Cyber Security Researcher. Information security specialist, currently working as risk infrastructure specialist & investigator.
He is a cyber-security researcher with over 18 years of experience. He has served with the Intelligence Agency as a Senior Intelligence Officer. He has also worked on the projects of Citrix and Google in deploying cyber security solutions. He has aided the government and many federal agencies in thwarting many cyber crimes. He has been writing for us in his free time since last 5 years.
Research from cybersecurity and threat intelligence company Cyble identifies a spike in attacks targeting virtual network computing (VNC) — a graphical desktop-sharing system that uses the Remote Frame Buffer (RFB)
Using rooted devices has become a way to employ advanced hacking tools without using a powerful computer. However, the rooting process can be complicated for the uninitiated. On this occasion,
This time, mobile security specialists from the International Cyber Security Institute (IICS) will show you how to hack a WiFi router from your smartphone using RouterSploit, a tool for Termux.