Free Issue
What is in the sample copy?


Number of attacks against retailers falls, but the severity and sophistication increase    1, 3

Web attacks down, but more countries involved    3


The first 10 years of the Trojan Horse defence    5–13

When accused of some form of misdeed involving a computer, people increasingly proffer the excuse that it wasn’t them but some kind of malware placed on their machines without their knowledge. This so-called Trojan Horse Defence (THD) was first used a decade ago. In this article, Stephen Bowles and Julio Hernandez-Castro of the University of Kent undertake a timely retrospective with an in-depth and critical literature review, plus a detailed look at the peculiarities of many court cases from around the world.

The dangers in our trail of digital breadcrumbs    13–15

When we use computers and online services, traces of our activities inevitably remain. It’s natural to worry about how this data – much of which we’re not even aware exists – might be misused. On the other hand, organisations can find this information useful for perfectly legitimate reasons. Tracey Stretton and Luke Aaron of Kroll Ontrack take a look at the kinds of personal data and evidence of our activities that we leave in our wake and suggest some basic measures that both individuals and businesses can take to lessen the potential impact – particularly in the legal realm – of inappropriate use.

A patchy response: the dangers of not keeping our systems secure    15–20

Keeping track of the vulnerabilities in your systems has never been easy, and timely patching is important if you want to prevent malicious people exploiting flaws in the systems and software you use. But with today’s highly complex IT environments, it can be tricky to know which vulnerabilities apply to you. In this interview with Gavin Millard of Tenable Network Security, we discover how continuous monitoring, linked to effective remediation processes, is the only way to ensure you reduce the risk to your organisation to acceptable levels.


Editorial    2

News in brief    4

Calendar    20

To view a sample copy, please complete the following form and click the submit button. There is no obligation to purchase a full subscription.

Why are you asking me to complete this form?

We are asking people to provide us with some information to help us understand our readers and develop our products. Don’t worry – we won’t be sending you lots of unwanted information, and you can opt out at any time (including when you sign up!). Please see our Privacy Policy to read more.

* indicates a required field


First Name:
Company Name:
Job Title:
Post Code:*
I wish to receive the free Infosec Alert e-newsletter - providing free articles, papers and news on IT security, biometrics and smartcard technology, emailed to you every two weeks

The information that you provide on this form will be used only by Elsevier and its affiliates worldwide to keep you up-to-date with our information security related products and services and will not be sold, rented or distributed to any non-affiliated third parties without prior permission. With your consent, your contact details may, from time to time, be used to communicate to you promotional and other information regarding our products and services.

Please check the boxes which apply if you do not wish to receive special offers and promotional material from us concerning Elsevier and affiliated IT Security related products and services:
Mail    Tel    Fax    E-mail   

Please check the boxes which apply if you do wish to receive special offers and promotional material concerning products and services from non-affiliated third parties:
Mail    Tel    Fax    E-mail   



Subscriber Login...
Email Address:
Subscription Number: