Category: InfoSec

Topics related to information security, cyber security, malware analysis, and pretty much anything related to computer security. We are quite involved in organizing OWASP chapter meetings and other security-related events. Analysis of security incidents and malware is quite a personal passion

Posted in Artificial intelligence InfoSec Leadership and management Natural language processing and text mining

Announcing new online courses

What is better way to share knowledge with wider audience then creating an online courses. For a while, I have been thinking about this idea and how to effectively share knowledge. Finally, I can announce that I am about to build a small online school with the set of low-cost/high-value…

Posted in Artificial intelligence InfoSec Leadership and management Science

Starting Inspiratron talks podcast

For a while, I have been preparing for this step. This blog got it’s audio podcast show and it is called Inspiratron talks. First I will give some links and then talk about mission and vision of the podcast. Inspiratron talks is hosted at the moment on SoundCloud: At the…

Posted in Artificial intelligence Hobbies InfoSec Natural language processing and text mining

The art of trolling and its connection to innovation

Recently I watched the following talk from DefCon named “The art of trolling”, which reminded me of my earlier days and stuff I did: Also, interestingly enough, I was on an event where we had a number of speakers (academics and policy makers) talking about innovation policy, innovation management and…

OWASP Seraphimdroid
Posted in InfoSec Natural language processing and text mining

Educational framework added to OWASP Seraphimdroid

OWASP Seraphimdroid is back after Google Summer of Code with a new version, this time, it will be 2.5 and some exciting changes, we thought that may help users protect their security and privacy. I would like to briefly write about our new features. The app is available on old good…

Posted in InfoSec Software Work

Introduction to reverse engineering

1. Introduction Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. This involves taking some device, system or software and breaking it apart, analyze it and conclude how it works. When reverse engineer conclude how…

OWASP Seraphimdroid
Posted in Artificial intelligence InfoSec Software

New version of OWASP Seraphimdroid (v2.0) is published

Dear users and security aware people, we have a great announcement. The new version of OWASP Seraphimdroid is published with some very interesting breakthrough features. If you liked OWASP Seraphimdroid before, now you will probably love it. We have improved machine learning aided permission scanner, new settings scanner, improved SMS…

Posted in InfoSec

The art of cyber war

This is the post about a lecture. Very interesting one, held on New York information security meetup by Carl Herberger, Vice President of Security Solutions at Radware. I found this talk quite interesing because he pointed out that in industry we are facing something we can call a war by its…

Posted in InfoSec

Chasing script-kiddies and hackers on my blog

This morning, I was wondering over my admin dashboard and realized there are couple of guys (hackers or script-kiddies) trying to hack me. Well, to be hones guess my user name and password. So far, they were failing, but some of them were returning and trying every couple of hours,…

Posted in InfoSec Software

USSD Code List for Android Smartphone

Unstructured Supplementary Service Data (USSD) is a protocol used by GSM cellular telephones to communicate with the service provider’s computers. USSD can be used for WAP browsing, prepaid callback service, mobile-money services, location-based content services, menu-based information services, and as part of configuring the phone on the network. USSD messages…

Posted in Hobbies InfoSec Leadership and management Software Tales from life Work

Hacker’s lament

But did you, in your three-piece psychology and 1950’s technobrain ever take a look behind the eyes of the Hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a Hacker, enter my world…. Mine is a world that begins…

Posted in InfoSec Software Tales from life Work

OWASP Seraphimdroid android security published

Follow my blog with Bloglovin Today I have to make one very important announcement. The first version of OWASP Serpahimdroid has been officially published. It is now publicly available in Google play store (https://play.google.com/store/apps/details?id=org.owasp.seraphimdroid). I would like to tell a bit of the background of this project and describe some…

Posted in InfoSec Software

Case of the cyber war: Kosovo conflict

Introduction Kosovo conflict was a conflict that started during the 1998 between FR Yugoslavia police and military forces and Albanian separatists in Kosovo. During the 1999. NATO launched air strike campaign against FR Yugoslavia. The air strikes lasted for 78 days, after which FR Yugoslavia agreed to withdraw forces out…