infosec

OWASP Seraphimdroid
0

New version of OWASP Seraphimdroid (v2.0) is published

Dear users and security aware people, we have a great announcement. The new version of OWASP Seraphimdroid is published with some very interesting breakthrough features. If you liked OWASP Seraphimdroid before, now you will probably love it. We have improved machine learning aided permission scanner, new settings scanner, improved SMS interceptor, improved application locker, and […]

1

Chasing script-kiddies and hackers on my blog

This morning, I was wondering over my admin dashboard and realized there are couple of guys (hackers or script-kiddies) trying to hack me. Well, to be hones guess my user name and password. So far, they were failing, but some of them were returning and trying every couple of hours, when my blocking mechanism release […]

1

Case of the cyber war: Kosovo conflict

Introduction Kosovo conflict was a conflict that started during the 1998 between FR Yugoslavia police and military forces and Albanian separatists in Kosovo. During the 1999. NATO launched air strike campaign against FR Yugoslavia. The air strikes lasted for 78 days, after which FR Yugoslavia agreed to withdraw forces out of Kosovo. This was the […]

0

Introducing OWASP Seraphimdroid

About 2 months ago I started thinking about creating Android security application. I was looking where the other application are weak, since there are a lot of android device protection and anti malware application available on Google play. Thing I found that most of those application don’t use application permissions as indicator that some other […]

Social engineering head
0

Introduction to Social engineering

Social engineering is one of the main security issues these days. Most of companies invest to infrastructure to be hardly hackable, but they don’t educate people. Social engineering is quite common attack since the begining of 1980′. And many big corporate networks were infiltrated using these attacks. And the only way to prevent them is […]

social engineering
0

Gmail social engineering attack

This morning I recieved email that was signed as Gmail Team and that was saying: Re: Due to recent upgrade in our database, we are terminatin​g all unverified accounts permanentl​y. Reply and give the informatio​n below:User​name,Passw​ord,Date of Birth,Phon​e&Country. Note! You have one week to comply. Gmail Inc. All rights reserved. Email address it was sent […]

mobile app threat agents
0

Notes on history of mobile malware

Mobile malware came not so long ago as PC malware. Mobile malware is almost 20 years younger, but today since almost everyone has mobile device it evolved to quite dangerous tools for attackers. Also mobile manifacturers were doing their job, creating sandbox environement in mobile operating systems, so users can be quite secure. Sandboxes helped […]