CALL US

+91 8219776763

Month: January 2018

The Most Common Forms of Cybercrime | Giving Old Tech a new Life

By Prempal Singh 0 Comment January 27, 2018

The Most Common Forms of Cybercrime | Giving Old Tech a new Life – Cybercriminal is any criminal activity, where the object as a target and/or tool is a computer or network device. Cybercriminal is any criminal activity, where the object as a target and/or tool is a computer or network device.In some cybercrimes, direct […]

How to Scan a Large Network with NMAP Project

By Prempal Singh 0 Comment January 27, 2018

How to Scan a Large Network with NMAP Project – If the range of external IP addresses is about 10 thousand units or less, nmap copes well with its work in the case of all the above needs.However, in large companies that own hundreds of thousands of IP addresses, the task of determining “live” hosts […]

Hacking IoT manufacturers and smart cars through APN (Access Point Network)

By Prempal Singh 0 Comment January 25, 2018

To connect to any cellular APN service, the device must have the following information: access point name, user name and password.This scheme works in the case of SIM-cards purchased from intermediaries. Before we go directly to the topic of the article, we will clarify the notion of APN: APN (Access Point Name), access to which […]

Creator of Satori uses Vulnerability in D-Link to organize a new Botnet

By Prempal Singh 0 Comment January 25, 2018

Creator of Satori uses Vulnerability in D-Link to organize a new Botnet – The researchers found two new variants of Mirai – Masuta and PureMasuta. The malware developer Satori (also known as Mirai Okiru) and the creator of the eponymous botnet once again set to work, this time attacking the D-Link routers with the goal […]

The Programmer Developed a Self-Exploding “Flash Drive”

By Prempal Singh 0 Comment January 25, 2018

The Programmer Developed a Self-Exploding “Flash Drive” – The programmer, under the pseudonym MG, designed a self-destroying “USB flash drive” from a normal USB drive with the possibility of installing malicious code on the victim’s computer. In his blog MG described in detail the process of creating a device. USB-drive was modified with the ATtiny […]

error: Content is protected by Cyberops !!