Cyber Security Group in South Eastern Europe

Recently we have heard and read about the importance of cybersecurity around the US and EU. Firstly Obama administration get order intended to bolster cybersecurity, where the move comes after the White House tried, and indeed failed to get tough cybersecurity legislation through Congresses last year. Secondly, EU released the …

more ...

Network Security Toolkit

Introduction

A toolkit is a collection of tools, where for our motives is an assembly of tools to eavesdropper and scan network security for the possible exploitations. Moreover, these tools are designed from security researchers and experts, for the purpose of network administrator and security analysts to be able in …

more ...

ICSAP – Interactive Cyber Security Awareness Program

Abstract

Currently, humans coupled with the socio-technical aspect can be either the strongest or the weakest link in any information security system, and the key in security lies in delivering awareness training through short and effective online videos, whereby the participator can gain knowledge on security. Our aim, therefore, is …

more ...


What is network security?

Introduction

A computer network, or in other words simply a network, is a collection of computers and other hardware components interconnected by communication channels that allow sharing of data, resources and information [1]. Adopt for both_ private or public needs, which are used in everyday tasks to conduct transactions and …

more ...

Analyses of Malware Files

PURPOSE

The main goal of laboratory report is to identify three analyses of malware files from the archive file send by the lecture. The archive contains 89 malware files. The way how we choice 3 files is by following algorithm:

  1. Soft them by name
  2. First use last number of your …
more ...

Company Brochure and Founder Notes, Cybersecurity.mk

COMPANY BROCHURE: Cybersecurity.mk

Your IT infrastructure could be taken under the shoulder of professionals

September 2012

Founder Notes:

Recently, Macedonian government has announced to open a CERT agency. This news was not only shock to us, but to everyone else, indeed. However, we are supporting this initiative and hope …

more ...

Identify Possible Infection of Malware Into the Wireshark Capture File

INTRODUCTION

The main goal of laboratory report is to identify possible infection of malware into the wireshark capture file. The report should highlight the following aspects:

  • Download [not avaibale anymore]

  • Find malware download in this pcap and extract malware or malwares find out where malware was downloaded from.

  • What malware …

more ...