secureyst Profile Banner
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™ Profile
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™

@secureyst

Followers
53
Following
218
Media
20
Statuses
113

#securitycontrol #cyberforensics #forensics

Mumbai
Joined August 2018
Don't wanna be here? Send us removal request.
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
6 years
#Securing #HighValue & #CriticalAssets is currently one of the biggest #challenges faced by any individual or businesses. We are your #Security & #RiskMitigation #Business Partners #forensics #cyberforensic #mobileforensic #ediscovery #fraud #investigations #CCTV @Biometrics etc
0
1
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
Speakers on your phone, computer and other internet connected devices could be hacked and used to wreak havoc on your eardrums, warns a new investigation. cyber-security experts claims that headphones could be turned into "acoustic weapons". https://t.co/MfmBvkpIS7
Tweet card summary image
thesun.co.uk
SPEAKERS on your phone, computer and other internet connected devices could be hacked and used to wreak havoc on your eardrums, warns a new investigation. A cyber-security experts claims to have coโ€ฆ
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
Salute to soldier's who sacrificed their lives for the nation, to the mothers who let them. On this spl day hereโ€™s wishing our dream of a new tomorrow come true! SELF-RELIANT, SELF-SUPPORTING, SELF-SUFFICIENT..that's the India of our dreams. Happy 74th #IndependenceDayIndia ๐Ÿ‡ฎ๐Ÿ‡ณ
0
0
1
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
Reportedly, a US government contractor โ€˜Anomaly Sixโ€™ has #location #tracking #software #hidden in more than 500 #mobileapps. https://t.co/G1KOQN54E8
Tweet card summary image
hackread.com
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
Let's Celebrate Life.. Happy Krishna Janmashtami
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
Our phones contain a treasure trove of personal information, from banking details to messaging and email accounts. This sensitive data can be pretty enticing to a range of the nefarious, from cybercriminals to someone you may even know. https://t.co/y6ZPPwhdfH
techlicious.com
The best way to narrow down the field of suspects is to determine exactly how your phone is being compromised. Here are 9 steps to figuring out who hacked your phone.
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
This app is being used by fraudsters. An individual pretending to be from customer support of a e-com firm asked the victim to download this app to assist him in refunding the amount. Be aware and stay safe.. #cyberAttack #cybersecurity #CyberAware #mobile #mobileapps
0
1
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
The idea that our #phones are listening in on your #conversations became a big topic in recent years when platforms like Facebook seemingly started serving #ads to people based on conversations they had when their phone was in the room. #mobilesecurity
0
1
1
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
#Voiceassistants allow #smartphone users to snap a photograph or send a text with a spoken command. #SurfingAttack let #hackers do the same things by bombarding the deviceโ€™s microphone with #ultrasonicwaves. #cybersecurity #mobileforensic #mobilesecurity https://t.co/P3Lzh4XYuV
scientificamerican.com
Hackers could trick voice assistants to make calls or compromise texts
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
#Google has removed 29 #apps from the #PlayStore which were found filled with #adware. These #Android apps had over 3.5 million downloads on the Play Store. #cyberAttack #cybersecurity #mobileforensic #cyber https://t.co/6hhFCfkRzg
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
Mobiles have SIM cards whose IMEI numbers are protected by secret codes that prevent over-the-air interception. But if someone is able to clone, they can copy all its identifying credentials to load onto a blank SIM.
Tweet card summary image
techlicious.com
A dead connection or an unusually high bill may be signs of a SIM card that has been copied. Here's our guide to determining if your phone have been cloned.
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
5 years
Hackers can take advantage of a smartphone's voice assistant by sending silent commands to the phone through a waveform generator. #cybersecurity #hacking #MobileSecurity #Siri #voiceassistant
popularmechanics.com
This is next-level stuffโ€”but there's an easy fix.
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
6 years
SFC SECUREYST PVT LTD
0
1
1
@Shalini92949794
๐•พ๐–๐–†๐–‘๐–Ž๐–“๐–Ž
6 years
A tribute to the Covid Warriors Heartfelt Gratitude
0
1
1
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
6 years
Please download and share it using this link Android : https://t.co/Sz9dntxIID iOS : https://t.co/qNJOPVpebH
0
1
1
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
6 years
0
0
0
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
6 years
0
2
2
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
6 years
0
2
2
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
6 years
Understanding Covid 19 #COVID19
0
2
2
@secureyst
๐•พ๐•ฑ๐•ฎ ๐•พ๐–Š๐–ˆ๐–š๐–—๐–Š๐–ž๐–˜๐–™
6 years
Understanding Covid 19 #COVID19
0
2
2