Skip to main content

What is cyber attack /China cyber attack on india

Recently chineese hackers attemped over 40000 cyber attack in india on information technology, banking sector, police security system, infrastructure. 40000 attack has been done within five days. But couldn't break the indian cyber security system. cyber attack is done  due to recently on going conflict between India🇮🇳 vs china..  🔴What is cyber attack?  A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals can use a variety of methods to launch a cyber attack including malware, phishing, ransomware, man-in-the-middle attack, and other methods.  In other situations, cyber attacks can be part of nation-states' cyber warfare or cyber terrorism efforts.  Strong organizational-wide cybersecurity and network security controls are now more important than ever. A cybercriminal may steal, alter, or destroy a specified target by hacking into a susceptible system. Cyber threats can ...

Remove these chineese app from your phone-techajkalpro

🔴Currently we are having dilemma of removing or uninstalling  chineese app. Talk about recent conditions like corona pandamic situation or indo chineese conflict, china is the main root of these problems. So as an indian we should reject all the things of china.
There are so many app which are of chineese developers. Hence  a list of these app:

🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴
The Chinese apps are listed as follows. TikTok, Vault-Hide, Vigo Video, Bigo Live, Weibo, WeChat, SHAREit, UC News, UC Browser, BeautyPlus, Xender, ClubFactory, Helo, LIKE, Kwai, ROMWE, SHEIN, NewsDog, Photo Wonder, APUS Browser, VivaVideo- QU Video Inc, Perfect Corp, CM Browser, and Virus Cleaner (Hi Security Lab).
Also in the list of Chinese apps is Mi Community, DU recorder, YouCam Makeup, Mi Store, 360 Security, DU Battery Saver, DU Browser, DU Cleaner, DU Privacy, Clean Master Cheetah, CacheClear DU apps studio, Baidu Translate, Baidu Map, Wonder Camera, ES File Explorer, QQ International, QQ Launcher, QQ Security Centre, QQ Player, QQ Music, QQ Mail, QQ NewsFeed, WeSync, SelfieCity, Clash of Kings, Mail Master, Mi Video call-Xiaomi, and Parallel Space.

These are the chineese app which intel indian agency wants to flush out. 
Indian intelligence agencies have asked the government to block or advise people to stop using a bunch of applications that are apparently extracting user data. These Chinese apps, 52 in number are linked to neighboring country China, with whom India is currently facing complications due to a border face-off. 



For further information & update follow me on Instagram, Facebook and twitter. 

If u like my article, then comment  below and share with your friends. 

Thank you. 

Comments

Popular posts from this blog

🔴Redmi Note 9 Pro Max Next Sale on June 24 at 12 Noon via Amazon, Mi.com

The  Redmi Note 9 Pro Max  price in India starts at Rs. 16,499 for the 6GB + 64GB storage variant. The 6GB + 128GB and 8GB + 128GB variants of the phone are priced at Rs. 17,999 and 19,999, respectively. All the Redmi Note 9 Pro Max models are  offered  in Aurora Blue, Glacier White, and Interstellar Black colour option. The  Redmi  budget smartphone will be available to purchase via  Amazon.in  and  Mi.com  on June 24 at 12pm (noon). Customers planning to purchase the phone through Amazon can select no-cost as well as standard EMI options. Prime members can also enjoy five percent discount using Amazon Pay ICICI Bank Credit Card. Additionally, Amazon and Xiaomi, both are offering  Airtel  double data benefits with Rs. 298 and Rs. 398 unlimited packs.

What is cyber attack /China cyber attack on india

Recently chineese hackers attemped over 40000 cyber attack in india on information technology, banking sector, police security system, infrastructure. 40000 attack has been done within five days. But couldn't break the indian cyber security system. cyber attack is done  due to recently on going conflict between India🇮🇳 vs china..  🔴What is cyber attack?  A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals can use a variety of methods to launch a cyber attack including malware, phishing, ransomware, man-in-the-middle attack, and other methods.  In other situations, cyber attacks can be part of nation-states' cyber warfare or cyber terrorism efforts.  Strong organizational-wide cybersecurity and network security controls are now more important than ever. A cybercriminal may steal, alter, or destroy a specified target by hacking into a susceptible system. Cyber threats can ...

🔵Android version /revolution of android

Android development was done in many versions; each new version had enhanced features than the previous versions. Each major version had nick names based on the dessert themes. A quick glance at the major Android versions.                         🔵Cupcake –   This version features such as Blue tooth support, camcorder functions, Ability to upload to YouTube and Picasa.                           ⬇️⬇️⬇️ 🔵 Doughnut –  This Android 1.6 version supported higher resolution touch screens,improved camera and gallery support etc.                          ⬇️⬇️⬇️ 🔵Éclair –  This Android 2.0 version enabled customizing the Home screen, arranging apps and widgets across multiple screen and had amazing wall papers that responded to touch.                 ...