ISSUE 34 (June 2012)
Android malware
ISSUE 34
Issue 34 Contributors
Megan Bell
Director of Analysis at Kivu Consulting
Jaime Blasco
Head of labs at AlienVault
Robert Bloomquist
Principal Data Recovery Engineer for Kroll Ontrack
Marcus Carey
Security researcher at Rapid7
Jim Farley
Security Specialist at Adapt
Tim Keanini
CTO at nCircle
Robert Keeler
Data security consultant
Winston Krone
Managing Director of Kivu Consulting
David Logue
Lead Remote Data Recovery Engineer for Kroll Ontrack
Nick Owen
Co-founder and CEO of WiKID Systems

Android malware

PDF download
Read issue 34 now
Share

Table of contents

  • Fitness as a model for security
  • Security and migrating to the cloud: Is it all doom and gloom?
  • Solid state drives: Forensic preservation issues
  • Introduction to Android malware analysis
  • Hack in The Box Conference 2012 Amsterdam
  • ISO 27001 standard: Breaking the documentation myth with Dejan Kosutic
  • Preparing a breach response plan
  • Security beyond the operating system: Into the cloud and beyond
  • Amphion Forum 2012 Munich
  • The challenges of data recovery from modern storage systems
  • Two-factor authentication for the cloud: Does it have to be hard?

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue