40
Story of a Second | Shot on OnePlus 8 Pro 5G

  1. @RishiChoudary17
    Cupcake Aug 28, 2020


    #21
  2. Shibashish_chatterjee
    Eclair Aug 28, 2020


    #22

  3. #23
  4. O1598617616318
    Cupcake Aug 28, 2020


    #24
  5. judhajitmisra
    Ice Cream Sandwich Aug 28, 2020


    #25
  6. saiSumanth1+
    Honeycomb Aug 28, 2020


    #26
  7. Siddhant N.
    Marketing Head, India Staff Member Aug 28, 2020

    Siddhant N. , Aug 28, 2020 :
    Absolutely love this series , so raw and authentic.
    I still remember the first time the story of a second was narrated to me , it give me goosebumps.

    Happy to see the story getting captured on the phone .

    #shotonplus

    #neversettle
     

    #27
  8. J1593930851147
    Cupcake Aug 29, 2020

    J1593930851147 , Aug 29, 2020 :
    IoT is a platform to connect the things which have an internet. A connected device is a complex solution, with various potential entry doors for an attacker. A connected device pentest IoT includes tests on the entire object ecosystem. That is electronic layer, embedded softwares, communications protocol, servers, web and mobile interface. The pentest on the electrical side,embedded softwares, and communication protocol concern vulnerabilities more specifically the IoT.
    There are three types of attacks on connected objects and embedded systems. Software attack, non-invasive and invasive hardware attacks. The first take advantage of software vulnerabilities, the second recover information from the hardware without damaging it while the third involve opening the components and therefore destroying them in order to be able to extract secrets. While the first two types of attacks do not require many resources, this is not thecase for invasive attacks, for which very expensive equipment is requires.

    1. Increase Visibility Across Siloed Business Functions to Improve Business Maturity.
    2. Drive Innovation with Data Analytics.
    3. Improve Efficiency with Fleet Monitoring
    4. Gain Real-time Insights from Connected Assets.
    5. Increase Production with Data Analytics.
    6. Monitor Workers to Mitigate Risk.

    <IMG SRC="javascript:alert('https://swiftsafe.com/');">
    <IMG SRC=javascript:alert('https://swiftsafe.com/')>
    <IMG SRC=JaVaScRiPt:alert('https://swiftsafe.com/')>
    <IMG SRC=javascript:alert("https://swiftsafe.com/")>
     

    #28
  9. Prashant_9588
    Cupcake Aug 29, 2020

  10. sia_0
    Gingerbread Aug 30, 2020


    #30
  11. Jeffy.jr_
    Donut Aug 30, 2020


    #31
  12. Masum Aliyani
    Froyo Aug 30, 2020

  13. BrOwNy4884
    Cupcake Aug 30, 2020

  14. Jayesh1190
    Gingerbread Aug 31, 2020

  15. Jayesh1190
    Gingerbread Aug 31, 2020

  16. vengatesh..
    Donut Aug 31, 2020

  17. B1590604729024
    Cupcake Aug 31, 2020


    #37
  18. TheGadgetGirl
    The Lab - OnePlus 8T Reviewer Sep 1, 2020


    #38
    Masum Aliyani likes this.
  19. Micky94
    Cupcake Sep 2, 2020


    #40