CALL US

+91 8219776763

Category: Vulnerabilities

SQL Injection

Owasp Top 10: A1: Injection Vulnerability (Impact & Mitigation)

By Prempal Singh 0 Comment July 9, 2019

What is an Injection ? An injection is a type of attack which usually occurs when an attacker sends some suspicious data as part of a query or command into the input fields of any website. By this attacker can lead to data theft, data loss, or accessing data without any authorization. Different Types of […]

New OWASP

Owasp Top 10:A2: Broken Authentication (Impact and Mitigation)

By Prempal Singh 0 Comment July 9, 2019

Owasp Top 10: Broken Authentication (Impact and Mitigation) What is Broken Authentication ? Broken Authentication is a vulnerability, it usually found when the web application gives you unauthorized access to the web application. It may be User authentication credentials Or session IDs and so on. Authentication and session management having all aspects of handling user […]

IOT Image Cyberops

The Internet of Things(IoT):Standard Security Solution

By Prempal Singh 0 Comment July 4, 2019

Cybersecurity is one of the main problems in the Internet of Things. Although progress is palpable, in the field of IoT protection, there are still a lot of problems still unsolved. The ISO standards group is engaged in adapting the ISO 27000 security standards to the use of the Internet of Things industry. At the […]

OWASP - Cyberops

What is OWASP? Top 10 Vulnerabilities?

By Prempal Singh 0 Comment June 11, 2019

The modern world carries thousands of threats and potential dangers at every step and every moment of time. The global network, which has become an integral part of our life, is no exception. Cyber crime is now more developed than ever – after all, almost every company has its own website on the Internet, and […]

RFID attacks

New Generation Hacking: RFID Attacks

By Prempal Singh 0 Comment February 1, 2019

A little about RFID technology RFID (Radio Frequency IDentification) is an automatic identification technology in which data is read and written by radio signals. Data is stored in a so-called RFID tag. The RFID system consists of a reader and a tag.  RFID tags are classified by operating frequency, memory type, and power source. Readers are stationary and […]

error: Content is protected by Cyberops !!