CALL US

+91 9116117170

Category: Articles

New iPhone and Mac-book camera hack

By Devashish Soni 0 Comment April 4, 2020

If you are using iPhone, MacBook or Apple, here is a piece of alarming news for you Turns out that merely visiting a website — not just malicious one also the legitimate sites unknowingly loading malicious ads on them can give access to your device’s location, microphone, your camera, and in some cases, saved passwords […]

Rules of Bug Bounty

By Devashish Soni 0 Comment April 2, 2020

Targeting a Bug Bounty Program How long you target a program? “some hours or a night” if this is your answer Then That’s where you are doing everything wrong. Bug Hunting is Matter of Luck and Skill’s .Spending just a few hours on a program could be waste of time Because those bugs are mostly […]

Cyber Attack on Hospital amidst COVID-19

By Aneesh A S 0 Comment March 17, 2020

Last Friday , The University Hospital Brno in the city of Brno, Czech Republic was struck by a cyberattack. The Hospital is one of the 18 laboratories in the Czech Republic that is currently used for testing for COVID-19. The results for COVID-19 tests in the past couple of days, as a result of this […]

Google: Did you know that the Chrome tracker has no mysterious personal information?

By Shouvik Dutta 0 Comment March 17, 2020

In February, Arnaud Granal, a software developer working on a Chromium-based browser called Kiwi, searched for the head of X-client-data, which Chrome sent to Google when a Google web page was requested, representing a unique identifier that could be used to track people on the web across. As such, it may invade Europe’s privacy regulations. […]

Cybersecurity Tools: How Much Is Fun?

By Shouvik Dutta 0 Comment March 16, 2020

Using too many cybersecurity tools can possibly reduce your organization’s security. A valid argument when we are using too many tools is that some tools may interfere with the rest of the tools. Antivirus package has been a classic example of this idea. If there is more than one antivirus in the same system then […]

error: Content is protected by Cyberops !!