ISSUE 21 (June 2009)
Windows 7 security
Issue 21 Contributors
Ed Adams
President and CEO of Security Innovation
Jack Danahy
Founder and CTO of Ounce Labs
Srini Devadas
Founder and CTO of Verayo
Tom Eston
Penetration tester
Rob Faber
Information security consultant for Atos Origin
Mervyn Heng
Security lead for a hardware manufacturer
Vlatko Kosturjak
Security specialist
Sam Masiello
VP of Information Security at MX Logic
Ulf T. Mattsson
CTO of Protegrity
Ned Moran
Adjunct Professor of Information Privacy and Security at Georgetown University
Daniel Oppermann
Political scientist
Gideon T. Rasmussen
Security Vice President
David Rook
Security Analyst for Realex Payments
Chris Sanders
Network consultant
Didier Stevens
IT Security Consultant at Contraste Europe NV

Windows 7 security

PDF download
Read issue 21 now

Table of contents

  • Malicious PDF: Get owned without opening
  • Review: IronKey Personal
  • Windows 7 security features: Building on Vista
  • Using Wireshark to capture and analyze wireless traffic
  • “Unclonable” RFID – a technical overview
  • Secure development principles
  • Q&A: Ron Gula on Nessus and Tenable Network Security
  • Establish your social media presence with security in mind
  • A historical perspective on the cybersecurity dilemma
  • A risk-based, cost effective approach to holistic security

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue