ISSUE 20 (March 2009)
Mac OS X (in)security
ISSUE 20
Issue 20 Contributors
Pekka Andelin
Malware Researcher at Lavasoft
Ofir Arkin
Co-founder and CTO of Insightix and Sys-Security Group
Paul Clements
Lead software architect at SteelEye Technology, Inc.
Yarochkin Fyodor
Graduate student at the National Taiwan University
Rick Leclerc
VP Technology Partnerships at Bradford Networks
Alexei Lesnykh
Business Development Manager at DeviceLock
Gary Palgon
Vice President of Product Management for nuBridges
Vimal Patel
Founder of Blueinfy
Kevin Riggins
Senior Information Security Analyst for Principal Financial Group
Darran Rolls
CTO of SailPoint Technologie
Aaron D. Sanders
Organization Information Security Manager for Xerox Global Services
Shreeraj Shah
Founder and director of Blueinf,
Didier Stevens
IT Security Consultant

Mac OS X (in)security

PDF download
Read issue 20 now
Share

Table of contents

  • Improving network discovery mechanisms
  • Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus
  • What you need to know about tokenization
  • Q&A: Vincenzo Iozzo on Mac OS X security
  • A framework for quantitative privacy measurement
  • Why fail? Secure your virtual assets
  • Phased deployment of Network Access Control
  • Web 2.0 case studies: challenges, approaches and vulnerabilities
  • ISP level malware filtering
  • Q&A: Scott Henderson on the Chinese underground

(IN)SECURE Magazine archive

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue

    ISSUE 64(December, 2019)

    • Could audio warnings augment your ability to fight off cyberattacks?
    • Your supplier’s BEC problem is your BEC problem
    • Unmask cybercriminals through identity attribution
    • Want to build a SOC? Here is what you need to know beforehand
    go to issue