29 C
Mumbai
Sunday, August 9, 2020
Tel: 8850717892

Ayush Dubey

Ayush Dubey is an engineering student from IIIT Jabalpur. He has a comprehensive background in technology. Cybersecurity being his primary field of interest. He loves to meet people who are always in a hustle to learn new things. Currently, working as a writer at Blarrow Online Services Pvt. Ltd.

More Articles

BadPower Attack: Your Smartphone May Explode While Charging

Recently, Chinese researchers have discovered rather a queer way to literally ‘destroy’ your smartphone through the mobile charger. This attack is known as the BadPower Attack can meltdown your smartphone through malicious codes tampering with...

TrickBot Anchor Malware Now Targets Linux Systems

Backdoor implementation is enhancing in every aspect. Cyber groups are employing techniques to execute malicious activities in the host system along with establishing persistence. Recently, a researcher traced a high-profile malware expanding its attack landscape...

Google Detected 11 Zero-Day Vulnerabilities in H1 2020

Recently, Google Project Zero released the list of vulnerabilities exploited in 2019. Along with the first “Year In Review” report, Google also mentioned the zero-day vulnerabilities they’ve come along in the first half of 2020. According...

BootHole Bug Impacts Billions Of Devices

Cyber attacks are of two types: one in which crooks use advanced techniques to tamper with the systems and the other is when a service reaches the consumers with an innate vulnerability and attackers leverages...

GMERA Malware Targets Cryptocurrency Apps On MacOS

Cryptocurrency and blockchain technology are revolutionary advances. But with every transaction operated online through an application, it poses a serious threat from cyber crooks. Recently, macOS users were victimised as threat actors spoofed legitimate trading...

BlackRock Trojan Targets Android Apps To Steal Credentials

Android applications are seen to be most vulnerable to cyber-attacks. Moreover, the rise in operations of applications for the last three months has given cyber crooks a large number of potential targets. Recently, ThreatFabric security...

Emotet Botnet Returns With Malicious Phishing Campaign

The botnet strategy of threat actors to infect systems in bulk is rampant. Moreover, the degree of severity is also soaring with every botnet campaign. Last week, a highly notorious botnet, deemed to be the...

“Blur” Photo Campaign Targets Android Users

Recently, Google Play Store was found with 29 malicious photo editing apps with a combined 3.5 million downloads running out-of-context ad campaigns. This is not the first attack of its kind. The ability to track...

Phorpiex Botnet Uses Sextortion Emails To Generate Revenue

The experts and researchers in the domain of cybersecurity have seen an upsurge in ransomware attacks. And every time it’s more lethal than the previous one. Recently, an infamous decade-old Phorpiex botnet shifts its gears...

- Advertisement -

Discover

Trending

Human Centric Design

Architecture has a psychological effect on every human being, it could be both negative or positive. Due to a major rise in the population,...

BadPower Attack: Your Smartphone May Explode While Charging

Recently, Chinese researchers have discovered rather a queer way to literally ‘destroy’ your smartphone through the mobile charger. This attack is known as the...

Learnings from the Past: A tale of Indigenous Architecture and Sustainability

As much as we move ahead with time and technology, there is also a part of the past that helps us learn new things....

TrickBot Anchor Malware Now Targets Linux Systems

Backdoor implementation is enhancing in every aspect. Cyber groups are employing techniques to execute malicious activities in the host system along with establishing persistence....

Rock of Ages 3: Make and Break Review

INTRODUCTION:- ROCK OF AGES 3: MAKE AND BREAK a Tower defence, racing type of video game played in single-player and multiplayer game mode. ROCK OF...