ISSUE 40 (December 2013)
Malware analysis
ISSUE 40
Issue 40 Contributors
Jaime Blasco
Director of AlienVault Labs
Zheng Bu
Senior Director of Security Research at FireEye
David Emm
Senior Regional Researcher, UK, Global Research & Analysis Team at Kaspersky Lab
Matt Erasmus
Information security professional
Joshua Frisby
Developer at AIM IT Services
Symphony Luo
Devel- oper and Mobile Threat Response Engineer at Trend Micro
Ulf T. Mattsson
CTO of Protegrity
Borja Merino
Security researcher
Paul Oliveria
Security Focus Lead at Trend Micro
Abhishek Singh
Senior Staff Research Scientist at FireEye
Sai Omkar Vashisht
Senior Security Research Engineer at FireEye

Malware analysis

PDF download
Read issue 40 now
Share

Table of contents

  • How malware became the cyber threat it is today
  • Testing anti-malware products
  • Shoulder surfing via audio frequencies for XBox Live passwords
  • How to write Yara rules to detect malware
  • Report: HITBSecConf2013 Malaysia
  • Using Tshark for malware detection
  • 5 questions for the head of a malware research team
  • Beyond apps, beyond Android: 2013 mobile threat trends
  • Malware analysis on a shoestring budget
  • Report: Virus Bulletin 2013
  • Digital ship pirates: Researchers crack vessel tracking system
  • Exploring the challenges of malware analysis
  • Evading file-based sandboxes
  • Report: RSA Conference Europe 2013
  • Data security to protect PCI data flow

(IN)SECURE Magazine archive

ISSUE 66(June, 2020)

  • Let’s be realistic about our expectations of AI
  • Full-time bug hunting: Pros and cons of an emerging career
  • Crowdsourced pentesting is not without its issues
go to issue

ISSUE 65.5(March, 2020)

More than 36,000 attendees, 704 speakers and 658 exhibitors gathered at the Moscone Center in San Francisco to explore the Human Element in cybersecurity through hundreds of keynote presentations, track sessions, tutorials, seminars and special events.

go to issue

ISSUE 65(February, 2020)

  • A case for establishing a common weakness enumeration for hardware security
  • Things to keep in mind when raising capital for your cybersecurity venture
  • Hardware hacks: The next generation of cybercrime
  • go to issue