28.2 C
Mumbai
Thursday, October 29, 2020
Tel: 8850717892

pranitakhedkar

An Architect by profession & practice, Pranita is a keen observer and specialises in content, visualisation, and presentation. Cyber attacks & Architecture Technology in the far more technologically-advanced world made her realise that there is a lack of necessary awareness among people. Hence, keeping you all updated and protected by all means with subjects from Architecture Technology to Security Awareness. Currently working as a Head of Content, content writer & creator at BLARROW.TECH

More Articles

GoodbyeDPI- Passive Deep Packet Inspection

Ever wondered why we cannot access certain websites? Well, here's everything you need to know about what causes that to happen. How some of the websites redirect us to the censorship page displaying 'blocked.' DPI...

PDFex – A New Attack to Break PDF Encryption

Portable Document Format (PDF), a file format used to present and exchange documents, independent of software, hardware, or operating system. Invented by Adobe, PDF is an open standard maintained by the Internation Organisation for Standardizations...

NODERSOK – A Zombie Proxie Apocalypse

In this article, we will be highlighting a recent infectious malware - Nodersok that turns PCs into zombie proxies and how it has impacted computer machines across the world. Contents: Nodersok - Malware that turns  PCs...

SimJacker Meaning- A Brand New Mobile and Sim Threat

In this article, you will find everything you need to know about the latest and brand new mobile (sim) threat - SIMJACKER CONTENTS:- MEANING HOW DOES SIMJACKER WORK THE IMPACT PRECAUTIONS WHAT NEXT SHOULD BE DONE? MEANING Simjacker...

MAGECART: A Rise Of Web Skimming

While online purchasing has altered the global economy, shifting from shops to digital storefronts, has also given rise to a new hidden economy growing across the globe for theft and sale of credit card data. WHAT...

SMOMINRU – The Largest Mining BOTNET

What is Smominru? Smominru, a gigantic Crypto-mining botnet that is equipped with worming capabilities and since the vitality it has gained significant adherence. The botnet came under the light in August 2019 that it makes the best...

An Interactive Online Ecosystem – Russian APT Map

Russian APT Map (Check it out here), a connection which is used to learn about the links between various APT (Advanced Persistent Threat) malware samples, malware families and hackers - all with one click on...

- Advertisement -

Discover

Trending

Watch Dogs: Legion and Albion Targeted by Egregor Ransomware

In this topic, we will see about the Data breach held in Watch Dogs: Legion and Albion, and How was the Breach conducted? Data...

Role of Architecture in Shaping Human Psychology

“Whatever good things we build end up building us.” – Jim Rohn An Overview: The interplay of architecture and human psychology is vital; people dwell into...

Metaspoilt Framework, A popular Tool among Cyber Criminals

First, in this topic, we will see, What is the Metasploit Framework? 1) What is the Metasploit Framework? Metasploit Framework is a widely used penetration testing...

Urban Farming Masterplan by MJZ Firm, Poland

An Overview: Dubbed 'the gardens of the future', the project focuses on natural food production. MJZ, an architecture firm has introduced a new urban farming...

Equinix Ransomware

RANSOMWARE attack hits Equinix companies internal system. Before going forward we will first see, What is Equinix? Equinix is a leading global interconnection platform, it is...