Information Security and Technology Blog
No-Bull How to Become IT Information Security Consultant?In: Information Security Consultant, IT Consultancy, Information Consulting
On previous IEEE meetup in Belgrade, you asked how to become succesufull Information Security Consultant. I need to make a no-bull post that may help you - or not. But that's how we do. No compromise, No-Bull:)
How the initiative to make the internet secure gone wrong?In: Security, Cybersec, Infosec, IT Security
SSL was supposed to protect you, right? Let's see where do we stand 6 years upon Google initiative to make whole web secure.
Disk storage performance trick to achive almost speed of RAM using RAID 100 alike and 2 PERC Controllers..In: Memory Management, OS Internals, Servers
How to make SWAP your friend? Straight to a point of running close to RAM memory speed.
Recent work discovers more than 15% of Surveillance cameras are vulnerable.In: Surveillance, Security, IP Cameras
Recent work discovers more than 15% of Surveillance cameras are vulnerable ...To a point of getting a root access.
Layer 7 inspection keeps us safe. As long as we are able to inspect.In: SSL, Inspection, Re-encryption, Security, BYOD
HTTPS inspection, it’s something that become crucial in protecting mission critical infrastructures How do you handle such scenarios in corporate BYOD environment?
VPN Protection that really protects.In: VPN, Bonding, IEEE 802.3ad, Link Aggregation, VPN Security
Want a secure transmission? Here is a simple one. IPSEC, MultipleWan's and 802.3ad Link Aggregation
POS terminal PIN-based Scam is Getting Popular AgainIn: Credit Card, Fraud, POS, Terminal, PIN
If you need to enter your PIN twice, it could be a reason to check Twice. Maybe you are paying the value of your PIN :)
Applying Bayesian in Data Retention.In: Data Retention, Security, Bayesian Theorem, Privacy
Applying Bayesian in Data Retention. When 100% is not as half of that.
Reverse Social Engineering in Today's CyberPunk Age.In: Social Engineering, Security, Deep Learning, Privacy
Reverse Social Engineering in Today's CyberPunk Age. This is getting tricky.
GridCoin, the future of cryptocurrencyIn: Blockchain, Crypto, Cryptocurrency
GridCoin is universal measure for processing power. It could easy become more expensive then bitcoin.
TensorFlow Powered Robotic Vacuum CleanersIn: Robotics,AI, TensorFlow, Deep Learning, Neural Networks
What is like to run TensorFlow powered vacuum cleaner? Grab a project on GitHub and build your own..
Net Neutrality, what is the buzz aboutIn: Location, Exploit, Hack, Social Engineering
What's behind the storry of net neutrality. Who is fighthing who, and who is about to win and how.
Government domains SSL Policy OversightIn: SSL, Exploit, Policy, Legal
Serious security issue and missleading trust Proposal for open debate and policy updates.
Serbian e-service wide open to man-in-the-middle attacks.In: SSL, Exploit, Hacking, Politics
Serbian Goverment decides to protect most sensitive citizen informations by US SSL Issuers. Moreover, those who are not even registered at the theritory of Serbia.
Android IMAP password Hack.In: Android 7.1, Mobile, Exploit, Hacking
Do you know that Android 7.1 and prior will expose your IMAP password to anyone who can get hand on your unlocked phone? Check the showcase that will keep you re-think about swipe unlock.
Install Android 7.1 on Samsung Note 3In: Android 7.1, Mobile, Custom Rom, Mods
Taste Android 7.1 on your old Samsung Note 3?? Download custom unofficial ROM from here and get the first impression without breaking your new S7 Edge.
Ongoing Industry-Wide EspionageIn: Security, Mobile Security, Cyber Security
Are you really more secure with multiple layers of security? You have probably noticed high initiative from industry leaders to double-triple secure your account so you can regain access in case you lose password. That’s perfectly fine. It helps you recover if you lose your credentials, but does it have a downside?
How (M)Secure are You?In: 2FA, Exploit, Social Engineering
Phone Call-based Authentication is vulnerable to Call Forwarding Exploit. According to a research conducted, modern technology is facing dramatic security concerns in the approaches of two-step verification, especially the phone call-based one. Results are pointing to a serious exploit. “Your calls may be forwarded at any time without your knowledge.”