Security consultant and researcher
Long experience in designing and implementation of security solutions, mainly oriented on web, mobile and embedded applications. Author of penetration testing tools, recognized by OWASP organization and BackTrack Linux distribution. Researching work includes discovery of vulnerabilities of numeral applications and services, and for these, author received public apreciations by Microsoft Company.
Particle Photon - IoT workshop
Particle's Internet of Things hardware development kit, the Photon, provides everything you need to build a connected product. Particle combines a powerful ARM Cortex M3 micro-controller with a Broadcom Wi-Fi chip in a tiny thumbnail-sized module called the PØ (P-zero).
Useful GDPR resources
The General Data Protection Regulation (GDPR) strengthens the right of individuals in the European Union (EU) to control their personal data and requires organizations to bolster their privacy and data protection measures.
Presentation: Bosch XDK Cross Domain Development Kit
I’m a programmable sensor device & a prototyping platform for any IoT use case you can imagine. Bosch IoT Permissions is a service for managing user accounts, authorization information, and multiple tenants for your application.
OWASP Risk Assessment Calculator
Discovering vulnerabilities is important, but being able to estimate the associated risk to the business is just as important. This Risk Rating Calculator is based on OWASP's Risk Rating Methodology.
Our major goal is to gather all the communities from the region and abroad so we can socialize, hack, play, learn, exchange knowledge and experience and of course, party together. BalCCon aims to become the center of the hacker community in the region as well as to provide an opportunity for all the people in this part of Europe to connect and to cooperate.
Makers @ Novi Sad - Session Opening 2017
The "Mejker" association represents a community of hardware and electronics enthusiasts. The community conveys its knowledge to others, promoting the work on various devices such as Arduino, Raspberry Pi and the many others popular platforms.
Phishing campaign takedown
Some photos from phishing campaign takedown. I have coordinated with providers and CERT-s.
Privacy Wars live from Serbia
Some funny photos about privacy in Serbia.
Red Flag Fraud Game
One example of Red Flag Fraud game combined with Maltego.
Dodaci za bezbedno surfovanje Internetom
Ovde se nalazi spisak dodataka koji će Vam pomoći da bezbednije istražujete Internet.
LEAD WITH IMPACT
Some photos and IoT tips from NIST @ Risk Conference, Lasko, Slovenia, year 2016
False sense of security
Collection of funny and interesting photos from everywere ...
YU3MA DIY Forum gathering @ KG 2014
Some pictures of DIY projects from forum members gathering. Kragujevac, 2014
Nigerijska prevara uživo u Srbiji
Primer "nigerijske" prevare u Srbiji.
Black Hat SEO
Black SEO tehnike su u većini slučajeva validne tehnike iskorišćene na zlonameran način. Zbog takvih tehnika na kraju najviše ispaštaju posetioci ovakvih portala jer ostaju uskraćeni za udobnost prilikom pretrage informacija, kao i sam naručilac implementacije Black SEO tehnika jer efekat ovih kampanja ima veoma kratak pozitivan vek a veoma duge negativne posledice.
First OWASP Serbia meeting
First OWASP Serbia meeting was held on April 9th 2012. My colleagues and me help around organisation.
Belgrade, Serbia, year 2012