ISSUE 15 (February 2008)
Malware
ISSUE 15
Issue 15 Contributors
Sam Abbott-McCune
Anthony Arrott
Special assistant to the CTO at Trend Micro
Gregory Conti
Director of the Information and Technology and Operations research center and Assistant Professor of Computer Science at the United States Military Academy at West Point.
Rob P. Faber
infrastructure architect, consultant and senior engineer
Paul Sheldon Foote
Professor of Accounting at California State University, Fullerton.
Mark Harris
Global Director of SophosLabs.
Reena Hora
Student pursuing her Masters in Information Technology from California State University, Fullerton
Rick Lawhorn
Director of Information Security & Compliance at PlanIT Technology Group
A.J. Newtson
Instructor, teaching Theory and Practice of Military Information Technology Sys- tems, at the United States Military Academy at West Point
Ulf T. Mattsson
CTO of Protegrity
George Moore
Senior threat researcher at Trend Micro
Mike Murray
Director of Neohapsis product testing lab
Robert Ross
Information Technology Instructor at the United States Military Academy at West Point
Dan Sarel
Director at Sentrigo
Didier Stevens
IT Security Consultant
Inaki Urzay
Chief Technology Officer of Panda Security
David Walling
Chief Technology Officer for nuBridges
Ralph Ware
Course Director and Instructor, teaching Information Technology, at the United States Military Academy at West Point.
Ben Whaley
Applied Trust Engineering

Malware

PDF download
Read issue 15 now
Share

Table of contents

  • Proactive analysis of malware genes holds the key to network security
  • Advanced social engineering and human exploitation
  • Free visualization tools for security analysis and network monitoring
  • Internet terrorist: does such a thing really exist?
  • Weaknesses and protection of your wireless network
  • Fraud mitigation and biometrics following Sarbanes-Oxley
  • Application security matters: deploying enterprise software securely
  • The insider threat: hype vs. reality
  • How B2B gateways affect corporate information security
  • Reputation attacks, a little known Internet threat
  • Data protection and identity management
  • The good, the bad and the ugly of protecting data in a retail environment
  • Malware experts speak: F-Secure, Sophos, Trend Micro

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue