Cyber news

Hackers on Covid-19 Research | Securium Solutions Pvt Ltd

COVID-19 RESEARCH SECRETS TARGETED BY CHINESE HACKERS – US CHARGES

Hey everyone, Hope everyone is safe and secureWe all know, everyone stuck at home in this pandemic situation due to this rapid spread of COVID-19. Lots of People are struggling for their lives.Invention and research for cure is intensely going on in all stages around the world and competing against one another countries to be …

COVID-19 RESEARCH SECRETS TARGETED BY CHINESE HACKERS – US CHARGES Read More »

BASICS OF POLICIES | SECURIUM SOLUTIONS PVT LTD

NEED OF SECURITY POLICIES

Hey everyone, Hope everyone is safe and Secure We have seen lots of Tutorials, tools, techniques and Methodologies in Penetration Testing So far.It’s Time to gain some information on Policies too. What is a Security Policy? A set of Rules that constrains organization with the specific practices to be followed against security threats. Security policy …

NEED OF SECURITY POLICIES Read More »

Android Insecure file storage

Hello everyone Greeting all, Today we are going to discuss about Insecure File storage issue On android Application. As Insecure filesystem concern remain that application data is securely stored on android device that mean no one can access that data from our device If application is vulnerable which possible for data theft loss of personal …

Android Insecure file storage Read More »

WPA2 VULNERABILITY | SECURIUM SOLUTIONS

ENCRYPTION VULNERABILITY REVEALED AGAINST WPA2 DEVICES

Hey guys, back again today with a latest news on cyber security Kr00k vulnerability is tracked as CVE-2019-15126, which let the nearby remote attackers to decrypt few wireless packets transmitted over air by devices subjected to vulnerability. It is not necessary for an attacker to be available inside the network, vulnerability is vulnerable against the …

ENCRYPTION VULNERABILITY REVEALED AGAINST WPA2 DEVICES Read More »

Securium Solutions Cybersecurity by Rahul Sharma

๐“๐ก๐ž ๐ก๐ฎ๐ฆ๐š๐ง ๐ฌ๐ข๐๐ž ๐จ๐Ÿ ๐œ๐ฒ๐›๐ž๐ซ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐…๐ซ๐จ๐ฆ ๐ญ๐ก๐ซ๐ž๐š๐ญ ๐ญ๐จ ๐๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ

Infographics & Animations Cyber criminals seemingly have the upper hand in the cyber war, but how do we fight these cyber criminals? People can play a significant role in cyber security when the private sector, public sector and citizens lock arms and work together. From one perspective, insider threats are a real issue with more …

๐“๐ก๐ž ๐ก๐ฎ๐ฆ๐š๐ง ๐ฌ๐ข๐๐ž ๐จ๐Ÿ ๐œ๐ฒ๐›๐ž๐ซ ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ: ๐…๐ซ๐จ๐ฆ ๐ญ๐ก๐ซ๐ž๐š๐ญ ๐ญ๐จ ๐๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ Read More »