Tag: security
Starting Inspiratron talks podcast
For a while, I have been preparing for this step. This blog got it’s audio podcast show and it is called Inspiratron talks. First I will give some links and then talk about mission and vision of the podcast. Inspiratron talks is hosted at the moment on SoundCloud: At the…
Komentari na Zakon o informacionoj bezbednosti/Comments on Serbian law on information security
Srpska verzija Nedavno je u Skupštini republike Srbije usvojen Zakon o informacionoj bezbednosti. Tekst usvojenog zakona se može pronaći na sajtu parlamenta. Tokom leta je bila u toku javna rasprava o zakonu, tokom koje sam se i ja uključio sa mojim komentarima. Moji komentari se mogu videti niže u embedovanom…
Introduction to reverse engineering
1. Introduction Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. This involves taking some device, system or software and breaking it apart, analyze it and conclude how it works. When reverse engineer conclude how…
New version of OWASP Seraphimdroid (v2.0) is published
Dear users and security aware people, we have a great announcement. The new version of OWASP Seraphimdroid is published with some very interesting breakthrough features. If you liked OWASP Seraphimdroid before, now you will probably love it. We have improved machine learning aided permission scanner, new settings scanner, improved SMS…

Chasing script-kiddies and hackers on my blog
This morning, I was wondering over my admin dashboard and realized there are couple of guys (hackers or script-kiddies) trying to hack me. Well, to be hones guess my user name and password. So far, they were failing, but some of them were returning and trying every couple of hours,…
USSD Code List for Android Smartphone
Unstructured Supplementary Service Data (USSD) is a protocol used by GSM cellular telephones to communicate with the service provider’s computers. USSD can be used for WAP browsing, prepaid callback service, mobile-money services, location-based content services, menu-based information services, and as part of configuring the phone on the network. USSD messages…
Case of the cyber war: Kosovo conflict
Introduction Kosovo conflict was a conflict that started during the 1998 between FR Yugoslavia police and military forces and Albanian separatists in Kosovo. During the 1999. NATO launched air strike campaign against FR Yugoslavia. The air strikes lasted for 78 days, after which FR Yugoslavia agreed to withdraw forces out…
Introducing OWASP Seraphimdroid
About 2 months ago I started thinking about creating Android security application. I was looking where the other application are weak, since there are a lot of android device protection and anti malware application available on Google play. Thing I found that most of those application don’t use application permissions…
Introduction to Social engineering
Social engineering is one of the main security issues these days. Most of companies invest to infrastructure to be hardly hackable, but they don’t educate people. Social engineering is quite common attack since the begining of 1980′. And many big corporate networks were infiltrated using these attacks. And the only…

Gmail social engineering attack
This morning I recieved email that was signed as Gmail Team and that was saying: Re: Due to recent upgrade in our database, we are terminating all unverified accounts permanently. Reply and give the information below:Username,Password,Date of Birth,Phone&Country. Note! You have one week to comply. Gmail Inc. All rights reserved….
Story about OWASP Serbia
Finily I got some time to write about open source community in Serbia that I am leading. I hope it will help also a bit to make it more popular and also I hope it will give some advices to new OWASP chapter leaders or people who want to create…
Train with Game Over.iso
Today I have tried to set up GameOver.iso, one of many interesting live linux environement that is meant to be training tool for learning about web application security. I must admit that I like it, altrough I had a little problems and confusion in start. Actually it is linux live…