CALL US

+91 8219776763

Month: August 2016

3 Zero-Day exploits patches by Apple after activist is hacked

By Prempal Singh 1 Comment August 26, 2016

Apple has rolled out a patch for three recently unknown zero-day exploits that were used to focus on the iPhone 6 of Ahmed Mansoor, an award-winning individual human rights activist located in the United Arab Emirates. Security company Lookout and internet watchdog group Citizen Laboratory investigated the attack on Mansoor’s iPhone and located it to […]

Free VPN for Android and iOS without data limits – Opera VPN

By Prempal Singh 0 Comment August 24, 2016

If you are aware of security threats and concerned about your privacy then you must use Virtual Private Networks (VPN). Well, you might be not aware about VPN and in that case i would like to recommend you reading about Virtual Private Networks. Although free VPN service are available on internet but mostly VPN service […]

Bangladesh Government to sue US Federal Reserve Bank over $130m hack

By Karnveer Singh 0 Comment August 24, 2016

The administration of Bangladesh is thinking about legal action against the Federal Reserve Bank of New York after $130 million was stolen from its records, with some it obviously being laundered through gambling clubs in The Philippines. A portion of the cash, about $26.5m, was moved through records in Sri Lanka and this cash has […]

What is SQL Injection?

By Prempal Singh 0 Comment August 22, 2016

Introduction of SQL SQL stands for Structured Query Language. It is used to exchange information with Database like create/update/delete. Standard Language for Relational Database Management System according to ANSI (American National Standards Institute). Used to perform task with database like create/delete/update/rename database and tables. In a database data is stored in table (Rows and Columns) form. Introduction […]

What is Cross Site Scripting (XSS)?

By Prempal Singh 0 Comment August 20, 2016

About Cross Site Scripting (XSS) It’s a very common vulnerability found in Web Applications, ‘XSS’ allows the attacker to insert malicious code, generally there are many types of XSS attacks, I will mention 3 widely used XSS that allows an attacker to inject some malicious code into the applications damaged as a way to bypass access to the […]

error: Content is protected by Cyberops !!