ISSUE 40

ISSUE 40 (December, 2013)

Malware analysis

Issue 40 Contributors

Jaime Blasco
Director of AlienVault Labs
Zheng Bu
Senior Director of Security Research at FireEye
David Emm
Senior Regional Researcher, UK, Global Research & Analysis Team at Kaspersky Lab
Matt Erasmus
Information security professional
Joshua Frisby
Developer at AIM IT Services
Symphony Luo
Devel- oper and Mobile Threat Response Engineer at Trend Micro
Ulf T. Mattsson
CTO of Protegrity
Borja Merino
Security researcher
Paul Oliveria
Security Focus Lead at Trend Micro
Abhishek Singh
Senior Staff Research Scientist at FireEye
Sai Omkar Vashisht
Senior Security Research Engineer at FireEye

Table of contents

  • How malware became the cyber threat it is today
  • Testing anti-malware products
  • Shoulder surfing via audio frequencies for XBox Live passwords
  • How to write Yara rules to detect malware
  • Report: HITBSecConf2013 Malaysia
  • Using Tshark for malware detection
  • 5 questions for the head of a malware research team
  • Beyond apps, beyond Android: 2013 mobile threat trends
  • Malware analysis on a shoestring budget
  • Report: Virus Bulletin 2013
  • Digital ship pirates: Researchers crack vessel tracking system
  • Exploring the challenges of malware analysis
  • Evading file-based sandboxes
  • Report: RSA Conference Europe 2013
  • Data security to protect PCI data flow

(IN)SECURE Magazine archive

show all