CALL US

+91 9116117170

Tag: how to

How to Automate IDOR using BurpSuit

By Devashish Soni 0 Comment February 28, 2020

What is IDOR IDOR stands for ‘Insecure Direct Object Reference’. It is a security vulnerability in which a user is able to change data or can access data of another users. IDOR occurs when the internal implementation of an object is done without proper validation mechanism which allow an attacker to gain access to these […]

How to setup and use Google Authenticator App in your Mobile

By Chandan Singh 0 Comment December 6, 2018

Many of you have heard about such a thing as two-factor (two-step) authentication and even use it, so in this tutorial you can learn that how to setup and use Google Authenticator App in your mobile. Since it helps to significantly increase the security of your accounts and makes it difficult for attackers to access […]

What is Ransomware? Tips to Prevent Ransomware

By Chandan Singh 0 Comment November 5, 2018

What is ransomware Ransomware is a type of malicious software(malware) that intends to extract ransom payment from a user. When a system is attacked by ransomware, all the document files on the hard drive and accessible network folders gets encrypted. Encrypted documents are unusable unless decrypted with a unique decryption key held by the attackers. […]

how to secure your data

How to Secure Your Data – Online Privacy Guide

By Chandan Singh 0 Comment September 27, 2018

Online Privacy Guide – How to Secure Your data Security and privacy: what’s the difference? Information security and confidentiality are closely related with each other, but still quite different. The service can be very secure, but not confidential. What is confidentiality? The essence of confidentiality is that you or others do not have access to your […]

Hacking IoT manufacturers and smart cars through APN (Access Point Network)

By Chandan Singh 0 Comment January 25, 2018

To connect to any cellular APN service, the device must have the following information: access point name, user name and password.This scheme works in the case of SIM-cards purchased from intermediaries. Before we go directly to the topic of the article, we will clarify the notion of APN: APN (Access Point Name), access to which […]

error: Content is protected by Cyberops !!