ISSUE 34 (June 2012)
Android malware
Issue 34 Contributors
Megan Bell
Director of Analysis at Kivu Consulting
Jaime Blasco
Head of labs at AlienVault
Robert Bloomquist
Principal Data Recovery Engineer for Kroll Ontrack
Marcus Carey
Security researcher at Rapid7
Jim Farley
Security Specialist at Adapt
Tim Keanini
CTO at nCircle
Robert Keeler
Data security consultant
Winston Krone
Managing Director of Kivu Consulting
David Logue
Lead Remote Data Recovery Engineer for Kroll Ontrack
Nick Owen
Co-founder and CEO of WiKID Systems

Android malware

PDF download
Read issue 34 now

Table of contents

  • Fitness as a model for security
  • Security and migrating to the cloud: Is it all doom and gloom?
  • Solid state drives: Forensic preservation issues
  • Introduction to Android malware analysis
  • Hack in The Box Conference 2012 Amsterdam
  • ISO 27001 standard: Breaking the documentation myth with Dejan Kosutic
  • Preparing a breach response plan
  • Security beyond the operating system: Into the cloud and beyond
  • Amphion Forum 2012 Munich
  • The challenges of data recovery from modern storage systems
  • Two-factor authentication for the cloud: Does it have to be hard?

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue