CALL US

+91 9116117170

Author: Mohammed Tahir

Flaws In Contactless Visa Card, Hacker Can Bypass It’s Spending Limits

By Mohammed Tahir 0 Comment August 5, 2019

Researchers have discovered a technique for exploiting Visa card frauds. The contactless Visa card vulnerability can allow the attacker to bypass payment limit checks. that requires a user’s verification. The attackers can exploit the flaw via man-in-the-middle attacks to conduct large-scale fraud. As mentioned in a blog post, researchers of Positive Technologies, tested the exploit […]

Vulnerability Of LibreOffice Can Hack Your System, Just By Opening a Document In LibreOffice

By Mohammed Tahir 0 Comment August 3, 2019

If you are using LibreOffice, “Be extra careful”. By opening a document file in LibreOffice, can hack your system. That’s because LibreOffice comprises an extreme unpatched code execution vulnerability that would execute malware into your system as swiftly as you open a maliciously formed doc file. LibreOffice is one the most usable and open source […]

OXID eShop

eCommerce Sites Exposed Due To New Vulnerability found on ‘OXID eShop’ Software

By Mohammed Tahir 0 Comment August 2, 2019

An e-commerce website with  OXID eShop platform can be compromised because of some critical flaws, to prevent your e-commerce site immediately you need to update it. As we know OXID eShop is one of the top e-commerce shop software solutions from Germany whose enterprise edition is being used by industry superiors including Mercedes, BitBurger, and […]

Spearphone Cyber Attack

Latest Attack on Android Known As “Spearphone Attack”

By Mohammed Tahir 0 Comment August 1, 2019

“Spearphone Attack ” The New Attack, Lets Android Apps Capture Loudspeaker Data Without Any Privileges  Research revealing how more than 1300 Android apps are collecting sensitive data even when users have explicitly denied the required permissions. Primarily observed by the researcher that how developers abuse multiple procedures around to collect location data, phone identifiers, and […]

AI in Cyber Security

Role of AI in Cyber Security

By Mohammed Tahir 0 Comment August 1, 2019

Artificial Intelligence  The technology of computer system is able to accomplish tasks usually need of human intelligence, such as visual perception, acknowledgment, decision-making, and translation between languages or in other words artificial decision-making similar to the human for the same, based on certain unique algorithms and related mathematical calculations known as Artificial Intelligence (AI). Cyber […]

error: Content is protected by Cyberops !!