CALL US

+91 9116117170

Blog

AhMyth Android RAT – Remote Administration Tool

By Dibya Nayani Senapati 0 Comment August 24, 2019

There are more than 2.5 billion Android devices active each month and anyone of them can be hacked with the use of a remote administration tool known as RAT. RAT was basically created to provide technical support to the remote computer by allowing an administrator to log in and control the device directly. But hackers […]

Spearphone Cyber Attack

Latest Attack on Android Known As “Spearphone Attack”

By Mohammed Tahir 0 Comment August 1, 2019

“Spearphone Attack ” The New Attack, Lets Android Apps Capture Loudspeaker Data Without Any Privileges  Research revealing how more than 1300 Android apps are collecting sensitive data even when users have explicitly denied the required permissions. Primarily observed by the researcher that how developers abuse multiple procedures around to collect location data, phone identifiers, and […]

Owasp Top 10:A5: Broken Access Control (Impact & Mitigation)

By Annu Choudhari 0 Comment July 11, 2019

what is Broken Access Control? Broken access control is a very common and very vulnerable vulnerability. Many sites have the potential to accidentally provide access to unauthorized visitors who just cut out a URL that seems to be unsafe and paste it into a browser. Description  Access control, sometimes called authorization, is how a web […]

OWASP - Cyberops

What is OWASP? Top 10 Vulnerabilities?

By Annu Choudhari 0 Comment June 11, 2019

The modern world carries thousands of threats and potential dangers at every step and every moment of time. The global network, which has become an integral part of our life, is no exception. Cyber crime is now more developed than ever – after all, almost every company has its own website on the Internet, and […]

Netcat

What is Netcat? All NetCat Commands

By Shaurya Sharma 0 Comment April 18, 2019

Netcat utility is often called “Swiss Army Knife”, in the good sense of the word. The netcat functionality is useful to the same extent that the versatility and handiness of the reputable pocket Swiss Army Knife is useful. Some of its features include port scanning, file transfer, port listening, and it can be used as […]