Blog Articles
Information Security and Technology Blog
No-Bull How to Become IT Information Security Consultant?
In: Information Security Consultant, IT Consultancy, Information ConsultingOn previous IEEE meetup in Belgrade, you asked how to become succesufull Information Security Consultant. I need to make a no-bull post that may help you - or not. But that's how we do. No compromise, No-Bull:)
How the initiative to make the internet secure gone wrong?
In: Security, Cybersec, Infosec, IT SecuritySSL was supposed to protect you, right? Let's see where do we stand 6 years upon Google initiative to make whole web secure.
Disk storage performance trick to achive almost speed of RAM using RAID 100 alike and 2 PERC Controllers..
In: Memory Management, OS Internals, ServersHow to make SWAP your friend? Straight to a point of running close to RAM memory speed.
Recent work discovers more than 15% of Surveillance cameras are vulnerable.
In: Surveillance, Security, IP CamerasRecent work discovers more than 15% of Surveillance cameras are vulnerable ...To a point of getting a root access.
Layer 7 inspection keeps us safe. As long as we are able to inspect.
In: SSL, Inspection, Re-encryption, Security, BYODHTTPS inspection, it’s something that become crucial in protecting mission critical infrastructures How do you handle such scenarios in corporate BYOD environment?
VPN Protection that really protects.
In: VPN, Bonding, IEEE 802.3ad, Link Aggregation, VPN SecurityWant a secure transmission? Here is a simple one. IPSEC, MultipleWan's and 802.3ad Link Aggregation
POS terminal PIN-based Scam is Getting Popular Again
In: Credit Card, Fraud, POS, Terminal, PINIf you need to enter your PIN twice, it could be a reason to check Twice. Maybe you are paying the value of your PIN :)
Applying Bayesian in Data Retention.
In: Data Retention, Security, Bayesian Theorem, PrivacyApplying Bayesian in Data Retention. When 100% is not as half of that.
Reverse Social Engineering in Today's CyberPunk Age.
In: Social Engineering, Security, Deep Learning, PrivacyReverse Social Engineering in Today's CyberPunk Age. This is getting tricky.
GridCoin, the future of cryptocurrency
In: Blockchain, Crypto, CryptocurrencyGridCoin is universal measure for processing power. It could easy become more expensive then bitcoin.
TensorFlow Powered Robotic Vacuum Cleaners
In: Robotics,AI, TensorFlow, Deep Learning, Neural NetworksWhat is like to run TensorFlow powered vacuum cleaner? Grab a project on GitHub and build your own..
Net Neutrality, what is the buzz about
In: Location, Exploit, Hack, Social EngineeringWhat's behind the storry of net neutrality. Who is fighthing who, and who is about to win and how.
Government domains SSL Policy Oversight
In: SSL, Exploit, Policy, LegalSerious security issue and missleading trust Proposal for open debate and policy updates.
Android IMAP password Hack.
In: Android 7.1, Mobile, Exploit, HackingDo you know that Android 7.1 and prior will expose your IMAP password to anyone who can get hand on your unlocked phone? Check the showcase that will keep you re-think about swipe unlock.
Install Android 7.1 on Samsung Note 3
In: Android 7.1, Mobile, Custom Rom, ModsTaste Android 7.1 on your old Samsung Note 3?? Download custom unofficial ROM from here and get the first impression without breaking your new S7 Edge.
Ongoing Industry-Wide Espionage
In: Security, Mobile Security, Cyber SecurityAre you really more secure with multiple layers of security? You have probably noticed high initiative from industry leaders to double-triple secure your account so you can regain access in case you lose password. That’s perfectly fine. It helps you recover if you lose your credentials, but does it have a downside?
How (M)Secure are You?
In: 2FA, Exploit, Social EngineeringPhone Call-based Authentication is vulnerable to Call Forwarding Exploit. According to a research conducted, modern technology is facing dramatic security concerns in the approaches of two-step verification, especially the phone call-based one. Results are pointing to a serious exploit. “Your calls may be forwarded at any time without your knowledge.”
Transhumanism for common people
In: Transhumanism, Philosophy, TechnologyEmpty streets, rainy day, hard time having anyone to pick up their phone and a message box: Would you like to upload your conscious. Yes, Remind me Tomorrow?