CALL US

+91 9116117170

Category: Articles

What is JSON Web Token(JWT)

By Vedant Jain 0 Comment May 24, 2021

Token-Based Authentication The token-based authentication systems allow users to enter their username and password in order to obtain a token which allows them to fetch a specific resource without entering their username and password at each request. JSON Web Token JWT is also know as JSON Web Token. JWT is a way to communicate between […]

New iPhone and Mac-book camera hack

By Devashish Soni 0 Comment April 4, 2020

If you are using iPhone, MacBook or Apple, here is a piece of alarming news for you Turns out that merely visiting a website — not just malicious one also the legitimate sites unknowingly loading malicious ads on them can give access to your device’s location, microphone, your camera, and in some cases, saved passwords […]

Rules of Bug Bounty

By Devashish Soni 0 Comment April 2, 2020

Targeting a Bug Bounty Program How long you target a program? “some hours or a night” if this is your answer Then That’s where you are doing everything wrong. Bug Hunting is Matter of Luck and Skill’s .Spending just a few hours on a program could be waste of time Because those bugs are mostly […]

Cyber Attack on Hospital amidst COVID-19

By Aneesh A S 0 Comment March 17, 2020

Last Friday , The University Hospital Brno in the city of Brno, Czech Republic was struck by a cyberattack. The Hospital is one of the 18 laboratories in the Czech Republic that is currently used for testing for COVID-19. The results for COVID-19 tests in the past couple of days, as a result of this […]

Google: Did you know that the Chrome tracker has no mysterious personal information?

By Shouvik Dutta 0 Comment March 17, 2020

In February, Arnaud Granal, a software developer working on a Chromium-based browser called Kiwi, searched for the head of X-client-data, which Chrome sent to Google when a Google web page was requested, representing a unique identifier that could be used to track people on the web across. As such, it may invade Europe’s privacy regulations. […]

error: Content is protected by Cyberops !!