . . 11--14
                 David Hald and   
                    Alex Udakis   Rethinking remote authentication: time
                                  to kiss tokens goodbye?  . . . . . . . . 15--17
                    Boris Huard   The data quality paradox . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 7, July, 2015

                      Anonymous   Surveillance software firm Hacking Team
                                  is hacked  . . . . . . . . . . . . . . . 1--2
                      Anonymous   Europol sets sights on IS  . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThe Mobile
                                  Application Hacker's Handbook, by
                                  Dominic Chell, Tyrone Erasmus, Shaun
                                  Colley, and Ollie Whitehouse Wiley. ISBN
                                  978-1-118-95850-6  . . . . . . . . . . . 4--4
                 Matt Kingswood   Climate change will require more agile
                                  business continuity planning . . . . . . 5--10
                       Tim Ring   Cloud security fears: fact or FUD? . . . 10--14
                Matthew McKenna   How federal agencies can secure their
                                  cloud migrations . . . . . . . . . . . . 14--16
                Dave Larson and   
                  Stephen Gates   Is it true that what you can't see can't
                                  hurt you?  . . . . . . . . . . . . . . . 17--18
                    Steve Watts   NFC and 2FA: the death of the password?  19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 8, August, 2015

                      Anonymous   Android Stagefright vulnerability
                                  threatens all devices --- and fixing it
                                  isn't that easy  . . . . . . . . . . . . 1--2
                      Anonymous   UK public sector weak on security  . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitleHacking Web
                                  Intelligence, [by Sudhanshu Chauhan and
                                  Nutan Kumar Panda. Syngress. ISBN
                                  978-0-12-801867-5] . . . . . . . . . . . 4--4
                           SM-D   Book Review: \booktitleThe Book of GNS3
                                  [by Jason Neumann. No Starch Press. ISBN
                                  978-1-59327-554-9] . . . . . . . . . . . 4--4
                  Vincent Smyth   Cyber-security fortresses built on
                                  quicksand  . . . . . . . . . . . . . . . 5--8
                  Paul Simmonds   The digital identity issue . . . . . . . 8--13
                  Chris Richter   Managing your data risk: back to basics  13--15
              Ricky Knights and   
                    Emma Morris   Move to intelligence-driven security . . 15--18
                  Darren Anstee   Preparing for tomorrow's threat
                                  landscape  . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 9, September, 2015

                      Anonymous   DDoS attacks on the rise and being used
                                  to mask other, more significant breaches 1--2
                      Anonymous   Malvertising hits dating websites  . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleSecuring SQL
                                  Server, by Denny Cherry. Syngress. ISBN
                                  978-0-12-801275-8  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleDigital Identity
                                  Management, Maryline Laurent and Samia
                                  Bouzefrane. ISTE Press/Elsevier. ISBN
                                  978-1-78548-004-1  . . . . . . . . . . . 4--4
                    Kevin Bocek   Is HTTPS enough to protect governments?  5--8
         Steve Mansfield-Devine   The Ashley Madison affair  . . . . . . . 8--16
                   Richard Kirk   Cars of the future: the Internet of
                                  Things in the automotive industry  . . . 16--18
                Shahaf Rozanski   Using cloud data to accelerate forensic
                                  investigations . . . . . . . . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 10, October, 2015

                      Anonymous   Healthcare organisations struggle to
                                  maintain security  . . . . . . . . . . . 1--2
                      Anonymous   The cost of cybercrime . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleSuccess
                                  Strategies from Women in STEM, Edited by
                                  Peggy A Pritchard and Christine Grant.
                                  Second edition. Academic Press. ISBN
                                  978-0-12-397181-4  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleDoing Math With
                                  Python, Amit Saha. No Starch Press. ISBN
                                  978-1-59327-640-9  . . . . . . . . . . . 4--4
                        Jan Hof   Addressing new demands on network
                                  security . . . . . . . . . . . . . . . . 5--7
                 Chris Marrison   Understanding the threats to DNS and how
                                  to secure it . . . . . . . . . . . . . . 8--10
                Reuven Harrison   Reducing complexity in securing
                                  heterogeneous networks . . . . . . . . . 11--13
         Steve Mansfield-Devine   The growth and evolution of DDoS . . . . 13--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 11, November, 2015

                      Anonymous   UK Government battles tech firms over
                                  encryption . . . . . . . . . . . . . . . 1--2
                      Anonymous   Ransomware defeated but new forms emerge 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleHow Software
                                  Works, by V Anton Spraul. No Starch
                                  Press. ISBN 978-1-59327-666-9  . . . . . 4--4
         Steve Mansfield-Devine   When advertising turns nasty . . . . . . 5--8
                    Paul German   Counting the security cost of cheap
                                  calls  . . . . . . . . . . . . . . . . . 9--11
                       Tim Ring   Connected cars --- the next target for
                                  hackers  . . . . . . . . . . . . . . . . 11--16
                   Phil Beckett   The business risks of using smartphones  16--17
           Bradley Maule-ffinch   Key trends in information security . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2015, Number 12, December, 2015

                      Anonymous   A fifth of UK consumers are victims of
                                  theft via data breaches  . . . . . . . . 1--2
                      Anonymous   Four out of five web apps fail key tests 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleCocoa Programming
                                  for OS X, by Aaron Hillegass, Adam
                                  Preble and Nate Chandler. Fifth edition.
                                  Big Nerd Ranch. ISBN 978-0-13-407695-9   4--4
                      Anonymous   Book Review: \booktitleAndroid
                                  Programming, by Bill Phillips, Chris
                                  Stewart, Brian Hardy & Kristin Marsicano.
                                  Second edition, Big Nerd Ranch. ISBN
                                  978-0-13-417145-6  . . . . . . . . . . . 4--4
                   Richard Kirk   Threat sharing --- a neighbourhood watch
                                  for security practitioners . . . . . . . 5--7
                Tracey Caldwell   Taking agile development beyond software
                                  --- what are the security risks? . . . . 8--11
                     Leon Adato   Network outages --- pick your battles    12--13
         Steve Mansfield-Devine   Under the radar  . . . . . . . . . . . . 14--18
                    Steve Watts   The holy grail of authentication . . . . 18--19
                      Anonymous   Wide range of devices vulnerable to
                                  hacking  . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2016, Number 1, January, 2016

                      Anonymous   Juniper firewalls contain deliberate
                                  weakness that provides back door . . . . 1--2
                      Anonymous   More battles over encryption &
                                  surveillance . . . . . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleHow to Attack and
                                  Defend Your Website, by Henry Dalziel.
                                  Syngress. ISBN 978-0-12-802754-7 . . . . 4--4
                      Anonymous   Book Review: \booktitleSecuring Social
                                  Media in the Enterprise, by Henry
                                  Dalziel. Syngress. ISBN
                                  978-0-12-804180-2  . . . . . . . . . . . 4--4
                Michael Shaulov   Bridging mobile security gaps  . . . . . 5--8
                  Michael Fimin   Breaking bad: avoiding the 10 worst IT
                                  admin habits . . . . . . . . . . . . . . 8--11
                 Fred Touchette   The evolution of malware . . . . . . . . 11--14
              William Wilkinson   Cyber discovery in investigations  . . . 15--17
                 Jason King and   
                      Dan Evans   Key criteria for selecting a secure
                                  cloud wireless net work  . . . . . . . . 17--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 2, February, 2016

                      Anonymous   Impending Investigatory Powers Bill
                                  comes under fire . . . . . . . . . . . . 1--2
                      Anonymous   Firms willing to pay ransoms . . . . . . 2, 20
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleiOS Application
                                  Security, by David Thiel. No Starch
                                  Press. ISBN 978-1-59327-601-0  . . . . . 4--4
                     Ian Muscat   Web vulnerabilities: identifying
                                  patterns and remedies  . . . . . . . . . 5--10
                   Cath Everett   Are passwords finally dying? . . . . . . 10--14
         Steve Mansfield-Devine   Security guarantees: building
                                  credibility for security vendors . . . . 14--18
                 Rajesh Ganesan   Stepping up security with password
                                  management control . . . . . . . . . . . 18--19
                      Anonymous   Energy sector firms face physically
                                  damaging attacks . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 3, March, 2016

