ISSUE 40 (December 2013)
Malware analysis
ISSUE 40
Issue 40 Contributors
Jaime Blasco
Director of AlienVault Labs
Zheng Bu
Senior Director of Security Research at FireEye
David Emm
Senior Regional Researcher, UK, Global Research & Analysis Team at Kaspersky Lab
Matt Erasmus
Information security professional
Joshua Frisby
Developer at AIM IT Services
Symphony Luo
Devel- oper and Mobile Threat Response Engineer at Trend Micro
Ulf T. Mattsson
CTO of Protegrity
Borja Merino
Security researcher
Paul Oliveria
Security Focus Lead at Trend Micro
Abhishek Singh
Senior Staff Research Scientist at FireEye
Sai Omkar Vashisht
Senior Security Research Engineer at FireEye

Malware analysis

PDF download
Read issue 40 now
Share

Table of contents

  • How malware became the cyber threat it is today
  • Testing anti-malware products
  • Shoulder surfing via audio frequencies for XBox Live passwords
  • How to write Yara rules to detect malware
  • Report: HITBSecConf2013 Malaysia
  • Using Tshark for malware detection
  • 5 questions for the head of a malware research team
  • Beyond apps, beyond Android: 2013 mobile threat trends
  • Malware analysis on a shoestring budget
  • Report: Virus Bulletin 2013
  • Digital ship pirates: Researchers crack vessel tracking system
  • Exploring the challenges of malware analysis
  • Evading file-based sandboxes
  • Report: RSA Conference Europe 2013
  • Data security to protect PCI data flow

(IN)SECURE Magazine archive

ISSUE 64(December, 2019)

  • Could audio warnings augment your ability to fight off cyberattacks?
  • Your supplier’s BEC problem is your BEC problem
  • Unmask cybercriminals through identity attribution
  • Want to build a SOC? Here is what you need to know beforehand
go to issue

ISSUE 63(September, 2019)

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare’s blind spot: Unmanaged IoT and medical devices
go to issue

ISSUE 62(June, 2019)

  • What’s your company’s risk exposure?
  • The modern threat landscape and expanding CISO challenges
  • Product showcase: Veriato Cerebral user & entity behavior analytics software
  • Building a modern data registry: Go beyond data classification
go to issue