CALL US

+91 8219776763

Category: Cyber Threats

Apple’s iPhone Malicious Message Conduct to Hack, Who committed the Attack?

By Prempal Singh 0 Comment August 31, 2016

A critical security attack on iPhone has created worry from all walks of life. With a simple malicious message, cyber criminal could saved private information on the phone, such as victim’s messages, images, emails and GPS location. And establish on the latest survey, even media picked up from the phone camera and turn on mic feature. This […]

What is SQL Injection?

By Prempal Singh 0 Comment August 22, 2016

Introduction of SQL SQL stands for Structured Query Language. It is used to exchange information with Database like create/update/delete. Standard Language for Relational Database Management System according to ANSI (American National Standards Institute). Used to perform task with database like create/delete/update/rename database and tables. In a database data is stored in table (Rows and Columns) form. Introduction […]

What is Cross Site Scripting (XSS)?

By Prempal Singh 0 Comment August 20, 2016

About Cross Site Scripting (XSS) It’s a very common vulnerability found in Web Applications, ‘XSS’ allows the attacker to insert malicious code, generally there are many types of XSS attacks, I will mention 3 widely used XSS that allows an attacker to inject some malicious code into the applications damaged as a way to bypass access to the […]

Cars can be hacked with just $60 kit : [CANard]

By Prempal Singh 0 Comment August 6, 2016

Hello again..!!! Isn’t this topic seems like fiction ? 😛  Naah… it’s exactly what it is. 🙂 Cars or any other vehicles can be hacked by using just a $60 kit. Well first let me make something clear that its not about all cars/vehicles. This type of attacks can be performed only on CAN enabled […]

How to identify fake online shopping website

By Prempal Singh 0 Comment July 21, 2016

How to identify fake shopping website If you want to buy something online, you generally search for cheap clothes, or cheap shoes, but that is not always the easiest method to find a trusted and genuine shopping website. Many fraud websites are located on the top pages on Google search engine when you search for […]

error: Content is protected by Cyberops !!