CALL US

+91 9116117170

Author: Chandan Singh

Netcat

What is Netcat? All NetCat Commands

By Chandan Singh 0 Comment April 18, 2019

Netcat utility is often called “Swiss Army Knife”, in the good sense of the word. The netcat functionality is useful to the same extent that the versatility and handiness of the reputable pocket Swiss Army Knife is useful. Some of its features include port scanning, file transfer, port listening, and it can be used as […]

Social Engineering

Social Engineering: how not to fall for the scam?

By Chandan Singh 0 Comment April 4, 2019

In nature, there are two of the most powerful motivators for all human actions – this is fear and curiosity. Each of them can lead to illogical and stupid acts that do not always turn out to be something good. Ekaterina Rudaya, an expert at the Jet Infosystems security analysis lab , tells how human emotions play on the […]

Facebook + Email

Facebook began to request a password from the e-mail from new users

By Chandan Singh 0 Comment April 4, 2019

“Hey, Facebook, asking for a password from personal mail for verification or any other purposes is a HORRIBLE idea from the point of view of information security. You so entice passwords that you should not know! “ Facebook asked e-sushi for a password from the email to confirm the address.Despite the fact that the social network […]

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Chandan Singh 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment, the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical knowledge. What is VAPT? Vulnerability Assessment and […]

Artificial-Intelligence Image by Cyberops.in

Artificial Intelligence Thinks Like a Criminal

By Chandan Singh 0 Comment February 1, 2019

The proliferation of artificial intelligence (AI) technology can lead to an increase in cybercrime and the emergence of its new forms, manipulation of public opinion and damage to the physical infrastructure over the next five years, according to the authors of the report “Criminal AI: prognosis, prevention and prevention”. The 100-page report was written by 26, […]

error: Content is protected by Cyberops !!