+91 9116117170

Author: Chandan Singh

Artificial-Intelligence Image by

Artificial Intelligence Thinks Like a Criminal

By Chandan Singh 0 Comment February 1, 2019

The proliferation of artificial intelligence (AI) technology can lead to an increase in cybercrime and the emergence of its new forms, manipulation of public opinion and damage to the physical infrastructure over the next five years, according to the authors of the report “Criminal AI: prognosis, prevention and prevention”. The 100-page report was written by 26, […]

RFID attacks

New Generation Hacking: RFID Attacks

By Chandan Singh 0 Comment February 1, 2019

A little about RFID technology RFID (Radio Frequency IDentification) is an automatic identification technology in which data is read and written by radio signals. Data is stored in a so-called RFID tag. The RFID system consists of a reader and a tag.  RFID tags are classified by operating frequency, memory type, and power source. Readers are stationary and […]

what is botnet?

What is Botnet?

By Chandan Singh 0 Comment December 18, 2018

It is a network of computers that are infected with malware to gain control of the device in order to organize DDoS attacks, mining cryptocurrencies, or sending spam. Almost any device connected to the network, including routers, may be vulnerable to obtaining remote control without the knowledge of its owner.

What is DDoS?

By Chandan Singh 0 Comment December 18, 2018

Attackers are using DDoS-attacks (Distributed Denial of Service – The distributed denial of service ) for the decommissioning of sites, or entire networks by overloading their requests, send a large number of devices. The suppressed service becomes inaccessible to ordinary users.

What is Phishing?

By Chandan Singh 0 Comment December 18, 2018

Used by cybercriminals to obtain the necessary information. As a rule, by sending fake emails on behalf of familiar organizations or people who contain malicious links that download a virus to the device. Also, such links can lead to false sites and services that are outwardly indistinguishable from real ones, luring your data from you, […]

error: Content is protected by Cyberops !!