CALL US

+91 9116117170

Blog

DSLR: Knock, Knock! It’s a Ransomware

By Dibya Nayani Senapati 0 Comment August 22, 2019

A camera is an important tool used by us to capture each and every important experience and moment of your life, we entrust them with our precious memories, so they are really important to us. But it’s time to beware before saying cheese because the camera can also be vulnerable to ransomware and malware attacks.   Today’s […]

Hacker Can Capture Your Data Through Smartphones While you are working on your laptop

By Mohammed Tahir 0 Comment August 22, 2019

Having good features and functionality of a smartphone, it sounds good but sometimes it can be used as a weapon for hackers. Attackers can now silently steal your data and private information while you are typing on your laptop and this same attack can be easily executed while you are working with your device in […]

LokiBot Malware

Steganography Technique used by New LokiBot Malware

By Chaitra V M 0 Comment August 10, 2019

Lokibot is a malware which steals information by gathering sensitive data and credentials of login from the infected system. The malware is spread either through a malicious link or malicious mail. An email was detected that contained malicious attachment of LokiBot. The attachment had an Excel worksheet and ‘package.json’ labeled package. By running the excel […]

What is Privilege Escalation?

By Annu Choudhari 0 Comment August 10, 2019

Privilege escalation is that attack in which an attacker exploits a software bug to gain access to a resource that is usually protected by the application or user, which leads to a change in privileges for malicious actions that are carried out with greater privileges than expected application developer and system administrator. Known attacks of […]

error: Content is protected by Cyberops !!