CALL US

+91 9116117170

Author: Mohammed Tahir

Latest Phishing threat | Lateral Phishing Through emails

By Mohammed Tahir 0 Comment August 26, 2019

Nowadays attackers are getting more advanced and they are innovating new techniques to steal user’s personal data. Lateral Phishing is one of the most popular phishing attacks, in this particular attack hackers use compromised email accounts within an organization to target other users within the enterprise. According to the report of Barracuda, UC Berkeley, and […]

Hacker Can Capture Your Data Through Smartphones While you are working on your laptop

By Mohammed Tahir 0 Comment August 22, 2019

Having good features and functionality of a smartphone, it sounds good but sometimes it can be used as a weapon for hackers. Attackers can now silently steal your data and private information while you are typing on your laptop and this same attack can be easily executed while you are working with your device in […]

Email Spoofing

What is DKIM | How DKIM Works | Prevention From Email Spoofing

By Mohammed Tahir 0 Comment August 7, 2019

DKIM stands for DomainKeys Identified Mail is an email authentication technique that allows the receiver to check that an email was indeed sent and authorized by the owner of that domain or not. DKIM is an email security system that detects email spoofing and ensures the integrity of emails. A Digital signature is given to […]

Apple iOS 4 out of 5 Security flaws Disclosed, By Google Researchers

By Mohammed Tahir 0 Comment August 6, 2019

Google’s researchers have finally disclosed details and proof-of-concept exploits for security flaws in Apple iOS that impact the iOS operating system and can be exploited via the iMessage client. The vulnerabilities don’t require any user interaction to be exploited. All the flaws, Details about one of the “interactionless” vulnerabilities have been kept private because Apple’s […]

error: Content is protected by Cyberops !!