+91 9116117170

Author: Shouvik Dutta

What is Blockchain Technology?

By Shouvik Dutta 0 Comment May 12, 2021

Blockchain Technology is a hot topic in the tech world. Nobody really knows what the tech is or how it works – but everybody’s talking about it! In a nutshell, blockchain is a decentralized technology that’s been developed to make transactions more secure. First things first: you can’t talk about blockchain-based networks without mentioning Bitcoin. […]


What is IMSI-Catcher ?

By Shouvik Dutta 0 Comment May 10, 2021

An IMSI catcher is a cell phone surveillance device that acts as an improvised fake base station. With an IMSI catcher, law enforcement can impersonate a telecommunications company in order to track the location of a target mobile phone, monitor its calls and text messages, and intercept data traffic to gather information about the individual […]

What is Kubernetes ?

By Shouvik Dutta 0 Comment May 5, 2021

Talking about the Kubernetes then, it’s the best application for containers. What is Kubernetes? Kubernetes is an open-source application that’s been built by Google for the Spinnaker continuous delivery platform. It’s a container deployment system which enables easy management, scaling, and more for containerized applications across clusters of hosts. It’s a tool that makes your […]

cloud pentesting

Cloud Penetration Testing

By Shouvik Dutta 0 Comment April 27, 2021

What is Cloud Penetration Testing? Cloud Penetration Testing is an authorized simulated cyber-attack against a system that’s hosted on a Cloud platform, e.g. Amazon’s AWS or Microsoft’s Azure. The primary goal of a cloud penetration take a look at is to search out the weaknesses and strengths of a system, so its security posture are […]

Zero-Day Warning: Hacking iPhone Just by Sending Emails

By Shouvik Dutta 0 Comment April 23, 2020

The default mailing app pre-installed on countless iPhones and iPads has been found covered with flaws two vital flaws that attackers ar exploiting within the wild, at least, from the last 2 years to spy on high-profile victims. The fault may eventually allow remote hackers to secretly take control of Apple devices by sending an […]

error: Content is protected by Cyberops !!