+91 9116117170

Author: Shouvik Dutta

Zero-Day Warning: Hacking iPhone Just by Sending Emails

By Shouvik Dutta 0 Comment April 23, 2020

The default mailing app pre-installed on countless iPhones and iPads has been found covered with flaws two vital flaws that attackers ar exploiting within the wild, at least, from the last 2 years to spy on high-profile victims. The fault may eventually allow remote hackers to secretly take control of Apple devices by sending an […]

Google: Did you know that the Chrome tracker has no mysterious personal information?

By Shouvik Dutta 0 Comment March 17, 2020

In February, Arnaud Granal, a software developer working on a Chromium-based browser called Kiwi, searched for the head of X-client-data, which Chrome sent to Google when a Google web page was requested, representing a unique identifier that could be used to track people on the web across. As such, it may invade Europe’s privacy regulations. […]

BT Launches a New Cybersecurity Counselling Course

By Shouvik Dutta 0 Comment March 16, 2020

BT has launched a new Security Advisory Services system that will provide its customers with navigation advice on their cybersecurity journey. The unit led by Tris Morgan, who is the director of BT Security has made up 300 specialist professionals globally providing strategic safety guidance for organizations to help them deal with today’s major security […]

Cybersecurity Tools: How Much Is Fun?

By Shouvik Dutta 0 Comment March 16, 2020

Using too many cybersecurity tools can possibly reduce your organization’s security. A valid argument when we are using too many tools is that some tools may interfere with the rest of the tools. Antivirus package has been a classic example of this idea. If there is more than one antivirus in the same system then […]

Google Releases Tool to Block USB Keystroke

By Shouvik Dutta 0 Comment March 16, 2020

Google has released a tool devised to detect the USB keystroke injections and then be able to detect devices that sent them.  With easy-to-find keystroke injection tools, they are able to send keystrokes faster while not being the victim. Posted in USB, the keystroke injection attack requires a Personal Device Call. According to Linux systems, a […]

error: Content is protected by Cyberops !!