๐พ๐ฑ๐ฎ ๐พ๐๐๐๐๐๐๐๐
@secureyst
Followers
53
Following
218
Media
20
Statuses
113
#securitycontrol #cyberforensics #forensics
Mumbai
Joined August 2018
#Securing #HighValue & #CriticalAssets is currently one of the biggest #challenges faced by any individual or businesses. We are your #Security & #RiskMitigation #Business Partners #forensics #cyberforensic #mobileforensic #ediscovery #fraud #investigations #CCTV @Biometrics etc
0
1
0
Speakers on your phone, computer and other internet connected devices could be hacked and used to wreak havoc on your eardrums, warns a new investigation. cyber-security experts claims that headphones could be turned into "acoustic weapons". https://t.co/MfmBvkpIS7
thesun.co.uk
SPEAKERS on your phone, computer and other internet connected devices could be hacked and used to wreak havoc on your eardrums, warns a new investigation. A cyber-security experts claims to have coโฆ
0
0
0
Salute to soldier's who sacrificed their lives for the nation, to the mothers who let them. On this spl day hereโs wishing our dream of a new tomorrow come true! SELF-RELIANT, SELF-SUPPORTING, SELF-SUFFICIENT..that's the India of our dreams. Happy 74th #IndependenceDayIndia ๐ฎ๐ณ
0
0
1
Reportedly, a US government contractor โAnomaly Sixโ has #location #tracking #software #hidden in more than 500 #mobileapps. https://t.co/G1KOQN54E8
hackread.com
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
0
0
0
Let's Celebrate Life.. Happy Krishna Janmashtami
0
0
0
Our phones contain a treasure trove of personal information, from banking details to messaging and email accounts. This sensitive data can be pretty enticing to a range of the nefarious, from cybercriminals to someone you may even know. https://t.co/y6ZPPwhdfH
techlicious.com
The best way to narrow down the field of suspects is to determine exactly how your phone is being compromised. Here are 9 steps to figuring out who hacked your phone.
0
0
0
This app is being used by fraudsters. An individual pretending to be from customer support of a e-com firm asked the victim to download this app to assist him in refunding the amount. Be aware and stay safe.. #cyberAttack #cybersecurity #CyberAware #mobile #mobileapps
0
1
0
The idea that our #phones are listening in on your #conversations became a big topic in recent years when platforms like Facebook seemingly started serving #ads to people based on conversations they had when their phone was in the room. #mobilesecurity
0
1
1
#Voiceassistants allow #smartphone users to snap a photograph or send a text with a spoken command. #SurfingAttack let #hackers do the same things by bombarding the deviceโs microphone with #ultrasonicwaves. #cybersecurity #mobileforensic #mobilesecurity
https://t.co/P3Lzh4XYuV
scientificamerican.com
Hackers could trick voice assistants to make calls or compromise texts
0
0
0
#Google has removed 29 #apps from the #PlayStore which were found filled with #adware. These #Android apps had over 3.5 million downloads on the Play Store. #cyberAttack #cybersecurity #mobileforensic #cyber
https://t.co/6hhFCfkRzg
0
0
0
Mobiles have SIM cards whose IMEI numbers are protected by secret codes that prevent over-the-air interception. But if someone is able to clone, they can copy all its identifying credentials to load onto a blank SIM.
techlicious.com
A dead connection or an unusually high bill may be signs of a SIM card that has been copied. Here's our guide to determining if your phone have been cloned.
0
0
0
Hackers can take advantage of a smartphone's voice assistant by sending silent commands to the phone through a waveform generator. #cybersecurity #hacking
#MobileSecurity #Siri #voiceassistant
popularmechanics.com
This is next-level stuffโbut there's an easy fix.
0
0
0
A tribute to the Covid Warriors Heartfelt Gratitude
0
1
1
Please download and share it using this link Android : https://t.co/Sz9dntxIID iOS : https://t.co/qNJOPVpebH
0
1
1