ISSUE 40 (December 2013)
Malware analysis
ISSUE 40
Issue 40 Contributors
Jaime Blasco
Director of AlienVault Labs
Zheng Bu
Senior Director of Security Research at FireEye
David Emm
Senior Regional Researcher, UK, Global Research & Analysis Team at Kaspersky Lab
Matt Erasmus
Information security professional
Joshua Frisby
Developer at AIM IT Services
Symphony Luo
Devel- oper and Mobile Threat Response Engineer at Trend Micro
Ulf T. Mattsson
CTO of Protegrity
Borja Merino
Security researcher
Paul Oliveria
Security Focus Lead at Trend Micro
Abhishek Singh
Senior Staff Research Scientist at FireEye
Sai Omkar Vashisht
Senior Security Research Engineer at FireEye

Malware analysis

PDF download
Read issue 40 now
Share

Table of contents

  • How malware became the cyber threat it is today
  • Testing anti-malware products
  • Shoulder surfing via audio frequencies for XBox Live passwords
  • How to write Yara rules to detect malware
  • Report: HITBSecConf2013 Malaysia
  • Using Tshark for malware detection
  • 5 questions for the head of a malware research team
  • Beyond apps, beyond Android: 2013 mobile threat trends
  • Malware analysis on a shoestring budget
  • Report: Virus Bulletin 2013
  • Digital ship pirates: Researchers crack vessel tracking system
  • Exploring the challenges of malware analysis
  • Evading file-based sandboxes
  • Report: RSA Conference Europe 2013
  • Data security to protect PCI data flow

(IN)SECURE Magazine archive More →

ISSUE 72(July, 2022 )
  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
go to issue
ISSUE 71.5(June, 2022 )

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

go to issue
ISSUE 71(March, 2022 )
  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
go to issue