ISSUE 34 (June 2012)
Android malware
ISSUE 34
Issue 34 Contributors
Megan Bell
Director of Analysis at Kivu Consulting
Jaime Blasco
Head of labs at AlienVault
Robert Bloomquist
Principal Data Recovery Engineer for Kroll Ontrack
Marcus Carey
Security researcher at Rapid7
Jim Farley
Security Specialist at Adapt
Tim Keanini
CTO at nCircle
Robert Keeler
Data security consultant
Winston Krone
Managing Director of Kivu Consulting
David Logue
Lead Remote Data Recovery Engineer for Kroll Ontrack
Nick Owen
Co-founder and CEO of WiKID Systems

Android malware

PDF download
Read issue 34 now
Share

Table of contents

  • Fitness as a model for security
  • Security and migrating to the cloud: Is it all doom and gloom?
  • Solid state drives: Forensic preservation issues
  • Introduction to Android malware analysis
  • Hack in The Box Conference 2012 Amsterdam
  • ISO 27001 standard: Breaking the documentation myth with Dejan Kosutic
  • Preparing a breach response plan
  • Security beyond the operating system: Into the cloud and beyond
  • Amphion Forum 2012 Munich
  • The challenges of data recovery from modern storage systems
  • Two-factor authentication for the cloud: Does it have to be hard?

(IN)SECURE Magazine archive

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue

ISSUE 61.5(March, 2019)

RSA Conference, the world’s leading information security conferences and expositions, concluded its 28th annual event in San Francisco.

go to issue