CALL US

+91 9116117170

Blog

Risk Assessment Process - Cyberops

Information Security: Risk Assessment & Treatment

By Annu Choudhari 0 Comment September 7, 2019

Risk assessment (often called risk analysis) is perhaps the most difficult part of implementing ISO 27001, but at the same time, risk assessment (and its processing) is the most important step at the beginning of your information security project – it establishes the basis for information security in your company. The question is – why […]

Hurray! Google is expanding its Bug Bounty Program

By Dibya Nayani Senapati 0 Comment August 30, 2019

In the last few weeks, several instances of malware apps are being discovered on the google play store, they are facing a lot of problems so just a few hours ago they took a good step against all these problems. Actually, Google expanded its bug bounty program to increase the security of Android apps and […]

Latest Phishing Campaign Delivers Quasar RAT via Fake Resumes

By Dibya Nayani Senapati 0 Comment August 30, 2019

Phishing is the most common type of attack in the social engineering techniques. Most of the Attackers use emails, social media and SMS to trap the users for providing sensitive information or visit a malicious URL in order to compromise their privacy. A new phishing campaign was discovered by the Researchers of Confense which basically […]

ADB

What is ADB? ADB Latest Commands List

By Chandan Singh 0 Comment August 30, 2019

In this article, you will learn what is ADB? ADB Latest Command Lists, ADB (Android Debug Bridge) is, why users need it, and how to manage it using commands in the Android terminal. Well, let’s begin to study adb android commands. ADB (android debug bridge) is a debugging tool, detecting errors in applications, unlocking devices on Android […]

Malware Found in a widely popular App “CamScanner”

By Dibya Nayani Senapati 0 Comment August 29, 2019

Google play store is mostly considered as a safe haven for downloading any kind of software. But nowadays, nothing is 100% safe and most of the attackers are trying to generate new-new techniques to place their apps in Google Play. The malware was found on an application which is already present on Google Play and […]

error: Content is protected by Cyberops !!