                      Anonymous   Ransomware expands, attacks hospitals
                                  and local authorities, and moves to new
                                  platforms  . . . . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitleAutomating Open
                                  Source Intelligence [edited by Robert
                                  Layton and Paul Watters, Syngress. ISBN
                                  978-0-12-802916-9] . . . . . . . . . . . 4--4
                           SM-D   Book Review: \booktitleInfosec
                                  Management Fundamentals, Henry Dalziel
                                  [Syngress. ISBN 978-0-12-804172-7] . . . 4--4
                    Dave Larson   Distributed denial of service attacks
                                  --- holding back the flood . . . . . . . 5--7
                  Garrett Gross   Detecting and destroying botnets . . . . 7--10
             Hamish Haughey and   
         Gregory Epiphaniou and   
           Haider M. Al-Khateeb   Anonymity networks and the fragile cyber
                                  ecosystem  . . . . . . . . . . . . . . . 10--18
                    Paul German   A new month, a new data breach . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 4, April, 2016

                      Anonymous   Hospitals become major target for
                                  ransomware . . . . . . . . . . . . . . . 1--2
                      Anonymous   Car alarm at the FBI . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThe Car Hacker's
                                  Handbook, by Craig Smith. No Starch
                                  Press. ISBN 978-1-59327-703-1  . . . . . 4--4
                      Anonymous   Book Review: \booktitleNext Generation
                                  Red Teaming, by Henry Dalziel. Syngress.
                                  ISBN 978-0-12-804171-0 . . . . . . . . . 4--4
                  Steve Furnell   Vulnerability management: not a patch on
                                  where we should be?  . . . . . . . . . . 5--9
                   Will Harwood   Locking up passwords --- for good  . . . 10--13
         Steve Mansfield-Devine   Your life in your hands: the security
                                  issues with healthcare apps  . . . . . . 14--18
                Shahaf Rozanski   Peering through the cloud  . . . . . . . 19--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 5, May, 2016

                      Anonymous   UK Government says two-thirds of firms
                                  under attack . . . . . . . . . . . . . . 1--2
                      Anonymous   Outside threats are the biggest concern  2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleAutomated
                                  Security Analysis of Android and iOS
                                  Applications with Mobile Security
                                  Framework, by Henry Dalziel and Ajin
                                  Abraham. Syngress. ISBN
                                  978-0-12-805105-4  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleCISSP Study
                                  Guide, by Eric Conrad, Seth Misenar and
                                  Joshua Feldman. Third edition. Syngress.
                                  ISBN 978-0-12-802437-9 . . . . . . . . . 4--4
                     John Grimm   PKI: crumbling under the pressure  . . . 5--7
                Mark Taylor and   
              John Haggerty and   
               David Gresty and   
                 Chris Wren and   
                      Tom Berry   Avoiding the misuse of social media by
                                  employees  . . . . . . . . . . . . . . . 8--11
                 Mike Pittenger   Know your open source code . . . . . . . 11--15
         Steve Mansfield-Devine   Creating security operations centres
                                  that work  . . . . . . . . . . . . . . . 15--18
                    Cricket Liu   Actively boosting network security with
                                  passive DNS  . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 6, June, 2016

                      Anonymous   Millions of user credentials for popular
                                  sites sold on dark markets . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleMobile Data Loss:
                                  Threats and Countermeasures, by Michael
                                  Raggo. Syngress. ISBN 978-0-12-802864-3  4--4
                      Anonymous   Book Review: \booktitleTraffic Anomaly
                                  Detection, by Antonio Cuadra-Sánchez and
                                  Javier Aracil. Iste Press. ISBN
                                  978-1-78548-012-6  . . . . . . . . . . . 4--4
                  Colin Tankard   What the GDPR means for businesses . . . 5--8
                      Mark Hall   Why people are key to cyber-security . . 9--10
         Steve Mansfield-Devine   The battle for privacy . . . . . . . . . 11--15
                   Sameer Dixit   Holding the fort: a business case for
                                  testing security . . . . . . . . . . . . 16--18
                    Paul German   The SIP security fallacy . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 7, July, 2016

                      Anonymous   Authorities losing the battle against
                                  cybercrime, says UK National Crime
                                  Agency . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Police breached thousands of times . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleMalware Diffusion
                                  Models for Modern Complex Networks, by
                                  Vasileios Karyotis and M. H. R.
                                  Khouzani. Morgan Kaufman. ISBN
                                  978-0-12-802714-1  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleEssential Skills
                                  for Hackers, by Kevin Cardwell, Henry
                                  Dalziel. Syngress. ISBN
                                  978-0-12-804755-2  . . . . . . . . . . . 4--4
                 Malcolm Murphy   No place to hide as DNS comes under
                                  attack . . . . . . . . . . . . . . . . . 5--7
                   Michael Hack   The implications of Apple's battle with
                                  the FBI  . . . . . . . . . . . . . . . . 8--10
                       Don Bush   How data breaches lead to fraud  . . . . 11--13
         Steve Mansfield-Devine   Securing small and medium-size
                                  businesses . . . . . . . . . . . . . . . 14--20
                      Anonymous   Events . . . . . . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 8, August, 2016

                      Anonymous   Ransomware menace grows as new threats
                                  emerge . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleBitcoin and
                                  Cryptocurrency Technologies, Arvind
                                  Narayanan, Joseph Bonneau, Edward
                                  Felten, Andrew Miller and Steven
                                  Goldfeder  . . . . . . . . . . . . . . . 4--4
                   Matt Eddolls   Making cybercrime prevention the highest
                                  priority . . . . . . . . . . . . . . . . 5--8
                    Paul German   Face the facts --- your organisation
                                  will be breached . . . . . . . . . . . . 9--10
                   Ben Rafferty   Dangerous skills gap leaves
                                  organisations vulnerable . . . . . . . . 11--13
                   Cath Everett   Should encryption software be banned?    14--17
                  Duncan Hughes   Silent risk: new incarnations of
                                  longstanding threats . . . . . . . . . . 17--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 9, September, 2016

                      Anonymous   US and UK government agencies criticised
                                  over security  . . . . . . . . . . . . . 1--2
                      Anonymous   Two-thirds of firms may break data laws  2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThe Book of R, by
                                  Tilman Davies. No Starch Press. ISBN
                                  978-1-59327-651-5  . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleCyber Guerilla,
                                  by Jelle van Haaster, Rickey Gevers and
                                  Martijn Sprengers. Syngress. ISBN
                                  978-0-12-805197-9  . . . . . . . . . . . 4--4
                    Ross Brewer   Ransomware attacks: detection,
                                  prevention and cure  . . . . . . . . . . 5--9
                   Marc Sollars   Risk-based security: staff can play the
                                  defining role in securing assets . . . . 9--12
                 Adrian Crawley   Hiring hackers . . . . . . . . . . . . . 13--15
                  Phil Burdette   Timeline of an attack  . . . . . . . . . 16--17
                  Hongwen Zhang   How to disinfect and secure the Internet
                                  of Things  . . . . . . . . . . . . . . . 18--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 10, October, 2016

                      Anonymous   US officially accuses Russia of DNC hack
                                  while election systems come under attack 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleData Breach
                                  Preparation and Response, by Kevvie
                                  Fowler. Syngress. ISBN 978-0-12-803451-4 4--4
             Michael Buratowski   The DNC server breach: who did it and
                                  what does it mean? . . . . . . . . . . . 5--7
         Steve Mansfield-Devine   Ransomware: taking businesses hostage    8--17
                      Anonymous   Ransomware: threat and response  . . . . 17--19
                  Colin Tankard   Smart buildings need joined-up security  20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2016, Number 11, November, 2016

                      Anonymous   UK Government launches new \pounds 1.9bn
                                  cyber-security strategy  . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleDNS Security, by
                                  Allan Liska and Geoffrey Stowe.
                                  Syngress. ISBN 978-0-12-803306-7 . . . . 4--4
                    Mike Fenton   Restoring executive confidence: Red Team
                                  operations . . . . . . . . . . . . . . . 5--7
         Steve Mansfield-Devine   DDoS goes mainstream: how
                                  headline-grabbing attacks could make
                                  this threat an organisation's biggest
                                  nightmare  . . . . . . . . . . . . . . . 7--13
             Patrick Snyder and   
                    Alien Vault   Playing hackers at their own game  . . . 14--16
                  David Higgins   Anatomy of an attack: `lights out' in
                                  Ukraine  . . . . . . . . . . . . . . . . 17--19
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20
                   Karen Renaud   No, users are not irrational . . . . . . 20--20

Network Security
Volume 2016, Number 12, December, 2016

                      Anonymous   Major ISPs targeted in Internet of
                                  Things botnet attacks  . . . . . . . . . 1--2
                      Anonymous   Ransomware claims more victims . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleUnderstanding
                                  ECMAScript 6, by Nicholas C Zakas. No
                                  Starch Press. ISBN 978-1-59327-757-4 . . 4--4
                      Anonymous   Book Review: \booktitleWicked Cool Shell
                                  Scripts, by Dave Taylor and Brandon
                                  Perry. Second edition. No Starch Press.
                                  ISBN 978-1-59327-602-7 . . . . . . . . . 4--4
                 Mike Pittenger   Addressing the security challenges of
                                  using containers . . . . . . . . . . . . 5--8
                   Sameer Dixit   Opportunity vs risk with the Internet of
                                  Things . . . . . . . . . . . . . . . . . 8--10
         Steve Mansfield-Devine   Data classification: keeping track of
                                  your most precious asset . . . . . . . . 10--15
                 Mathias Wagner   The hard truth about hardware in
                                  cyber-security: it's more important  . . 16--19
                  Colin Tankard   The danger within  . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2017, Number 1, January, 2017

                      Anonymous   Ransomware becomes most popular form of
                                  attack as payouts approach \$1bn a year  1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleUnderstanding
                                  Social Engineering-Based Scams, edited
                                  by Markus Jakobsson. Springer. ISBN
                                  978-1-4939-6455-0  . . . . . . . . . . . 4--4
                   Jamie Graves   Data flow management: why and how  . . . 5--6
         Steve Mansfield-Devine   Open source software: determining the
                                  real risk posed by vulnerabilities . . . 7--12
                   Michael Wood   How to make SD-WAN secure  . . . . . . . 12--14
                    Paul German   Is your Session Border Controller
                                  providing a false sense of security? . . 14--16
                     Bill Welch   Exploiting the weaknesses of SS7 . . . . 17--19
                   Karen Renaud   Webcam covering phenomenon . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 2, February, 2017

                      Anonymous   Ransomware becomes the most prevalent
                                  form of malware and hits an ever-wider
                                  range of victims . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleUnderstanding the
                                  Digital World, by Brian Kernighan.
                                  Princeton University Press. ISBN
                                  978-0-691-17654-3  . . . . . . . . . . . 4--4
                     Andy Lilly   IMSI catchers: hacking mobile
                                  communications . . . . . . . . . . . . . 5--7
             Jack Bedell-Pearce   When big data and Brexit collide . . . . 8--9
                   Jamie Graves   What is intellectual property and how do
                                  you protect it?  . . . . . . . . . . . . 9--11
                Gert-Jan Schenk   Retailers must focus on the growing
                                  cyberthreat landscape  . . . . . . . . . 12--13
         Steve Mansfield-Devine   A process of defence --- securing
                                  industrial control systems . . . . . . . 14--19
                    Tim Erridge   Optimising risk management . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 3, March, 2017

                      Anonymous   Financial institutions become more
                                  confident about cyber-security but
                                  weaknesses remain  . . . . . . . . . . . 1--2
                      Anonymous   Zero-days last for years . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThe Mathematics
                                  of Secrets, by Joshua Holden. Princeton
                                  University Press. ISBN 978-0-691-14175-6 4--4
                  Colin Tankard   Encryption as the cornerstone of big
                                  data security  . . . . . . . . . . . . . 5--7
                Lewis Henderson   National infrastructure --- the next
                                  step for seasoned hackers  . . . . . . . 8--10
                  Vincent Smyth   Software vulnerability management: how
                                  intelligence helps reduce the risk . . . 10--12
                   Nick Hawkins   Why communication is vital during a
                                  cyber-attack . . . . . . . . . . . . . . 12--14
                       Tim Ring   The Russians are coming! Are security
                                  firms over-hyping the hacker threat? . . 15--18
                     Andy Green   Ransomware and the GDPR  . . . . . . . . 18--19
                  Colin Tankard   The Firewall: The eSignature comes of
                                  age  . . . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 4, April, 2017

                      Anonymous   The Russian connection: new attacks and
                                  arrests  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitleHiding Behind the
                                  Keyboard, by Brett Shavers and John
                                  Bair, Syngress. ISBN 978-0-12-803340-1   4--4
                     Leon Adato   Monitoring and automation: it's easier
                                  than you think . . . . . . . . . . . . . 5--7
         Steve Mansfield-Devine   Fileless attacks: compromising targets
                                  without malware  . . . . . . . . . . . . 7--11
                  Alan Zeichick   Enabling innovation by opening up the
                                  network  . . . . . . . . . . . . . . . . 12--14
               Rohit Talwar and   
                    April Koury   Artificial intelligence --- the next
                                  frontier in IT security? . . . . . . . . 14--17
                   Mark Hickman   The threat from inside . . . . . . . . . 18--19
                   Karen Renaud   Facts do not change minds  . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 5, May, 2017

                      Anonymous   Social engineering scams ensnare Google,
                                  Facebook and their users . . . . . . . . 1--2
                      Anonymous   Firms struggle to manage networks  . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                           SM-D   Book Review: \booktitlePractical Packet
                                  Analysis, Chris Sanders  . . . . . . . . 4--4
                           SM-D   Book Review: \booktitleWe Know All About
                                  You, Rhodri Jeffreys-Jones . . . . . . . 4--4
                    Sean Newman   Service providers: the gatekeepers of
                                  Internet security  . . . . . . . . . . . 5--7
                    Jacob Gajek   Macro malware: dissecting a malicious
                                  Word document  . . . . . . . . . . . . . 8--13
         Steve Mansfield-Devine   Threat hunting: assuming the worst to
                                  strengthen resilience  . . . . . . . . . 13--17
                  Travis Farral   The attribution problem with information
                                  security attacks . . . . . . . . . . . . 17--19
                    Tim Erridge   Gaining strength . . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 6, June, 2017

                      Anonymous   NSA leak shows Russian attack on US
                                  electoral system . . . . . . . . . . . . 1--2
                      Anonymous   Attacks on industry  . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitlePractical
                                  Forensic Imaging, by Bruce Nikkel. No
                                  Starch Press. ISBN 978-1-59327-793-2 . . 4--4
                      Anonymous   Book Review: \booktitleThe Plot to Hack
                                  America, by Malcolm Nance. Skyhorse
                                  Publishing. ISBN 978-1-5107-2332-0 . . . 4--4
                 Daniel Shugrue   Fighting application threats with
                                  cloud-based WAFs . . . . . . . . . . . . 5--8
                 Jesper Zerlang   GDPR: a milestone in convergence for
                                  cyber-security and compliance  . . . . . 8--11
                    Jay Botelho   How automating data collection can
                                  improve cyber-security . . . . . . . . . 11--13
         Steve Mansfield-Devine   Leaks and ransoms --- the key threats to
                                  healthcare organisations . . . . . . . . 14--19
                  Colin Tankard   Securing emails  . . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 7, July, 2017

                      Anonymous   National Accounting Office demands
                                  action . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Parliament attacked  . . . . . . . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleGray Hat C#, by
                                  Brandon Perry. No Starch Press. ISBN
                                  978-1-59327-759-8  . . . . . . . . . . . 4--4
                Simon Parkinson   Use of access control to minimise
                                  ransomware impact  . . . . . . . . . . . 5--8
                   Michael Wood   Top requirements on the SD-WAN security
                                  checklist  . . . . . . . . . . . . . . . 9--11
                Mark Taylor and   
               Denis Reilly and   
                Brett Lempereur   An access control management protocol
                                  for Internet of Things devices . . . . . 11--17
                 Malcolm Murphy   The Internet of Things and the threat it
                                  poses to DNS . . . . . . . . . . . . . . 17--19
                   Karen Renaud   It makes you Wanna Cry . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 8, August, 2017

                      Anonymous   Two illicit dark web marketplaces taken
                                  down . . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Italian bank hit with major breach . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleThreat
                                  Forecasting, by John Pirc, David
                                  DeSanto, Iain Davison, and Will Gragido.
                                  Syngress. ISBN 978-0-12-800006-9 . . . . 4--4
                      Anonymous   Book Review: \booktitleIntercept: The
                                  Secret History of Computers and Spies
                                  [by Gordon Corera, Weidenfeld and
                                  Nicolson, London, UK 2015, ISBN
                                  1-78022-784-1] . . . . . . . . . . . . . 4--4
                    Jeff Luszcz   How maverick developers can create risk
                                  in the software and IoT supply chain . . 5--7
                Eileen Haggerty   Healthcare and digital transformation    7--11
                      Tom Major   Weaponising threat intelligence data . . 11--13
                    Paul German   Time to bury dedicated hardware-based
                                  security solutions . . . . . . . . . . . 13--15
         Steve Mansfield-Devine   Adapting to the disappearing perimeter   15--19
                    Tim Erridge   Good will hunting  . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 9, September, 2017

                      Anonymous   State-backed hackers target US and
                                  European energy sectors  . . . . . . . . 1--2
                      Anonymous   Ransomware and IoT among leading threats 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleDeception in the
                                  Digital Age, by Cameron Malin, Terry
                                  Gudaitis, Thomas Holt, and Max Kilger.
                                  Academic Press. ISBN 978-0-12-411630-6   4--4
                  Travis Farral   Nation-state attacks: practical defences
                                  against advanced adversaries . . . . . . 5--7
                     Jon Condra   Assessing nation state threats . . . . . 8--10
                   Adam Vincent   State-sponsored hackers: the new normal
                                  for business . . . . . . . . . . . . . . 10--12
              Nick Robinson and   
                   Keith Martin   Distributed denial of government: the
                                  Estonian Data Embassy Initiative . . . . 13--16
                   Phil Beckett   Data and IP are the new nuclear: facing
                                  up to state-sponsored threats  . . . . . 17--19
                  Colin Tankard   Who are the attackers? . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 10, October, 2017

                      Anonymous   NCSC reports more than 1,000
                                  cyber-attacks in first year  . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleCybercrime and
                                  Business, by Sanford Moskowitz.
                                  Butterworth-Heinemann. ISBN
                                  978-0-12-800353-4  . . . . . . . . . . . 4--4
                  Eric Lundbohm   Understanding nation-state attacks . . . 5--8
                  John Bambenek   Nation-state attacks: the new normal . . 8--10
                    Brian Laing   Cyber global warming: six steps towards
                                  meltdown . . . . . . . . . . . . . . . . 11--13
         Steve Mansfield-Devine   Weaponising the Internet of Things . . . 13--19
               Karen Renaud and   
                  Gareth Renaud   To phish, or not to phish \ldots . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 11, November, 2017

                      Anonymous   Bad Rabbit ransomware attacks Russia and
                                  Ukraine  . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Wifi flaw affects nearly all devices . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Book Review: \booktitleComputer and
                                  Information Security Handbook, Third
                                  edition, edited by John R Vacca. Morgan
                                  Kaufmann. ISBN 978-0-12-803843-7 . . . . 4--4
                      Anonymous   Book Review: \booktitleBig Data: a very
                                  short introduction, by Dawn E. Holmes.
                                  Oxford University Press. ISBN
                                  978-0-19-877957-5  . . . . . . . . . . . 4--4
                  Chris Steffen   Should jump box servers be consigned to
                                  history? . . . . . . . . . . . . . . . . 5--6
                  Nick Thompson   Putting security at the heart of app
                                  development  . . . . . . . . . . . . . . 7--8
         Akashdeep Bhardwaj and   
                    Sam Goundar   Security challenges for cloud-based
                                  email infrastructure . . . . . . . . . . 8--15
         Steve Mansfield-Devine   Going critical: attacks against national
                                  infrastructure . . . . . . . . . . . . . 16--19
                  Colin Tankard   BYOE: New kid on the block . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2017, Number 12, December, 2017

                      Anonymous   NHS to create a \pounds 20m SOC and
                                  pen-testing operation  . . . . . . . . . 1--2
                      Anonymous   UK Government announces interim strategy 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Safety of Web applications . . . . . . . 4--4
             Steven Furnell and   
               Ismini Vasileiou   Security education and awareness: just
                                  let them burn? . . . . . . . . . . . . . 5--9
                 Filippo Lauria   How to footprint, report and remotely
                                  secure compromised IoT devices . . . . . 10--16
         Steve Mansfield-Devine   The right response: how organisations
                                  should react to security incidents . . . 16--19
                    Tim Erridge   A framework for threats  . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2018, Number 1, January, 2018

                      Anonymous   North Korea blamed for WannaCry, PoS
                                  attacks and Bitcoin phishing . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Securing the Internet of Things  . . . . 4--4
                      Anonymous   Network Routing  . . . . . . . . . . . . 4--4
                    Jeff Luszcz   Apache Struts 2: how technical and
                                  development gaps caused the Equifax
                                  Breach . . . . . . . . . . . . . . . . . 5--8
                Olivier Boireau   Securing the blockchain against hackers  8--11
                 Dave Nicholson   Blurring the boundaries between
                                  networking and IT security . . . . . . . 11--13
                 Fadi Farha and   
                  Hongsong Chen   Mitigating replay attacks with ZigBee
                                  solutions  . . . . . . . . . . . . . . . 13--19
                  Colin Tankard   Tackling push payment scams  . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 2, February, 2018

                      Anonymous   Crypto-currencies hit by hacking
                                  attacks, theft and fraud . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Seeking the Truth from Mobile Evidence   4--4
                   James Wickes   CCTV: an open door into enterprise and
                                  national infrastructure  . . . . . . . . 5--8
              Saad Al-Azzam and   
              Ahmad Sharieh and   
                Azzam Sleit and   
                 Nedaa Al-Azzam   Securing robot communication using
                                  packet encryption distribution . . . . . 8--14
         Steve Mansfield-Devine   Open source and the Internet of Things   14--19
               Karen Renaud and   
                Lynsay Shepherd   GDPR: its time has come  . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 3, March, 2018

                      Anonymous   Cyber-breaches hit twice as hard in past
                                  year, says Cisco . . . . . . . . . . . . 1--2
                      Anonymous   UK Government launches IoT code  . . . . 2--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Safety of Web Applications . . . . . . . 4--4
                    Barry Scott   How a zero trust approach can help to
                                  secure your AWS environment  . . . . . . 5--8
                Kirill Shipulin   We need to talk about IDS signatures . . 8--13
             Yassine Ayrour and   
                 Amine Raji and   
                 Mahmoud Nassar   Modelling cyber-attacks: a survey study  13--19
                  Colin Tankard   The threat of fileless trojans . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 4, April, 2018

                      Anonymous   UK organisations seriously unprepared
                                  for cyber-attacks  . . . . . . . . . . . 1--2
                      Anonymous   In brief . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Port Cybersecurity . . . . . . . . . . . 4--4
                      Anonymous   Bit by Bit . . . . . . . . . . . . . . . 4--4
                     Tim Mackey   Building open source security into agile
                                  application builds . . . . . . . . . . . 5--8
             Pranshu Bajpai and   
             Aditya K. Sood and   
              Richard J. Enbody   The art of mapping IoT devices in
                                  networks . . . . . . . . . . . . . . . . 8--15
         Akashdeep Bhardwaj and   
                    Sam Goundar   Reducing the threat surface to minimise
                                  the impact of cyber-attacks  . . . . . . 15--19
                    Tim Erridge   True colours of red teaming  . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 5, May, 2018

                      Anonymous   One year after WannaCry: assessing the
                                  aftermath  . . . . . . . . . . . . . . . 1--2
                      Anonymous   Equifax vulnerability still a problem    2--2
                      Anonymous   Cyber-security Breaches Survey:
                                  fraudulent emails present a major menace 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleSimplifying
                                  JavaScript, by Joe Morgan. Published by
                                  Pragmatic Bookshelf. ISBN:
                                  978-1-68050-288-6. Price: \$39.95, 282
                                  pgs, paperback}  . . . . . . . . . . . . 5--5
                      Lee James   Making cyber-security a strategic
                                  business priority  . . . . . . . . . . . 6--8
               Michael Aminzade   Confidentiality, integrity and
                                  availability --- finding a balanced IT
                                  framework  . . . . . . . . . . . . . . . 9--11
                       Greg Sim   Defending against the malware flood  . . 12--13
         Steve Mansfield-Devine   The intelligent way to protect complex
                                  environments . . . . . . . . . . . . . . 13--17
               Jonathan Wilkins   Is artificial intelligence a help or
                                  hindrance? . . . . . . . . . . . . . . . 18--19
                   Karen Renaud   Cooking up security awareness & training  20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 6, June, 2018

                      Anonymous   Sharp rise in costs and damage from
                                  DNS-related attacks  . . . . . . . . . . 1--2
                      Anonymous   Healthcare under attack  . . . . . . . . 2--2
                      Anonymous   Synopsis: Open Source Security and Risk
                                  Analysis . . . . . . . . . . . . . . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Research Methods for Cyber Security  . . 5--5
                 Chris Townsley   Are businesses getting complacent when
                                  it comes to DDoS mitigation? . . . . . . 6--9
                  Mike Simmonds   Instilling a culture of data security
                                  throughout the organisation  . . . . . . 9--12
                     Jason Macy   How to build a secure API gateway  . . . 12--14
                     Javid Khan   The need for continuous compliance . . . 14--15
         Steve Mansfield-Devine   Friendly fire: how penetration testing
                                  can reduce your risk . . . . . . . . . . 16--19
                  Colin Tankard   Streamlining data discovery  . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 7, July, 2018

                      Anonymous   New cyber-security guidelines for
                                  government departments . . . . . . . . . 1--2
                      Anonymous   HMRC takes down 20,000 sites . . . . . . 2, 5
                      Anonymous   Harvey Nash & KPMG: CIO Survey 2018 &
                                  Growing Pains  . . . . . . . . . . . . . 3--3
                      Anonymous   In brief . . . . . . . . . . . . . . . . 4--4
                      Anonymous   Book Review: \booktitleModern Vim  . . . 5--5
                      Anonymous   Firms collect more data than they can
                                  handle . . . . . . . . . . . . . . . . . 5--5
                   Phil Beecher   Enterprise-grade networks: the answer to
                                  IoT security challenges  . . . . . . . . 6--9
                   Colin Dennis   Why is patch management necessary? . . . 9--13
                  Anthony Chadd   DDoS attacks: past, present and future   13--15
         Steve Mansfield-Devine   DevOps: finding room for security  . . . 15--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 8, August, 2018

                      Anonymous   Russian attackers breach US electricity
                                  network  . . . . . . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   GDPR reduces insider threats . . . . . . 3, 19
                      Anonymous   Quarterly Incident Response Threat
                                  Report, July 2018  . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                     Mike Mason   Overcoming the risks of privileged user
                                  abuse in Salesforce  . . . . . . . . . . 6--8
                Tracey Caldwell   Plugging IT/OT vulnerabilities --- part
                                  1  . . . . . . . . . . . . . . . . . . . 9--14
         Steve Mansfield-Devine   Knowing what you have: the road to
                                  effective data discovery . . . . . . . . 15--19
                      Anonymous   Vulnerabilities stay the same  . . . . . 19--19
                     Oliver Fay   BEC reality check  . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 9, September, 2018

                      Anonymous   Tech firms tackle fake accounts and
                                  political hackers  . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   BA breached  . . . . . . . . . . . . . . 3--3
                      Anonymous   Trend Micro: Unseen Threats, Imminent
                                  Losses: 2018 Midyear Security Roundup    4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                     Jason Macy   API security: whose job is it anyway?    6--9
                Tracey Caldwell   Plugging IT/OT vulnerabilities --- part
                                  2  . . . . . . . . . . . . . . . . . . . 10--15
               Keegan Keplinger   Is quantum computing becoming relevant
                                  to cyber-security? . . . . . . . . . . . 16--19
               Karen Renaud and   
              Verena Zimmermann   A user by any other name . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 10, October, 2018

                      Anonymous   China put spy chips in servers, claims
                                  Bloomberg  . . . . . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Flaw leads to Google+ shutting down  . . 3--3
                      Anonymous   Europol: Internet Organised Crime Threat
                                  Assessment . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                    Ronald Sens   Be ready to fight new 5G vulnerabilities 6--7
               Marco Hogewoning   IoT and regulation --- striking the
                                  right balance  . . . . . . . . . . . . . 8--10
                   Marc Sollars   Love and marriage: why security and
                                  SD-WAN need to go together . . . . . . . 10--12
               Benedict McKenna   Measuring cyber-risk . . . . . . . . . . 12--14
         Steve Mansfield-Devine   Hacking democracy: abusing the Internet
                                  for political gain . . . . . . . . . . . 15--19
                  Colin Tankard   How trustworthy is AI? . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 11, November, 2018

                      Anonymous   China steps up hacking as US issues
                                  indictments  . . . . . . . . . . . . . . 1--2
                      Anonymous   Triton blamed on Russia  . . . . . . . . 3--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   National Cyber Security Centre: Annual
                                  Review 2018  . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
             Jack Bedell-Pearce   Safe digital transformation for SMEs . . 6--7
                  Steve Roberts   Learning lessons from data breaches  . . 8--11
                   Nick Claxson   Securing VoIP: encrypting today's
                                  digital telephony systems  . . . . . . . 11--13
                     Paul Timms   Business continuity and disaster
                                  recovery --- advice for best practice    13--14
         Steve Mansfield-Devine   Nation-state attacks: the start of a new
                                  Cold War?  . . . . . . . . . . . . . . . 15--19
                   Ranulf Green   Pen-testing the cloud  . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2018, Number 12, December, 2018

                      Anonymous   Securing the Internet of Things --- part
                                  one  . . . . . . . . . . . . . . . . . . 1--1
                      Anonymous   Firms failing to disclose IoT
                                  vulnerabilities  . . . . . . . . . . . . 1--2
                      Anonymous   Ukraine blames Russia for cyber attacks  2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   IoT leads growth in endpoint security    3--3
                      Anonymous   Nokia Threat Intelligence Report ---
                                  2019 . . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                    Andy Baldin   Securing the weak spots  . . . . . . . . 6--8
                      Tim Stone   Protecting connected transportation
                                  networks . . . . . . . . . . . . . . . . 8--10
                       RV Raghu   The many dimensions of successful IoT
                                  deployment . . . . . . . . . . . . . . . 10--15
         Steve Mansfield-Devine   Getting to grips with IoT  . . . . . . . 15--19
                  Colin Tankard   A layered approach to authentication . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2019, Number 1, January, 2019

                      Anonymous   Securing the Internet of Things --- part
                                  two  . . . . . . . . . . . . . . . . . . 1--1
                      Anonymous   UK critical infrastructure is wide open
                                  to attack, warns parliamentary committee 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Avast report highlights IoT
                                  vulnerabilities  . . . . . . . . . . . . 3--3
                      Anonymous   North Korean defectors targeted  . . . . 3--3
                      Anonymous   ENISA: Cyber Europe 2018 --- After
                                  Action Report  . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                     Gabe Perez   A practical approach to securing IoT . . 6--8
             Andrea Oliveri and   
                 Filippo Lauria   Sagishi: an undercover software agent
                                  for infiltrating IoT botnets . . . . . . 9--14
                       Gary Cox   Managing the risks of shadow IoT . . . . 14--17
               Roderick Hodgson   Solving the security challenges of IoT
                                  with public key cryptography . . . . . . 17--19
                     Ian Goslin   Know your enemy  . . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 2, February, 2019

                      Anonymous   US authorities hijack North Korea's
                                  Joanap botnet  . . . . . . . . . . . . . 1--2
                      Anonymous   Massive data haul not all it seems . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Digital transformation puts data at risk 3--3
                      Anonymous   Gemalto: State of IoT Security . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
              Robert Rutherford   Internet of Things --- striking the
                                  balance between competition and security 6--8
                      Sean Keef   Using analytics-driven automation to
                                  target the biggest vulnerabilities . . . 8--11
                   Adam Vincent   Don't feed the phish: how to avoid
                                  phishing attacks . . . . . . . . . . . . 11--14
                   Phil Bindley   Joining the dots: how to approach
                                  compliance and data governance . . . . . 14--16
                   Simon Yeoman   How secure are bare metal servers? . . . 16--17
                    Sean Newman   Under the radar: the danger of stealthy
                                  DDoS attacks . . . . . . . . . . . . . . 18--19
             Ganna Pogrebna and   
               Karen Renaud and   
                 Boris Taratine   The many faces of active cyber . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 3, March, 2019

                      Anonymous   Data breaches reach record levels
                                  worldwide  . . . . . . . . . . . . . . . 1--2
                      Anonymous   Firms delay breach reports . . . . . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Huawei battles security concerns . . . . 3--3
                      Anonymous   Accenture/Ponemon Institute: the Cost of
                                  Cybercrime . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                     Dave Klein   Micro-segmentation: securing complex
                                  cloud environments . . . . . . . . . . . 6--10
                   Jesse Canada   Is reputational damage worse than a
                                  regulator's fine?  . . . . . . . . . . . 11--12
                Greig Schofield   Has your wifi left you wide open to
                                  cybercrime?  . . . . . . . . . . . . . . 13--14
                      Sam Haria   The growth of the hide and seek botnet   14--17
                    Rory Duncan   How to secure your supply chain  . . . . 18--19
                  Colin Tankard   IoT regulations: fact or fiction?  . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 4, April, 2019

                      Anonymous   Facebook confronted by a barrage of
                                  privacy issues . . . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Asus issues malicious updates  . . . . . 3--3
                      Anonymous   DCMS: Cyber Security Breaches Survey
                                  2019 . . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                Daniel Goldberg   Living with decade-old vulnerabilities
                                  in datacentre software . . . . . . . . . 6--8
                    Nick Jewell   The analytics lifecycle and the age of
                                  innovation . . . . . . . . . . . . . . . 8--11
                   Sascha Giese   The endpoint epidemic of IoT --- just a
                                  bad dream? . . . . . . . . . . . . . . . 11--12
                   Sean Herbert   Preventing software from opening doors
                                  to the network . . . . . . . . . . . . . 13--15
                   Alex Mathews   What can machine learning do for
                                  information security?  . . . . . . . . . 15--17
                  Nick Boughton   Protecting infrastructure from cyber
                                  attack . . . . . . . . . . . . . . . . . 18--19
                    Dave Spence   The non-functional requirement fallacy   20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 5, May, 2019

                      Anonymous   UK Government offers initiatives and
                                  assurances . . . . . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Presidential hopefuls vulnerable . . . . 3, 19
                      Anonymous   Hiscox Cyber Readiness Report 2019 . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                  Omar Yaacoubi   The rise of encrypted malware  . . . . . 6--9
                   Scott Gordon   A matter of trust  . . . . . . . . . . . 9--11
            Van-Linh Nguyen and   
               Po-Ching Lin and   
                 Ren-Hung Hwang   Web attacks: defeating monetisation
                                  attempts . . . . . . . . . . . . . . . . 11--19
                      Anonymous   Risky open source  . . . . . . . . . . . 19--19
                     Ian Goslin   Cyber extortion is threatening Industry
                                  4.0  . . . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 6, June, 2019

                      Anonymous   RDP bug in older Windows versions leaves
                                  millions vulnerable to `wormable' attack 1--2
                      Anonymous   UK fails to make progress  . . . . . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Insider threat grows . . . . . . . . . . 3--3
                      Anonymous   Mimecast: the State of Email Security
                                  Report 2019  . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
       SophosLabs Research Team   Emotet exposed: looking inside highly
                                  destructive malware  . . . . . . . . . . 6--11
                  Nick Boughton   Protecting the world of connected
                                  devices  . . . . . . . . . . . . . . . . 11--13
                     Jason Macy   Product vs toolkit: API and IAM security 13--15
         Akashdeep Bhardwaj and   
                    Sam Goundar   A framework for effective threat hunting 15--19
               Karen Renaud and   
              Verena Zimmermann   Encouraging password manager use . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 7, July, 2019

                      Anonymous   War breaks out between US and Iran in
                                  cyberspace . . . . . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   China attacks major tech firms . . . . . 3--3
                      Anonymous   Sikich: 2019 Manufacturing and
                                  Distribution Report  . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
            Michael Roytman and   
                     Jay Jacobs   The complexity of prioritising patching  6--9
                   Sean Herbert   Why IIoT should make businesses rethink
                                  security . . . . . . . . . . . . . . . . 9--11
                Paul Breitbarth   The impact of GDPR one year on . . . . . 11--13
                   Peter Barker   Visual hacking --- why it matters and
                                  how to prevent it  . . . . . . . . . . . 14--17
                     Jan Oetjen   Using artificial intelligence in the
                                  fight against spam . . . . . . . . . . . 17--19
                  Colin Tankard   Why you need Cyber Essentials  . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 8, August, 2019

                      Anonymous   More data breaches compromise millions
                                  of records . . . . . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Vulnerable PCs . . . . . . . . . . . . . 3a-3
                      Anonymous   NCSC: Active Cyber Defence (ACD) --- The
                                  Second Year  . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                  Keenan Skelly   It's a war out there: why malicious
                                  hackers are beating businesses to the
                                  punch --- and what we can do about it    6--8
               Dawood Ghalaieny   Achieving IoT nirvana by protecting
                                  cellular networks  . . . . . . . . . . . 8--12
                  Mike O'Malley   Securing the future of AgTech  . . . . . 12--14
              Thorsten Kurpjuhn   Demystifying the role of AI for better
                                  network security . . . . . . . . . . . . 14--17
                  Adrian Taylor   Decrypting SSL traffic: best practices
                                  for security, compliance and
                                  productivity . . . . . . . . . . . . . . 17--19
                    Dave Spence   Response in the cloud  . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 9, September, 2019

                      Anonymous   Dramatic rise in data breaches, with
                                  Yves Rocher, Monster and ECB among
                                  latest to be hit . . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Cybercrime groups working together . . . 3--3
                      Anonymous   Kaspersky: the State of Industrial Cyber
                                  security . . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                  Spencer Young   Automated systems only: why CISOs should
                                  switch off their dumb machines . . . . . 6--8
                   Roger Grimes   The many ways to hack 2FA  . . . . . . . 8--13
                    Andy Baldin   Best practices for fighting the fileless
                                  threat . . . . . . . . . . . . . . . . . 13--15
                    Paul Walker   Why do PAM projects fail?  . . . . . . . 15--18
               Charlene Bunting   Cloud security: how to protect critical
                                  data and stay productive . . . . . . . . 18--19
                Richard Goodall   The ideal industrial SOC . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 10, October, 2019

                      Anonymous   NCSC warns UK universities of
                                  cyberthreats . . . . . . . . . . . . . . 1--2
                      Anonymous   US looks to tighten aircraft security    2--2
                      Anonymous   FDA issues medical device warning  . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Loss of confidence among compliance
                                  professionals  . . . . . . . . . . . . . 3--3
                      Anonymous   Bitdefender: Hacked Off! . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                   Ian Heritage   Protecting Industry 4.0: challenges and
                                  solutions as IT, OT and IP converge  . . 6--9
         Steve Mansfield-Devine   The state of operational technology
                                  security . . . . . . . . . . . . . . . . 9--13
         Akashdeep Bhardwaj and   
              Vinay Avasthi and   
                    Sam Goundar   Cyber security attacks on robotic
                                  platforms  . . . . . . . . . . . . . . . 13--19
                  Colin Tankard   Goodbye SIEM, hello SOARX  . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 11, November, 2019

                      Anonymous   Russians pose as Iranians to attack
                                  Middle East targets  . . . . . . . . . . 1--3
                      Anonymous   Child exploitation site is shut down . . 3--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   NCSC Annual Review 2019  . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                   Chris Knauer   How contact centres can leave businesses
                                  exposed to cybercrime  . . . . . . . . . 6--9
                      Tom Stitt   Office walls and roadblocks: how
                                  workflows and terminology get in the way
                                  of visibility  . . . . . . . . . . . . . 9--13
                      Stu Homan   The importance of domains to security
                                  management . . . . . . . . . . . . . . . 13--15
                    Azeem Aleem   Treading water: why organisations are
                                  making no progress on cyber security . . 15--18
 Nathalie Künneke-Trenaman   RPKI and the future of routing security  18--19
               Karen Renaud and   
                    Marc Dupuis   Should we scare people into behaving
                                  securely?  . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2019, Number 12, December, 2019

                      Anonymous   New wave of ransomware hits datacentre
                                  and healthcare targets . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Selfie phishing  . . . . . . . . . . . . 3--3
                      Anonymous   Bitdefender: Mid-Year Threat Landscape
                                  Report 2019  . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                 Tim Callan and   
                   Chris Bailey   Changes to extended validation
                                  indicators put users at risk . . . . . . 6--8
                 Steve Thompson   Apprenticeships as the answer to closing
                                  the cyber skills gap . . . . . . . . . . 9--11
      Mouhammd Al-kasassbeh and   
               Tariq Khairallah   Winning tactics with DNS tunnelling  . . 12--19
                    Dave Spence   Resilience in the supply chain . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2020, Number 1, January, 2020

                      Anonymous   Ring under fire over weakness in video
                                  device security  . . . . . . . . . . . . 1--2
                      Anonymous   Citrix flaw threatens large firms  . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   TikTok dangers . . . . . . . . . . . . . 3, 19
                      Anonymous   Upstream Security: 2020 Global
                                  Automotive Cyber security Report . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                   Roy Reynolds   It's time to rethink DDoS protection . . 6--8
                  Andres Andreu   Operational technology security --- a
                                  data perspective . . . . . . . . . . . . 8--13
                   Scott Gordon   Securing workers beyond the perimeter    14--16
                     Guy Bunker   Targeted cyber attacks: how to mitigate
                                  the increasing risk  . . . . . . . . . . 17--19
                  Colin Tankard   The power of voice . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 2, February, 2020

                      Anonymous   United Nations covered up hack of dozens
                                  of servers . . . . . . . . . . . . . . . 1--2
                      Anonymous   Citrix flaw remains critical . . . . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   NSA finds major Windows bug  . . . . . . 3--3
                      Anonymous   IBM/ObserveIT: Cost of Insider Threats
                                  2020 . . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                    Cindy Blake   Reducing risk with end-to-end
                                  application security automation  . . . . 6--8
             Pranshu Bajpai and   
                 Richard Enbody   Dissecting .NET ransomware: key
                                  generation, encryption and operation . . 8--14
         Akashdeep Bhardwaj and   
                    Sam Goundar   Keyloggers: silent cyber security
                                  weapons  . . . . . . . . . . . . . . . . 14--19
                 Kate MacMillan   Signs of things to come? . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 3, March, 2020

                      Anonymous   Worrying vulnerabilities found in Intel,
                                  AMD, Cypress and Broadcom chips  . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Microsoft takes down Necurs botnet . . . 3--3
                      Anonymous   Edgescan: Vulnerability Stats Report . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                   Roy Reynolds   The four biggest malware threats to UK
                                  businesses . . . . . . . . . . . . . . . 6--8
               Yessine Borchani   Advanced malicious beaconing detection
                                  through AI . . . . . . . . . . . . . . . 8--14
                    Colby Dyess   Maintaining a balance between agility
                                  and security in the cloud  . . . . . . . 14--17
                 Pascal Geenens   How worried should you be about
                                  nation-state attacks?  . . . . . . . . . 17--19
                   Karen Renaud   Strong passwords can't keep children
                                  safe . . . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 4, April, 2020

                      Anonymous   Ransomware payments increase as more
                                  attackers leak data  . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Cybercrime takedowns . . . . . . . . . . 3--3
                      Anonymous   Linux servers exploited for a decade . . 3--3
                      Anonymous   Watchguard: Internet Security Report Q4
                                  2019 . . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                      Terry Ray   DDoS defence: new tactics for a rising
                                  shadow industry  . . . . . . . . . . . . 6--7
                   Phil Chapman   Are your IT staff ready for the
                                  pandemic-driven insider threat?  . . . . 8--11
                    Cary Wright   Essentials for selecting a network
                                  monitoring tool  . . . . . . . . . . . . 11--14
                     Simon Kelf   The security risks created by cloud
                                  migration and how to overcome them . . . 14--16
                  David Higgins   Innovation and risk walk hand-in-hand
                                  with 5G and IoT  . . . . . . . . . . . . 16--18
                    Alyn Hockey   Uncovering the cyber security challenges
                                  in healthcare  . . . . . . . . . . . . . 18--19
                      David Fox   Losing the human touch . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 5, May, 2020

                      Anonymous   Chinese hackers attacking Covid-19
                                  researchers, US warns  . . . . . . . . . 1--2
                      Anonymous   InfinityBlack market taken down  . . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   New North Korean threats . . . . . . . . 3--3
                      Anonymous   AT&T Cybersecurity: the relationship
                                  between security maturity and business
                                  enablement . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                Florian Malecki   Optimising storage processes to reduce
                                  the risk of ransomware . . . . . . . . . 6--8
                Amar Meryem and   
             Bouabid El Ouahidi   Hybrid intrusion detection system using
                                  machine learning . . . . . . . . . . . . 8--19
                  Colin Tankard   Pandemic underpins need for SOAR . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 6, June, 2020

                      Anonymous   Russian nation-state attackers target
                                  Exim mail servers  . . . . . . . . . . . 1--2
                      Anonymous   Network and web app attacks increase . . 2--3
                      Anonymous   ThreatWatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Scammers exploit Covid-19 measures . . . 3--3
                      Anonymous   Trend Micro: Shifts in Underground
                                  Markets  . . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                   Leila Powell   How data can be the lingua franca for
                                  security and IT  . . . . . . . . . . . . 6--7
                   Paul Hampton   Keeping a secure hold on data through
                                  modern electronic content management . . 8--11
                Gus Evangelakos   Keeping critical assets safe when
                                  teleworking is the new norm  . . . . . . 11--14
                    Ben Bulpett   Safeguarding against the insider threat  14--17
            Thomas Deighton and   
              Michael Wakefield   Keep security top of mind when moving
                                  into the cloud . . . . . . . . . . . . . 17--19
                 Kate MacMillan   Trusting the CISO  . . . . . . . . . . . 20--20
                      Anonymous   Events Calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 7, July, 2020

                      Anonymous   Australian Government claims
                                  `sophisticated' attack by nation-state
                                  actors . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   Call for revisions to Computer Misuse
                                  Act  . . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   A million dodgy emails . . . . . . . . . 3--3
                      Anonymous   IBM: 2020 Cyber Resilient Organisation
                                  Report . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                       Rod Cope   Strong security starts with software
                                  development  . . . . . . . . . . . . . . 6--9
               Martin Jartelius   The 2020 Data Breach Investigations
                                  Report --- a CSO's perspective . . . . . 9--12
                      Mieng Lim   Avoiding the most common
                                  vulnerability-management pitfalls  . . . 12--14
                     Simon Wood   Adhering to privacy by design with
                                  identity-as-a-service  . . . . . . . . . 14--17
                    Dale Murray   Open source and security: why
                                  transparency now equals strength . . . . 17--19
               Karen Renaud and   
           Zinaida Benenson and   
               Daniela Oliveira   Balancing resistance and resilience  . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 8, August, 2020

                      Anonymous   Intel and other major firms suffer
                                  source code leaks  . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Warning issued over critical
                                  infrastructure . . . . . . . . . . . . . 3--3
                      Anonymous   Nozomi Networks: OT/IoT Security Report  4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Hacking Connected Cars: Tactics,
                                  Techniques and Procedures  . . . . . . . 6--6
                      Anonymous   Hunting Cyber Criminals: a Hacker's
                                  Guide to Online Intelligence Gathering
                                  Tools and Techniques . . . . . . . . . . 6--6
                   Mark Rodbert   Why organisational readiness is vital in
                                  the fight against insider threats  . . . 7--9
                  Dave Waterson   Managing endpoints, the weakest link in
                                  the security chain . . . . . . . . . . . 9--13
           Ion-Alexandru Secara   Zoombombing --- the end-to-end fallacy   13--17
                    Rory Duncan   What does `secure by design' actually
                                  mean?  . . . . . . . . . . . . . . . . . 18--19
                      David Fox   Dealing with technical debt  . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 9, September, 2020

                      Anonymous   US presidential election already under
                                  attack . . . . . . . . . . . . . . . . . 1--2
                      Anonymous   UK Government funds better healthcare
                                  security . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   APT groups change tactics  . . . . . . . 3--3
                      Anonymous   Rapid7: Under the Hoodie . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                 Mike Campfield   The problem with (most) network
                                  detection and response . . . . . . . . . 6--9
            Fabio Cavaliere and   
              John Mattsson and   
                     Ben Smeets   The security implications of quantum
                                  cryptography and quantum computing . . . 9--15
                   Israel Barak   Critical infrastructure under attack:
                                  lessons from a honeypot  . . . . . . . . 16--17
              Michael Eckel and   
                     Tom Laffey   Ensuring the integrity and security of
                                  network equipment is critical in the
                                  fight against cyber attacks  . . . . . . 18--19
                   Andrew Cooke   A unique year for cyber security . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 10, October, 2020

                      Anonymous   Zerologon flaw exploited in the wild . . 1--2
                      Anonymous   DDoS attacks hit hard and fast . . . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Enterprise IoT at risk . . . . . . . . . 3b-3
                      Anonymous   Microsoft Digital Defense Report . . . . 4--4
                      Anonymous   News in brief  . . . . . . . . . . . . . 5--5
                    Assaf Morag   Exploitable hosts used in cloud native
                                  cyber attacks  . . . . . . . . . . . . . 6--10
                     Nadav Erez   How threat actors abuse ICS-specific
                                  file types . . . . . . . . . . . . . . . 10--13
                    Tom Hofmann   How organisations can ethically
                                  negotiate ransomware payments  . . . . . 13--17
                  Robert Meyers   Data highway and the digital
                                  transformation: arguments for secure,
                                  centralised log management . . . . . . . 17--19
                  Colin Tankard   Remote working reset now required  . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 11, November, 2020

                      Anonymous   Governments implement sanctions against
                                  nation-state attackers . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Control system report finds poor
                                  security . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Guardicore: Rethink Firewalls ---
                                  Security and agility for the modern
                                  enterprise . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                     Amy Hodler   Can graphs mitigate against
                                  coronavirus-related cybercrime?  . . . . 6--8
                     Andy Still   Bot mitigation --- how gaps in
                                  understanding and ownership are exposing
                                  businesses to greater threats  . . . . . 8--11
                  Armin Wasicek   The future of 5G smart home network
                                  security is micro-segmentation . . . . . 11--13
                  Brian Trzupek   How DIY PKI often negates the promise of
                                  public key encryption  . . . . . . . . . 14--17
            René Seifert   Digital identities --- self-sovereignty
                                  and blockchain are the keys to success   17--19
               Karen Renaud and   
              Verena Zimmermann   How to nudge in cyber security . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2020, Number 12, December, 2020

                      Anonymous   UK reveals existence of its military
                                  cyber operations unit  . . . . . . . . . 1--2
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Security firms breached  . . . . . . . . 3--3
                      Anonymous   Synopsys: DevSecOps practices and
                                  open-source management in 2020 . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                   Michael Wood   How SASE is defining the future of
                                  network security . . . . . . . . . . . . 6--8
                  Mark Sangster   When it comes to cyber security,
                                  ignorance isn't bliss --- it's
                                  negligence . . . . . . . . . . . . . . . 8--12
         Steve Mansfield-Devine   Nation-state attacks: the escalating
                                  menace . . . . . . . . . . . . . . . . . 12--17
                Gus Evangelakos   Where conventional security control
                                  validation falls short when evaluating
                                  organisational threats . . . . . . . . . 18--19
                     Paul Stone   Securing Windows networks against WSUS
                                  attacks  . . . . . . . . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20


Network Security
Volume 2021, Number 1, January, 2021

                      Anonymous   SolarWinds supply chain breach threatens
                                  government agencies and enterprises
                                  worldwide  . . . . . . . . . . . . . . . 1--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   The Cyber-Elephant In The Boardroom:
                                  Cyber-Accountability With The Five
                                  Pillars Of Security Framework  . . . . . 4--4
                      Anonymous   Hacking Multifactor Authentication . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
                      Andy Gent   How can mobile networks protect critical
                                  infrastructure?  . . . . . . . . . . . . 6--8
                     Dave Klein   Relying on firewalls? Here's why you'll
                                  be hacked  . . . . . . . . . . . . . . . 9--12
                   Sudhir Udipi   The event data management problem:
                                  getting the most from network detection
                                  and response . . . . . . . . . . . . . . 12--14
                  Connor Morley   Shining a light on UEFI --- the hidden
                                  memory space being exploited in attacks  14--17
                Florian Malecki   Now is the time to move past traditional
                                  3-2-1 back-ups . . . . . . . . . . . . . 18--19
                     Phil Jones   Power and security in a common mission   20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20

Network Security
Volume 2021, Number 2, February, 2021

                      Anonymous   Florida facility hacked in attempt to
                                  poison water . . . . . . . . . . . . . . 1--2
                      Anonymous   More fallout from SolarWinds hack  . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   Veracode: State of Software Security v11 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
         Steve Mansfield-Devine   Who's that knocking at the door? The
                                  problem of credential abuse  . . . . . . 6--15
                 Ollie Sheridan   The state of zero trust in the age of
                                  fluid working  . . . . . . . . . . . . . 15--17
                  Brendan Walsh   Avoiding costly downtime --- how MSPs
                                  can manage their networks  . . . . . . . 17--19
                  Colin Tankard   Credential stuffing --- the new hack . . 20--20
                      Anonymous   Due to the Covid-19 pandemic, many
                                  conferences are being cancelled,
                                  postponed or converted into virtual
                                  events. The events listed here were
                                  still planned to proceed at the time of
                                  publication. . . . . . . . . . . . . . . 20--20

Network Security
Volume 2021, Number 3, March, 2021

                      Anonymous   Accellion vulnerabilities lead to
                                  breaches of major organisations  . . . . 1--2
                      Anonymous   North Korea targets defence firms and
                                  Pfizer . . . . . . . . . . . . . . . . . 2--3
                      Anonymous   Threatwatch  . . . . . . . . . . . . . . 3--3
                      Anonymous   IBM: 2021 X-Force Threat Intelligence
                                  Index  . . . . . . . . . . . . . . . . . 4--4
                      Anonymous   In brief . . . . . . . . . . . . . . . . 5--5
              Chad Anderson and   
       John `Turbo' Conwell and   
                    Tarik Saleh   Investigating cyber attacks using domain
                                  and DNS data . . . . . . . . . . . . . . 6--8
                     Rashid Ali   Looking to the future of the cyber
                                  security landscape . . . . . . . . . . . 8--10
         Steve Mansfield-Devine   Locking the door: tackling credential
                                  abuse  . . . . . . . . . . . . . . . . . 11--19
                   Karen Renaud   Learning from the past . . . . . . . . . 20--20
                      Anonymous   Events calendar  . . . . . . . . . . . . 20--20