Vision of security in Canonical products

Being online affects a new way of living where we are non-stop connected and share our data. After all, the devices and the Internet that we connect to are not designed to be secure and to be privacy driven by default. That said, the end user is not aware, concerned …

more ...

Beer & Code #40: Drupal - winner in CMS security race

Take a look at my understanding for a Drupal security approach. Drinking beer and giving presentation why Drupal for me is a winner when it comes in CMS (Content Management System) security.

I have used WordPress for several years, however soon as I got introduced to Drupal from my earlier …

more ...

Workshop: Cyber Security and Privacy

Dark Moto Studio hosted me to deliver a two days workshop in the field of Cyber Security and Privacy, between 12 - 13 of December 2015 in Verona, Italy.

Agenda

Day 1:

What is cyber security and how the hackers think (4 hours)

  1. Introduction to cyber security and privacy
  2. Attacking phases …
more ...

Cyber Culture by Franco "Bifo" Berardi - Belgrade

Early December usually in Belgrade is cold and freezing, however this time it was not so cold and frankly speaking don't know is it because the city was crowded with police forces in every corner due to the 22nd OSCE Ministerial Summit, or it was just a good luck. Additionally …

more ...

Secrets for eavesdropping - respublica.edu.mk

In September I have joined the academic team for writing a blog about public interest topics and actual situation in Macedonia - ResPublica. My particular role is writing about policy and security concerns in IT and activists point of view.

Anyhow, for October release I've published an blog about the wiretapping …

more ...


Research Paper: Macedonian Path Towards Cybersecurity

Abstract

Information and communication technologies in Macedonia have experienced a phenomenal growth throughout the last decades, which has had a tremendous impact on governmental services’ presence in the Internet, as well as on everyday life. Against this background, technologies-based growth introduces new risks and threats to the cyber domain in …

more ...

Penetration Testing vs. Vulnerability Assessment

Introduction

In the past few days, months and indeed years many people have approached me and asked me a very simple question… But bare in mind that this simple question was and indeed it is a still a big dilemma between many professionals in IT security, cyber security, management, decision-makers …

more ...