CALL US

+91 9116117170

Tag: hacking

What are Honeypots and how can it increase your security

By Yash Kudal 0 Comment February 20, 2020

What are honeypots? Honeypots can be defined as a trap that is used to detect attempts by any unauthorized use of information systems. Honeypots actually open the tables for hackers and computer security experts. The main purpose of a honeypot is to obtain or learn from attacks and to use other information to improve security. […]

What is IoT and how can we secure it?

By Yash Kudal 0 Comment February 20, 2020

Introduction IoT security is a technology area that interacts with protecting connected devices and networks in the Internet of Things (IoT). IoT involves adding the Internet connection to the system of compatible computer devices, mechanical and digital devices. Each thing is provided with a unique identifier and the ability to automatically transfer data to the […]

Vulnerability Of LibreOffice Can Hack Your System, Just By Opening a Document In LibreOffice

By Mohammed Tahir 0 Comment August 3, 2019

If you are using LibreOffice, “Be extra careful”. By opening a document file in LibreOffice, can hack your system. That’s because LibreOffice comprises an extreme unpatched code execution vulnerability that would execute malware into your system as swiftly as you open a maliciously formed doc file. LibreOffice is one the most usable and open source […]

Exploiting CMS Web Applications

By Palash Verma 0 Comment October 16, 2018

There are frequent cases of hacking websites on all servers, preferably CMS Joomla and WordPress, in this article we want to tell how and why this is done, and what measures can be taken to protect. If the site has been hacked, it is not enough just to delete the downloaded PHP Shell script, or […]

How to Exploit a Network Service through Buffer Overflow

By Chandan Singh 0 Comment October 6, 2018

We had a great time exploiting the vulnerabilities of the buffer overflow of Protostar virtual machine, but now it’s time to move on and search for more complex tasks. We had a great time exploiting the vulnerabilities of the Protostar virtual machine , but now it’s time to move on and search for more complex tasks. And such […]

error: Content is protected by Cyberops !!