- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Pranav Bhardwaj has Published 430 Articles
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
449 Views
Duqu is a family of computer malware that is considered to be linked to the Stuxnet worm. Duqu has taken advantage of a zero-day vulnerability in Microsoft Windows.Duqu virus is made up of a number of software components that work together to help the attackers. This includes information-stealing capabilities, kernel ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
1K+ Views
Scavenging in cyber security is the process of sifting through a system's data residue in search of sensitive or confidential information. Data scavenging is usually the first stage in any purposeful network assault. To discover as much as possible about a target firm, the attacker employs a combination of network-based ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
410 Views
Malicious hackers created a fork bomb, also known as a wabbit or rabbit virus, to execute a denial-of-service attack on the target computer. The fork bomb replication occurs and wreaks havoc on the system's resources. It bogs down the system's performance and can even cause the system to crash owing ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
156 Views
Due to the prevalent use of security software on mobile phones and industry groups targeting malicious transactions, cyber thieves have turned to a new type of malware called chargeware.Chargeware is a type of malware that collects money from the victims without their knowledge or permission. It is a type of ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
637 Views
What is Dumpster Diving?Dumpster diving is the practice of exploring garbage for information on a person or company that might be utilized for hacking purposes later. This assault mostly targets major companies or businesses in order to conduct phishing (mainly) by sending victims false emails that look to come from ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
408 Views
Heartbleed is a critical flaw in the widely used OpenSSL cryptographic software library. This flaw allows information to be stolen that is usually secured by the SSL/TLS cryptography used to secure the Web. SSL/TLS enables communication privacy and security for the internet, mail, messaging services, and some VPNs over the ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
3K+ Views
Backdoor Trojans are malicious software programs that provide unauthorized access to a computer in order to launch a remote attack. Remote attackers can use a hacked machine to send commands or gain complete control.Backdoor malware and viruses circumvent authentication protocols in order to gain access to systems and avoid detection. ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
448 Views
A Gray Hat programmer is a programmer who may violate moral conventions or standards, but not with the malicious intent associated with dark cap programmers. Gray Hat programmers may participate in practices that appear to be less than completely above board, yet they are typically working for the greater good.Gray ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
244 Views
The "SolarWinds hack", a cyberattack uncovered lately in the United States, has emerged as one of the largest ever targeted against the United States government, its agencies, and several private enterprises. In reality, this is likely a global cyberattack.FireEye, a cybersecurity firm based in the United States, was the first ... Read More
![Pranav Bhardwaj](https://www.tutorialspoint.com/assets/profiles/358675/profile/60_2525385-1629185816.jpg)
Pranav Bhardwaj
1K+ Views
Rogue security software is a malicious software that deceives users into believing their computer is afflicted with a virus in order to induce them to pay for a phony malware removal application that really installs malware. It is a type of scareware that manipulates victims by instilling fear in them, ... Read More