+91 9116117170

Category: Smart Devices

RFID attacks

New Generation Hacking: RFID Attacks

By Chandan Singh 0 Comment February 1, 2019

A little about RFID technology RFID (Radio Frequency IDentification) is an automatic identification technology in which data is read and written by radio signals. Data is stored in a so-called RFID tag. The RFID system consists of a reader and a tag.  RFID tags are classified by operating frequency, memory type, and power source. Readers are stationary and […]

Two-Step Verification on WhatsApp | Cyberops

How to enable Two-Step Verification on WhatsApp

By Prempal Singh 0 Comment December 8, 2018

WhatsApp Two-Step Verification – Two-step verification is an optional feature that adds more security to your account. When you have two-step verification enabled, any attempt to verify your phone number on WhatsApp must be accompanied by the six-digit PIN that you created using this feature. “To enable two-step verification on WhatsApp, Open WhatsApp > Settings […]

Discovered a new Smartphone Malware ‘HiddenMiner’

By Chandan Singh 0 Comment April 3, 2018

Discovered a new Smartphone Malware ‘HiddenMiner’ Researchers from the company Trend Micro found malware that could disable the smartphone due to continuous mining. This is reported in the official blog. A virus called HiddenMiner was discovered inside applications that were distributed through third-party stores. Malicious software deceives users, forcing them to give the program access […]

AI algorithm won one of the world’s best players in Dota 2

By Chandan Singh 0 Comment September 23, 2017

Chess and Go – this was only the beginning. Now the computer has won the most popular person in the discipline among the youth – in Dota 2. And not just anyone anyhow, and one of the best professional players in the world, the Ukrainian Daniel «Dendi» Ishutina. On the stage of the tournament The […]

Improving the quality of streaming video in slow networks – new method

By Chandan Singh 0 Comment September 23, 2017

Streaming video is one of the most popular tasks in mobile networks. Users are demanding of the quality of content, and the slightest stumble or artifact can spoil all the fun of watching the video. Network engineers are constantly working on new ways to maximize the quality of videos that could help even with the […]

error: Content is protected by Cyberops !!