ISSUE 34 (June 2012)
Android malware
ISSUE 34
Issue 34 Contributors
Megan Bell
Director of Analysis at Kivu Consulting
Jaime Blasco
Head of labs at AlienVault
Robert Bloomquist
Principal Data Recovery Engineer for Kroll Ontrack
Marcus Carey
Security researcher at Rapid7
Jim Farley
Security Specialist at Adapt
Tim Keanini
CTO at nCircle
Robert Keeler
Data security consultant
Winston Krone
Managing Director of Kivu Consulting
David Logue
Lead Remote Data Recovery Engineer for Kroll Ontrack
Nick Owen
Co-founder and CEO of WiKID Systems

Android malware

PDF download
Read issue 34 now
Share

Table of contents

  • Fitness as a model for security
  • Security and migrating to the cloud: Is it all doom and gloom?
  • Solid state drives: Forensic preservation issues
  • Introduction to Android malware analysis
  • Hack in The Box Conference 2012 Amsterdam
  • ISO 27001 standard: Breaking the documentation myth with Dejan Kosutic
  • Preparing a breach response plan
  • Security beyond the operating system: Into the cloud and beyond
  • Amphion Forum 2012 Munich
  • The challenges of data recovery from modern storage systems
  • Two-factor authentication for the cloud: Does it have to be hard?

(IN)SECURE Magazine archive

ISSUE 69(July, 2021)

  • Why threat hunting is obsolete without context
  • Defending against Windows RDP attacks
  • Navigating the waters of maritime cybersecurity
go to issue

ISSUE 68(March, 2021)

  • Physical cyber threats: What do criminals leave when they break in?
  • Review: Group-IB Fraud Hunting Platform
  • Tips for boosting the “Sec” part of DevSecOps
go to issue

ISSUE 67(November, 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
go to issue