+91 9116117170

Tag: cyberops infosec

What is Social Engineering? Attacks and Countermeasures

By Chandan Singh 0 Comment July 5, 2018

Social engineering – a method of obtaining the necessary access to information, based on the characteristics of human psychology. The main goal of social engineering is to gain access to confidential information, passwords, banking data and other secure systems. Although the term social engineering appeared not so long ago, the very method of obtaining information […]

Russian hacker Rasputin hits universities, state and fed government agencies

By Chandan Singh 0 Comment February 17, 2017

Rasputin, a Russian hacker who in December 2016 permeated the network of the U. S. Electoral Assistance Commission and then put its database up for sale on the undercover market, has been recognized continuing his nefarious activities. New research has just been released from Documented Future that confirms the hacker hit 60 organizations, including a […]

Data breaches becoming more complex, damaging: Verizon

By Chandan Singh 0 Comment February 17, 2017

Information breaches are becoming more pervasive and damaging and are actually affecting every division inside an organization — departing a lingering, if not lasting, imprint on an enterprise, a brand new report said on Tuesday. The statement by Verizon Enterprise Alternatives — the B2B supply of the united states wireless marketing communications provider Verizon — […]

What is Microsoft Outlook: Difference Between Outlook 2003, 2007, 2010

By Chandan Singh 0 Comment February 17, 2017

Outlook is a personal information manager from Microsoft, available as a part of the Microsoft Workplace suite. Although often used mainly as an email application, it also includes a calendar, task manager, contact manager, note taking, log, and web browsing. This can be used as a stand-alone application or can work with exchange Server and […]

HTTP Methods: GET vs. POST

By Chandan Singh 0 Comment February 14, 2017

What is HTTP HTTP stands for Hypertext Transfer Protocol and HTTP is used to communications and request-response protocol between clients and servers. A web browser may be the client or may be the server. Example: A client (browser) submits an HTTP request to the server; then the server returns a response to the client. The […]

error: Content is protected by Cyberops !!