Stefan Ćertić

Stefan Ćertić
  • PhD
  • Research Director at Infosec with Experience

About

11
Publications
4,374
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6
Citations
Current institution
Infosec with Experience
Current position
  • Research Director
Additional affiliations
January 2008 - February 2017
Certic.info
Position
  • Research Director
July 2008 - July 2012
University of Belgrade
Position
  • Research Officer
Education
July 2006 - August 2010
University of Belgrade
Field of study
  • Software Engineering

Publications

Publications (11)
Article
Full-text available
Despite technology development, social engineering is still used in combination with advanced technologies to discover and prevent crimes. However, in wrong hands, it might be powerful tool to compromise your personal security. Especially today, when many hackers have access to SS7 network, with ability to execute GSM Map commands such as PSI (Prov...
Article
Full-text available
Are we secured with multiple layers of security? There is a huge initiative from industry leaders to double secure user accounts in order to regain access in case of lost password. That is perfectly fine. It helps recover credentials, but this study shows it opens a hole that might be one of the largest security and privacy threats. This research e...
Article
Full-text available
In order to improve efficiency, most countries employ so-called E-Services. They expedite a lot of work for citizens. However, processing sensitive data seems not to be secure enough. This paper cover paradox of transmitting sensitive Citizen informations directly against the local regulations due to a lack of law enforcement policies.
Article
Full-text available
Mobile devices are more than just phones, they are a lifeline to the outdoor world, entertainment platform, GPS system, a little black book and a shopping and banking tool. What is not well known is that these devices are also gateways. Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well th...
Book
Full-text available
For thousands of years we had knowledge to determinate earth orbit just based on the sun reflection. Still achieving a great failure to perceive idea of “what was before the beginning. Perceiving forever or nothing. No matter if you are supporter of Trans Humanism movement or not, there is a question to be asked. Are we, building an AI? Are we, who...
Research Proposal
Full-text available
Call for Chapters: “Security and Privacy Applications for Smart City Development”.
Research
Full-text available
Corporative giants of the internet, such as Google, Facebook, Various Banks have being using the two-factor authentication technique to ensure security to its users. Although, this companies don't make this kind operations by themselves, they hire third part companies to do so, integrating the API products for onwards delivery. Because of this, tec...
Article
Full-text available
Most of the major players in the industry today double secure the accounts of their users so that they can be able to regain access just in case they forget or lose the password. The move is perfect as it allows the user to recover his or her credentials. However, the study herein shows that double securing an account can be one of the most dangero...

Questions

Question (1)
Question
I have some unused resources to donate. Lot of Ram, processing power and bandwidth. If someone needs it for a project, feel free to contact me.