CALL US

+91 8219776763

Category: Android

How to setup and use Google Authenticator App in your Mobile

By Prempal Singh 0 Comment December 6, 2018

Many of you have heard about such a thing as two-factor (two-step) authentication and even use it, so in this tutorial you can learn that how to setup and use Google Authenticator App in your mobile. Since it helps to significantly increase the security of your accounts and makes it difficult for attackers to access […]

Horror Stories in Social Networks: What is MOMO?

By Prempal Singh 1 Comment August 24, 2018

MOMO- You correspond with friends in WhatsApp, you do not touch anyone, but here you write This. It tells about his death and sends terrible pictures. Why, why, who is this, after all? For a couple of weeks, a terrible account frightens users in Whatsapp. An unknown number called “Momo” appears in the contact lists and sends scary text and […]

“The Game kills Children”: Psychologists told how to protect the Child from the Demon Momo

By Prempal Singh 1 Comment August 23, 2018

Because of their age, children begin to treat threats seriously, not realizing that Internet demons are always a toy and have no power over them. The fact is that the demon Momo could do literally horrifying things, being able to communicate with people in a variety of languages. In fact, cyberdemon began to be perceived […]

Application of OWASP Mobile TOP 10 Methodology for Testing Android Applications

By Prempal Singh 0 Comment August 17, 2018

According to survey about OWASP Mobile TOP 10 Vulnerabilities, of the top 30 applications with more than 500,000 installations, 94% contain at least three medium-risk vulnerabilities, and 77% contain at least two high-risk vulnerabilities. Out of 30 applications, 17% were vulnerable to MITM (Men-In-The-Middle) attacks, exposing all data to interception by intruders. In addition, 44% of […]

Cybersecurity: The five main lessons for all

By Prempal Singh 0 Comment May 21, 2018

Recently we had an opportunity – quite fun and interesting – to attend a series of conferences devoted to information security and cyber security. These conferences were filled with relatively “new” developments, such as NextGen, Internet of things (IoT), DdoS attacks on IoT devices, security intelligence platform, etc. The fact that some of these terms caused “hype” […]

error: Content is protected by Cyberops !!