Advanced by Yury S Chemerkin
Conf by Yury S Chemerkin
Security Compliance Challenges On Clouds, 2013
Article by Yury Chemerkin published in Cyber Times International Journal of Technology & Manageme... more Article by Yury Chemerkin published in Cyber Times International Journal of Technology & Management in 2013. Discusses security and compliance issues for cloud computing, focusing on Amazon Web Services.
This paper proposes a new security research covers BlackBerry issues relating their own features ... more This paper proposes a new security research covers BlackBerry issues relating their own features relied on highest possible way of integration and aggregation with data, service and application that simplifies management. Such way integration shapes developer's outlook as well as malware writer's outlook led to the bypass security methods. Despite of that, BlackBerry is full of holes to the brim if consumer has a flexible IT Policy even because current security techniques implemented in BIS (BlackBerry Internet Service) or BES (BlackBerry Enterprise Server) are indecisive argument to be sure in security and privacy and do not provide enough controls. As opposite to smartphone, the tablets (PlayBook) are quite new, QNX-based and have the most known technologies, such Adobe Air, HTML5, and Android Dalvik-Runtime, are implemented widely. However, they have a poor application environment and a little those feature known on non-QNX BlackBerry device. This makes security more difficult and unstable to reliably use it by end-users. Research shows that additional third party security solutions often ruin security while native environment allows intercepting, blocking, stealing, misleading, substitute data in real-time bypassing security controls that, finally, reveal sensitive information and turn security solutions to the malware agents.
Since a web-technology has arisen and clouds has come, every application wants to be online and o... more Since a web-technology has arisen and clouds has come, every application wants to be online and operates with sensitive data that cannot but attract anyone to get an access this data. It means an urgent need in security. Examining the clouds leads us to different visions of security controls and metrics per each cloud vendor while industrial organizations try to help to the vendors and their customers with an appropriate security level. They offer a transparency of security controls that belong to different vendors against the best security practices.
SECURITY COMPLIANCE CHALLENGES ON CLOUDS, 2013
Article by Yury Chemerkin published in Cyber Times International Journal of Technology & Manageme... more Article by Yury Chemerkin published in Cyber Times International Journal of Technology & Management in 2013. Discusses security and compliance issues for cloud computing, focusing on Amazon Web Services.
Tech by Yury S Chemerkin
INSECURITY OF BLACKBERRY SOLUTIONS: VULNERABILITY ON THE EDGE OF THE TECHNOLOGIES, Jan 1, 2012
The starting point of security systems has been declared several decades ago. The essence raise k... more The starting point of security systems has been declared several decades ago. The essence raise knowledge questions how it works and how it will attack. Simpler, any kind of security system should keep project documentation, data flows, policy rules and other documents that covers almost all points we need to answer to the embarrassing questions. Whereupon decision-making are welcome and coming...
New security paradigms raised by Cloud Solutions as a vital necessity to renew cloud management strategies., Mar 1, 2012
Technological expansion set backward cling to the previous technology vision because of superfici... more Technological expansion set backward cling to the previous technology vision because of superficial knowledge of current IT nature. This way leads to inability to data resource management on the one hand, while the failure is result of hazy unreasonable redesign on other hand. Groundlessness usually crowns the final stage.
Юрий Чемёркин представитель Hakin9 Magazine, исследователь ЗАО "ПМ" Основной подход к изолировани... more Юрий Чемёркин представитель Hakin9 Magazine, исследователь ЗАО "ПМ" Основной подход к изолированию устройстваиспользование встроенного механизма, известного как режим "в самолете", и для большинства телефонов использование
A Security System That Changed The World, Feb 1, 2011
Enterprise data is a valuable corporate asset, and therefore ensuring it’s over integrity is an i... more Enterprise data is a valuable corporate asset, and therefore ensuring it’s over integrity is an issue of superior business cycle model to any commercial or government organization.
Is Data Secure on the Password Protected Blackberry Device?, Feb 1, 2011
People who have ever heard of password utility think the usage of it can protect their private da... more People who have ever heard of password utility think the usage of it can protect their private data. There are, however, several ways to steal a lot of information in spite of the fact that device locked by password. These ideas are not complicated to first-time malware developer.
The Backroom Message That’s Stolen Your Deal, Apr 1, 2011
Do you want to learn more about bigwig? Is someone keeping secrets from you? Need to silently rec... more Do you want to learn more about bigwig? Is someone keeping secrets from you? Need to silently record text messages, GPS locations and call info of your child or employee? Catch everybody at whatever you like with our unique service.
Why Is Password Protection a Fallacy - a Point of View?, Jun 15, 2011
"MAKE your password strong, with a unique jumble of letters, numbers and punctuation marks. But m... more "MAKE your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it – never write it down. And, oh yes, change it every few months. These instructions are supposed to protect us. But they don’t.
"
Does your BlackBerry smartphone have ears?, Jul 1, 2011
This saying may come from a story about Dionysius of Syracuse (430-367 BC), who had an ear-shaped... more This saying may come from a story about Dionysius of Syracuse (430-367 BC), who had an ear-shaped cave cut that connected the rooms of his palace so that he could hear what was being said from another room. Similar listening posts were installed in other palaces over the centuries, including the Louvre in Paris.
To Get Round To The Heart Of Fortress, Aug 15, 2011
Cybercrime is becoming a growing threat to society. The thefts of information, crashing a website... more Cybercrime is becoming a growing threat to society. The thefts of information, crashing a website or manipulating online payment traffic are also increasing. Many organizations offer various services in the battle against digital crime, such as network or data monitors and extractions tools. It is interesting mainly to authorities and financial institutions, but they are accessible to every organization
When Developer's API Simplify User-Mode Rootkits Developing, Feb 8, 2012
This is a series of articles about shell extensions that enhance high-level features of any opera... more This is a series of articles about shell extensions that enhance high-level features of any operation system. However, such possibilities not only enrich platform but simplify developing trojans, exploits that leads to the new security holes. Mostly this kind of extensions are known as usermode rootkits.
Social network privacy guide, Apr 1, 2012
This series of articles about security trips how to make social networking is more secure on the ... more This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook
Comparison of Android and BlackBerry Forensic Techniques, Apr 16, 2012
As digital data is omnipresent now, the digital forensics has quickly become a legal necessity. M... more As digital data is omnipresent now, the digital forensics has quickly become a legal necessity. Mobile devices have quickly grown and extend their own features which simplifying makes them less unique. Developers API, SDK, NDK provide great opportunity to build live, DLP or spyware for data extracting.
Social network privacy guide, May 21, 2012
This series of articles about security trips how to make social networking is more secure on the ... more This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook
Uploads
Advanced by Yury S Chemerkin
Conf by Yury S Chemerkin
Tech by Yury S Chemerkin
"
"