CALL US

+91 9116117170

Category: Network & Security

CIA Triad - Cyberops

What is CIA Triad of Information Security?

By Annu Choudhari 0 Comment June 11, 2019

Modern hackers are able to hack absolutely everything, from airplanes, cars, sensor equipment and ending with locks with TSA function, voting booths and medical devices. The overall picture is even worse. Former director of the National Security Agency, Mike McConnell, suspects that China has cracked “all major corporations” of the United States. Edward Snowden found […]

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Chandan Singh 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment, the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical knowledge. What is VAPT? Vulnerability Assessment and […]

Penetration Testing - Cyberops

What is Penetration Testing?

By Chandan Singh 0 Comment May 18, 2018

Penetration testing is one of the methods to identify areas of the system that are vulnerable to intrusion and compromise integrity and reliability from unauthorized and malicious users or entities. The penetration testing process includes deliberate authorized attacks on the system, able to identify both its weakest areas and security gaps from third-party intrusions, and […]

Discovered a new Smartphone Malware ‘HiddenMiner’

By Chandan Singh 0 Comment April 3, 2018

Discovered a new Smartphone Malware ‘HiddenMiner’ Researchers from the company Trend Micro found malware that could disable the smartphone due to continuous mining. This is reported in the official blog. A virus called HiddenMiner was discovered inside applications that were distributed through third-party stores. Malicious software deceives users, forcing them to give the program access […]

British Police has Learned to Instantly Crack Smartphones

By Chandan Singh 0 Comment April 3, 2018

Law enforcement officers of Great Britain received hacking tools for hacking mobile phones and capturing all the information stored on them. This is reported in the report of public organization Privacy International. Not only the suspects but even the victims of crimes and their alleged witnesses can become objects of unilateral surveillance. Law enforcement officials […]

error: Content is protected by Cyberops !!