
Stefan Ćertić- PhD
- Research Director at Infosec with Experience
Stefan Ćertić
- PhD
- Research Director at Infosec with Experience
About
11
Publications
4,374
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6
Citations
Introduction
System Analyst, Cyber Terrorist, Business Man, Family Man, Professional Beer Drinker.
Current institution
Infosec with Experience
Current position
- Research Director
Additional affiliations
January 2008 - February 2017
Certic.info
Position
- Research Director
July 2008 - July 2012
Education
July 2006 - August 2010
Publications
Publications (11)
Despite technology development, social engineering is still used in combination with advanced technologies to discover and prevent crimes. However, in wrong hands, it might be powerful tool to compromise your personal security. Especially today, when many hackers have access to SS7 network, with ability to execute GSM Map commands such as PSI (Prov...
Are we secured with multiple layers of security? There is a huge initiative from industry leaders to double secure user accounts in order to regain access in case of lost password. That is perfectly fine. It helps recover credentials, but this study shows it opens a hole that might be one of the largest security and privacy threats. This research e...
In order to improve efficiency, most countries employ so-called E-Services. They expedite a lot of work for citizens. However, processing sensitive data seems not to be secure enough. This paper cover paradox of transmitting sensitive Citizen informations directly against the local regulations due to a lack of law enforcement policies.
Mobile devices are more than just phones, they are a lifeline to the outdoor
world, entertainment platform, GPS system, a little black book and a shopping
and banking tool. What is not well known is that these devices are also
gateways. Mobile devices can be used by a hacker as an access point into many
other aspects of your digital life as well th...
For thousands of years we had knowledge to determinate earth orbit just based on the sun reflection. Still achieving a great failure to perceive idea of “what was before the beginning. Perceiving forever or nothing. No matter if you are supporter of Trans Humanism movement or not, there is a question to be asked.
Are we, building an AI?
Are we, who...
Call for Chapters: “Security and Privacy Applications for Smart City Development”.
Corporative giants of the internet, such as Google, Facebook, Various Banks have being using the two-factor authentication technique to ensure security to its users. Although, this companies don't make this kind operations by themselves, they hire third part companies to do so, integrating the API products for onwards delivery. Because of this, tec...
Most of the major players in the industry today double secure the accounts of their users so that they can be able to regain access just in case they forget or lose the password. The move is perfect as it allows the user to recover his or her credentials. However, the study herein shows that double securing an account can be one of the most dangero...
Questions
Question (1)
I have some unused resources to donate. Lot of Ram, processing power and bandwidth. If someone needs it for a project, feel free to contact me.