ISSUE 17 (July 2008)
Reverse engineering
Issue 17 Contributors
Paul Asadoorian
Senior Network Security Engineer for OSHEAN
Praveen Dalal
Managing Partner of Perry4Law
James Dorrian
Assistant Vice President of Security with Fidelity National Information Services
Todd Feinman
CEO of Identity Finder
Sandro Gauci
Founder of EnableSecurity
Nigel Johnson
Vice President of Product Management and Business Development for Zix Corporation
Sam Masiello
MX Logic Threat Operations Center.
Bogdan Materna
Founder of VoIPshield
Marco M. Morana
Leader of the OWASP
Ulf T. Mattsson
CTO of Protegrity
Patrick McGregor
CEO and a founder of BitArmor
Russ McRee
Security analyst & researcher
Nancee Melby
Senior Product Manager for Shavlik Technologies
Alisa Shevchenko
Malware consultant
Michael Thumann
CSO and head of the ERNW Research
Tony UcedaVelez
Danny Quist
CEO and co-founder of Offensive Computing

Reverse engineering

PDF download
Read issue 17 now

Table of contents

  • Open redirect vulnerabilities: definition and prevention
  • The future of security is information-centric
  • Securing the enterprise data flow against advanced attacks
  • Bypassing and enhancing live behavioral protection
  • Security flaws identification and technical risk analysis through threat modeling
  • Migration from e-mail to web borne threats
  • Security training and awareness: strengthening your weakest link
  • Assessing risk in VoIP/UC networks
  • Building a secure wireless network for under $300
  • Reverse engineering software armoring
  • Point security solutions are not a 4 letter word
  • Hacking Second Life

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue