publications...

Listed below is the maintained list of articles I've written freelance for various security-based print and online publications.

eForensics Magazine

July 2023

There are Three CyberChefs!' in this issue (pp.43-63)

https://eforensicsmag.com/product/remote-video-identification/

https://eforensicsmag.com/there-are-three-cyberchefs/

 

July 2023 Special Edition

The Israel Torres Compendium (Special Edition)

https://eforensicsmag.com/product/the-israel-torres-compendium/

 

June 2023

Obfuscating Infiltration and Exfiltration with Code Cave Artifacts (pp.57-87)

https://eforensicsmag.com/product/forensic-investigation-in-docker-environments/

https://eforensicsmag.com/obfuscating-infiltration-and-exfiltration-with-code-cave-artifacts/

 

May 2023

VirusTotal's Code Insight Versus ChatGPT Analysis (pp.84-99)

https://eforensicsmag.com/product/artificial-intelligence/

https://eforensicsmag.com/virustotals-code-insight-versus-chatgpt-analysis/

 

April 2023 Exclusive

Interview with Israel Torres (pp.91-95)

https://eforensicsmag.com/product/critical-infrastructure/

https://eforensicsmag.com/interview-with-israel-torres/

 

April 2023

Hunting for macOS Ransomware Using VirusTotal Enterprise (pp.23-44)

https://eforensicsmag.com/product/critical-infrastructure/

https://eforensicsmag.com/hunting-for-macos-ransomware-using-virustotal-enterprise/

 

March 2023

Apple macOS Ransomware Where Art Thou? (pp.46-58)

https://eforensicsmag.com/product/the-ransomware-epidemic-march/

https://eforensicsmag.com/apple-macos-ransomware-where-art-thou/

 

February 2023

Analyzing Mobile iOS Apps with VirusTotal Enterprise Online and macOS Ventura Locally (pp.7-26)

https://eforensicsmag.com/product/mastering-ios-forensics/

https://eforensicsmag.com/analyzing-mobile-ios-apps-with-virustotal-enterprise-online-and-macos-ventura-locally/

 

January 2023

Analyzing Malware Mobile Apps with VirusTotal Enterprise Online and Kali Linux Locally (pp.9-28)

https://eforensicsmag.com/product/understanding-mobile-forensics/

https://eforensicsmag.com/analyzing-malware-mobile-apps-with-virustotal-enterprise-online-and-kali-linux-locally/

 

December 2022

Eschew Obfuscation, Espouse Elucidation (pp.46-68)

https://eforensicsmag.com/product/forensicanalysis/

 

November 2022

Malware in the Sky with Diamonds (pp.51-67)

https://eforensicsmag.com/product/corporate-forensic-investigations/

 

October 2022

XProCheck: When Necessity is the Mother of Reinvention (pp.79-85)

https://eforensicsmag.com/product/digital-forensic-tools/

 

November 2015

Case Study - Basic Malware Analysis using Kali

https://eforensicsmag.com/download/eforensics-open-the-unhackable-cloud/

 

December 2012

DIY Remote Mac OS X Watchdog

http://eforensicsmag.com/eforensics-network-32012/

LinkedIn

September 1, 2017

The Recollection of an Operator : Operation Black Bag

https://www.linkedin.com/pulse/recollection-operator-operation-black-bag-israel-torres

 

August 15, 2017

Information Secrets III

https://www.linkedin.com/pulse/information-secrets-iii-israel-torres

 

August 5, 2017

Automation - The Good, the Bad and the Ugly

https://www.linkedin.com/pulse/automation-good-bad-ugly-israel-torres

 

April 16, 2017

Enter the Hand-Wave

https://www.linkedin.com/pulse/enter-hand-wave-israel-torres

 

April 10, 2017

Information Secrets II

https://www.linkedin.com/pulse/information-secrets-ii-israel-torres

 

April 3, 2017

Half-baked Developer

https://www.linkedin.com/pulse/half-baked-developer-israel-torres

 

March 20, 2017

Security is number one!

https://www.linkedin.com/pulse/security-number-one-israel-torres

 

March 13, 2017

I don’t click links…

https://www.linkedin.com/pulse/i-dont-click-links-israel-torres

 

March 2, 2017

Information Secrets

https://www.linkedin.com/pulse/information-secrets-israel-torres

Milton Security Group

March 31, 2013

Operative Drunk Dagger

http://www.miltonstart.com/blog/2013/03/31/operative-drunk-dagger/

 

March 22, 2013

Serious Security Is Serious

http://www.miltonstart.com/blog/2013/03/22/serious-security-is-serious/

 

March 15, 2013

Have Malware, Will Propagate

http://www.miltonstart.com/blog/2013/03/15/have-malware-will-propagate/

 

March 13, 2013

Ms. Configuration

http://www.miltonstart.com/blog/2013/03/13/ms-configuration/

 

September 19, 2012

iPhones iPhones Everywhere

http://www.miltonstart.com/blog/2012/09/19/iphones-iphones-everywhere/>/a>

 

September 11, 2012

Access Creep

http://www.miltonstart.com/blog/2012/09/11/access-creep/

PenTest Magazine

August 2012

Configuring and Executing a Pentesting Scenario with Mac OS X Mountain Lion 10.8

http://pentestmag.com/pentest-web-app-082012/

INFOSEC Institute

April 2012

Hacking WolframAlpha - The Anatomy

http://resources.infosecinstitute.com/hacking-wolframalpha/

Hakin9 - IT Security Magazine

October 2011 [Hack Apple 10/11]

Apple Memory Tricks [source code]

http://hakin9.org/hack-apple-1011/

 

September 2011 [CryptoTutorials - Multi-part Series]

PART 4 Cryptography Fundamentals: Crypto Tools

http://hakin9.org/cryptotutorials-part-4/

 

September 2011 [Secure Coding 9/11]

Review of Passware Password Recovery Kit Forensic 11.0

http://hakin9.org/secure-coding-911/

 

September 2011 [Secure Coding 9/11]

For My Eyes Only [source code]

http://hakin9.org/secure-coding-911/

 

August 2011 [Hakin9 Extra 3/2011 – Forensics]

Forensic Improvisation [source code] [direct]

http://hakin9.org/hakin9-extra-22011-forensics/

 

August 2011 [CryptoTutorials - Multi-part Series]

PART 3 Cryptography Fundamentals: Crypto with Keys [source code]

http://hakin9.org/cryptotutorials-part-3/

 

August 2011 [Hacking RFID 8/2011]

RFIDIOt for Mac OS X [source code] [free article] [RFIDIOtOSXInstaller2011 MD5]

http://hakin9.org/hacking-rfid-82011/

 

July 2011 [CryptoTutorials - Multi-part Series]

PART 2 Cryptography Fundamentals: You can’t hide what isn’t there

http://hakin9.org/cryptotutorials-part-2/

 

July 2011 [CryptoTutorials - Multi-part Series]

PART 1 Cryptography Fundamentals: What you see isn’t what you get

http://hakin9.org/cryptotutorials-part-1/

 

June 2011 [Hakin9 Extra 1/2011 – Exploiting Software]

From Fuzz To Sploit [source code]

http://hakin9.org/hakin9-extra-12011-exploiting-software/

 

June 2011 [Insecure Access Control 06/2011]

Obscuring the truth [source code]

http://hakin9.org/insceure-access-control-062011/

 

December 2010 [Botnets, Malware, Spyware – Hakin9 11/2010]

dasbot: controlling IRC via bash [source/support]

http://hakin9.org/botnets-malware-spyware-hakin9-112010/

 

November 2010 [Spyware - someone is always watching...]

When XOR is your friend... [source code]

http://hakin9.org/spyware-someone-is-always-watching/

 

September 2010 [Mobile Malware – the new cyber threat]

Armoring Malware: Hiding Data within Data

http://hakin9.org/mobile-malware-–-the-new-cyber-threat/

 

June 2010 [Is DDOS still a threat?]

More Secure PHP Server Side Source Encryption

http://hakin9.org/is-ddos-still-a-threat/

 

June 2008 [Hacking Wi-Fi]

PKCS Potion Number Twelve

http://haking9.org/hacking-wi-fi/

SecureMac

July 2015

10 Security Tips for Safe Computing for OS X Yosemite

 

November 2012

10 Security Tips for Safe Computing for OS X Mountain Lion

http://www.securemac.com/10-MacOSX-MountainLion-Security-Tips.php

 

April 2012

20+ Top Security Tips for Safe Computing for Mac OS X

http://www.securemac.com/20tips.php

 

September 2010

Sophos Anti-Virus for Mac Home Edition Review

http://www.securemac.com/sophos-anti-virus-review.php

 

May 2010

PGP 10 WDE for Mac OS X (Snow Leopard) Review

http://www.securemac.com/pgp-10-wde-review.php