CALL US

+91 9116117170

Author: Chandan Singh

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Chandan Singh 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment, the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical knowledge. What is VAPT? Vulnerability Assessment and […]

Artificial-Intelligence Image by Cyberops.in

Artificial Intelligence Thinks Like a Criminal

By Chandan Singh 0 Comment February 1, 2019

The proliferation of artificial intelligence (AI) technology can lead to an increase in cybercrime and the emergence of its new forms, manipulation of public opinion and damage to the physical infrastructure over the next five years, according to the authors of the report “Criminal AI: prognosis, prevention and prevention”. The 100-page report was written by 26, […]

RFID attacks

New Generation Hacking: RFID Attacks

By Chandan Singh 0 Comment February 1, 2019

A little about RFID technology RFID (Radio Frequency IDentification) is an automatic identification technology in which data is read and written by radio signals. Data is stored in a so-called RFID tag. The RFID system consists of a reader and a tag.  RFID tags are classified by operating frequency, memory type, and power source. Readers are stationary and […]

what is botnet? Cyberops.in

What is Botnet?

By Chandan Singh 0 Comment December 18, 2018

It is a network of computers that are infected with malware to gain control of the device in order to organize DDoS attacks, mining cryptocurrencies, or sending spam. Almost any device connected to the network, including routers, may be vulnerable to obtaining remote control without the knowledge of its owner.

What is DDoS?

By Chandan Singh 0 Comment December 18, 2018

Attackers are using DDoS-attacks (Distributed Denial of Service – The distributed denial of service ) for the decommissioning of sites, or entire networks by overloading their requests, send a large number of devices. The suppressed service becomes inaccessible to ordinary users.

error: Content is protected by Cyberops !!