Personal Information
Organization / Workplace
Moscow, Russia Russian Federation
Occupation
Information Security Researcher
Industry
Electronics / Computer Hardware
Website
re.vu/yury.chemerkin
About
I’m experienced in Reverse Engineering, Programming, Cyber & Mobile Security Researching, Documentation, Cloud Security, Security Writing.
Tags
yury chemerkin
hakin9
hakin9 magazine
blackberry
malware
misleading
private data
groteck business media
social network privacy
rootkit
hakin9 ondemand
hakin9 bible
Информационная безопаснос
hakin9 extra
facebook
interview
when developer's api simplify user-mode rootkits d
forensic
password
does your blackberry smartphone have ears?
dead forensics
mobile
mobile forensics
live forensics
cloud
amazon web services
aws
compliance
security
pentest
playbook
hakin9 ebook
forensics
twitter
hakin9 mobile
when developers api simplify user mode rootkits de
user mode rootkit
groteck
comparison of android and blackberry forensic tech
android
interview with yury chemerkin
hakin9 magazine hakin9 blackberry
to get round to the heart of fortress
password-stealer
password stealer
email
sms
is data secure on the password protected blackberr
screen-stealer
screen stealer
bes
bis
why is password protection a fallacy - a point of
the backroom message thats stolen your deal
a security system that changed the world
publications
publication
See more
Presentations
(20)Documents
(43)Likes
(30)Attacking XML Security
Yusuf Motiwala
•
16 years ago
OPSEC for hackers
grugq
•
11 years ago
BYOD с точки зрения ИБ. Подводные и надводные камни внедрения
Aleksey Lukatskiy
•
11 years ago
10 Tips for Making Beautiful Slideshow Presentations by www.visuali.se
Edahn Small
•
12 years ago
Visualize your Twitter network
Verkostoanatomia
•
12 years ago
“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really?
Positive Hack Days
•
11 years ago
Безопасность без антивирусов 4
Positive Hack Days
•
11 years ago
Безопасность без антивирусов 3
Positive Hack Days
•
11 years ago
Безопасность без антивирусов 1
Positive Hack Days
•
11 years ago
HIJACKING ATTACKS ON ANDROID DEVICES
Positive Hack Days
•
11 years ago
Manish Chasta - Android forensics
Positive Hack Days
•
11 years ago
Manish Chasta - Securing Android Applications
Positive Hack Days
•
11 years ago
Бизнес-модель и речь в лифте
Андрей Кухаренко
•
12 years ago
Overview of Amazon Web Services
Amazon Web Services
•
11 years ago
4 сценария внедрения BYOD на предприятии
Aleksey Lukatskiy
•
11 years ago
Demo: Introduction to AWS, Cambridge
Amazon Web Services
•
11 years ago
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
Amazon Web Services
•
11 years ago
Outsmarting smartphones
SensePost
•
12 years ago
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Alert Logic
•
12 years ago
Worldwide security requirements
Aleksey Lukatskiy
•
12 years ago
Архитектура сети без границ
Cisco Russia
•
12 years ago
Mobility and cloud security
Aleksey Lukatskiy
•
12 years ago
Crypto regulations in Russia
Aleksey Lukatskiy
•
12 years ago
Mobile phone cultures
sman 2 mataram
•
12 years ago
Face recognition tech1
Ankit Gupta
•
12 years ago
Threat Modeling (Part 5)
Aleksey Lukatskiy
•
14 years ago
Threat Modeling (Part 4)
Aleksey Lukatskiy
•
14 years ago
Threat Modeling (Part 3)
Aleksey Lukatskiy
•
14 years ago
Threat Modeling (Part 2)
Aleksey Lukatskiy
•
14 years ago
Threat Modeling (Part 1)
Aleksey Lukatskiy
•
14 years ago
Personal Information
Organization / Workplace
Moscow, Russia Russian Federation
Occupation
Information Security Researcher
Industry
Electronics / Computer Hardware
Website
re.vu/yury.chemerkin
About
I’m experienced in Reverse Engineering, Programming, Cyber & Mobile Security Researching, Documentation, Cloud Security, Security Writing.
Tags
yury chemerkin
hakin9
hakin9 magazine
blackberry
malware
misleading
private data
groteck business media
social network privacy
rootkit
hakin9 ondemand
hakin9 bible
Информационная безопаснос
hakin9 extra
facebook
interview
when developer's api simplify user-mode rootkits d
forensic
password
does your blackberry smartphone have ears?
dead forensics
mobile
mobile forensics
live forensics
cloud
amazon web services
aws
compliance
security
pentest
playbook
hakin9 ebook
forensics
twitter
hakin9 mobile
when developers api simplify user mode rootkits de
user mode rootkit
groteck
comparison of android and blackberry forensic tech
android
interview with yury chemerkin
hakin9 magazine hakin9 blackberry
to get round to the heart of fortress
password-stealer
password stealer
email
sms
is data secure on the password protected blackberr
screen-stealer
screen stealer
bes
bis
why is password protection a fallacy - a point of
the backroom message thats stolen your deal
a security system that changed the world
publications
publication
See more