Beer & Code #40: Drupal - winner in CMS security race

Take a look at my understanding for a Drupal security approach. Drinking beer and giving presentation why Drupal for me is a winner when it comes in CMS (Content Management System) security.

I have used WordPress for several years, however soon as I got introduced to Drupal from my earlier …

more ...

Workshop: Cyber Security and Privacy

Dark Moto Studio hosted me to deliver a two days workshop in the field of Cyber Security and Privacy, between 12 - 13 of December 2015 in Verona, Italy.

verona Workshop: Cyber Security and Privacy

Agenda

Day 1:

What is cyber security and how the hackers think (4 hours)

  1. Introduction to cyber security and privacy
  2. Attacking phases …
more ...

Cyber Culture by Franco "Bifo" Berardi - Belgrade

Early December usually in Belgrade is cold and freezing, however this time it was not so cold and frankly speaking don't know is it because the city was crowded with police forces in every corner due to the 22nd OSCE Ministerial Summit, or it was just a good luck. Additionally …

more ...

Secrets for eavesdropping - respublica.edu.mk

In September I have joined the academic team for writing a blog about public interest topics and actual situation in Macedonia - ResPublica. My particular role is writing about policy and security concerns in IT and activists point of view.

Anyhow, for October release I've published an blog about the wiretapping …

more ...


Research Paper: Macedonian Path Towards Cybersecurity

Abstract

Information and communication technologies in Macedonia have experienced a phenomenal growth throughout the last decades, which has had a tremendous impact on governmental services’ presence in the Internet, as well as on everyday life. Against this background, technologies-based growth introduces new risks and threats to the cyber domain in …

more ...

Penetration Testing vs. Vulnerability Assessment

Introduction

In the past few days, months and indeed years many people have approached me and asked me a very simple question… But bare in mind that this simple question was and indeed it is a still a big dilemma between many professionals in IT security, cyber security, management, decision-makers …

more ...



Network Security Toolkit

Introduction

A toolkit is a collection of tools, where for our motives is an assembly of tools to eavesdropper and scan network security for the possible exploitations. Moreover, these tools are designed from security researchers and experts, for the purpose of network administrator and security analysts to be able in …

more ...


Analyses of Malware Files

PURPOSE

The main goal of laboratory report is to identify three analyses of malware files from the archive file send by the lecture. The archive contains 89 malware files. The way how we choice 3 files is by following algorithm:

  1. Soft them by name
  2. First use last number of your …
more ...

Company Brochure and Founder Notes, Cybersecurity.mk

COMPANY BROCHURE: Cybersecurity.mk

Your IT infrastructure could be taken under the shoulder of professionals

September 2012

Founder Notes:

Recently, Macedonian government has announced to open a CERT agency. This news was not only shock to us, but to everyone else, indeed. However, we are supporting this initiative and hope …

more ...

What is wireless network security?

Introduction

The first wireless telecommunications was established in early 20th century, within successful transmitted radio signal across Atlantic Ocean. And it was known as the first wireless communication across the ocean. However, in this time likewise the computers were not widespread, the inventors and developers of wireless have not had …

more ...