+91 9116117170

Category: Articles

Email Spoofing

What is DKIM | How DKIM Works | Prevention From Email Spoofing

By Mohammed Tahir 0 Comment August 7, 2019

DKIM stands for DomainKeys Identified Mail is an email authentication technique that allows the receiver to check that an email was indeed sent and authorized by the owner of that domain or not. DKIM is an email security system that detects email spoofing and ensures the integrity of emails. A Digital signature is given to […]

Apple iOS 4 out of 5 Security flaws Disclosed, By Google Researchers

By Mohammed Tahir 0 Comment August 6, 2019

Google’s researchers have finally disclosed details and proof-of-concept exploits for security flaws in Apple iOS that impact the iOS operating system and can be exploited via the iMessage client. The vulnerabilities don’t require any user interaction to be exploited. All the flaws, Details about one of the “interactionless” vulnerabilities have been kept private because Apple’s […]


Warning!! Windows Defender can be Disabled by New Version of TrickBot Trojan

By Chaitra V M 0 Comment August 5, 2019

TrickBot is a particularly stealthy banking Trojan which has existed since 2016. Since then, it has been thought to have leaked at least 250 million email accounts in order to distribute malware payload. TrickBot is a banking Trojan that  continues its evolution of targeting software security in order to prevent its removal and  detection. TrickBot […]

Flaws In Contactless Visa Card, Hacker Can Bypass It’s Spending Limits

By Mohammed Tahir 0 Comment August 5, 2019

Researchers have discovered a technique for exploiting Visa card frauds. The contactless Visa card vulnerability can allow the attacker to bypass payment limit checks. that requires a user’s verification. The attackers can exploit the flaw via man-in-the-middle attacks to conduct large-scale fraud. As mentioned in a blog post, researchers of Positive Technologies, tested the exploit […]

error: Content is protected by Cyberops !!