31.5 C
Mumbai
Wednesday, October 21, 2020
Tel: 8850717892
Home Security Awareness

Security Awareness

AI & Machine Learning, How will they Shape our Future?

Let us first begin with, What is AI? Full-Form of AI is Artificial Intelligence. Artificial Intelligence (AI) is the ability of a computer or a...

sP+A’s Balaji Temple : A new vision for Temple Architecture

sP+a architects took an initiative to break the conventional style of making temples. They took history into consideration, adapted the style from Ziggurats, and...

Fall Guys: Ultimate Knockout

INTRODUCTION:- FALL GUYS: ULTIMATE KNOCKOUT is a Platformer Battle Royale Survival video game, Developed by MEDIATONIC and Published by DEVELOPER DIGITAL. Producer of this game...

Doki Malware Targeting Docker Services In The Cloud

Recently, new malware is traced by researchers targeting cloud services on Linux machines: Doki Malware. The malware is a previously undocumented technique infecting exposed...

Migrating Postgres Database From Heroku to Docker Container

While surfing on the internet and brainstorming for a day, I couldn't find any perfect and straightforward guide to make the actual migration of...

100,000 BEC Attacks On 6,000+ Organisations

Recently, researchers at Barracuda security firm found thousands of organisations attacked with an influx of BEC attacks during the pandemic. With a huge hike in...

BlueRepli Bluetooth Attack Targets Android Devices

Recently, in the virtual meeting of Black Hat USA 2020, researchers have found a unique, queer yet effective way to hijack the android devices...

BadPower Attack: Your Smartphone May Explode While Charging

Recently, Chinese researchers have discovered rather a queer way to literally ‘destroy’ your smartphone through the mobile charger. This attack is known as the...

TrickBot Anchor Malware Now Targets Linux Systems

Backdoor implementation is enhancing in every aspect. Cyber groups are employing techniques to execute malicious activities in the host system along with establishing persistence....

Google Detected 11 Zero-Day Vulnerabilities in H1 2020

Recently, Google Project Zero released the list of vulnerabilities exploited in 2019. Along with the first “Year In Review” report, Google also mentioned the...

BootHole Bug Impacts Billions Of Devices

Cyber attacks are of two types: one in which crooks use advanced techniques to tamper with the systems and the other is when a...

GMERA Malware Targets Cryptocurrency Apps On MacOS

Cryptocurrency and blockchain technology are revolutionary advances. But with every transaction operated online through an application, it poses a serious threat from cyber crooks....

Most Read

Urban Farming Masterplan by MJZ Firm, Poland

An Overview: Dubbed 'the gardens of the future', the project focuses on natural food production. MJZ, an architecture firm has introduced a new urban farming...

Equinix Ransomware

RANSOMWARE attack hits Equinix companies internal system. Before going forward we will first see, What is Equinix? Equinix is a leading global interconnection platform, it is...

A brief to Architecture Journalism as a Career Path

Not all students prefer jumping into the career path of practising architecture. It is great when you design, but it could be dreading when...

Social Housing, Home for All

The term ‘social housing’ is given to accommodation which is affordable to low-income people or with particular needs on a secure basis. The state,...