CALL US

+91 9116117170

Blog

Zero-Day Warning: Hacking iPhone Just by Sending Emails

By Shouvik Dutta 0 Comment April 23, 2020

The default mailing app pre-installed on countless iPhones and iPads has been found covered with flaws two vital flaws that attackers ar exploiting within the wild, at least, from the last 2 years to spy on high-profile victims. The fault may eventually allow remote hackers to secretly take control of Apple devices by sending an […]

New iPhone and Mac-book camera hack

By Devashish Soni 0 Comment April 4, 2020

If you are using iPhone, MacBook or Apple, here is a piece of alarming news for you Turns out that merely visiting a website — not just malicious one also the legitimate sites unknowingly loading malicious ads on them can give access to your device’s location, microphone, your camera, and in some cases, saved passwords […]

Potential Flaw in Zoom Lets Attackers Steal Windows Login Credentials

By Yash Kudal 0 Comment April 3, 2020

Zoom has been there for nine years, but the urgent need for an easy-to-use video application during coronavirus violence has made it a beloved tool for millions of people. Although Zoom is an effective solution for online video conferencing, it is not the best choice for privacy and security. The Windows Zoom Client is vulnerable […]

Rules of Bug Bounty

By Devashish Soni 0 Comment April 2, 2020

Targeting a Bug Bounty Program How long you target a program? “some hours or a night” if this is your answer Then That’s where you are doing everything wrong. Bug Hunting is Matter of Luck and Skill’s .Spending just a few hours on a program could be waste of time Because those bugs are mostly […]

Android Applications in Google Play Store Capitalize on Coronavirus Breakout

By Yash Kudal 0 Comment March 27, 2020

The continuing coronavirus breakout is becoming an opportunity for attackers to introduce variety of  malware attacks, phishing, and build scam sites and malicious tracker applications. Now in a new trend, third-party Android app developers have started using this scenario to use coronavirus-related keywords in their application names, descriptions, or package names and to insert a […]

error: Content is protected by Cyberops !!