MakeUseOf

Pranav Bhardwaj-Staff Writer for Security

Pranav Bhardwaj

Staff Writer for Security

  • 63
    articles
  • 49
    Features
  • 2
    Lists
  • 12
    Guides

About Pranav Bhardwaj

Pranav has been an experienced writer in the field of cybersecurity since 2019. His writing niche encompasses a comprehensive range of topics, including Windows, Android, and iPhone security.

Before joining MUO, Pranav's contributions to renowned platforms such as MalwareFox, TutorialsPoint, and others solidified his reputation as a trusted source of knowledge and insight in the realm of digital security. 

Latest Articles

image with Apple devices -iPhone, Mac, Apple Watch 1
How Does Secure Enclave Protect Your Apple Devices?

If you own any Apple devices, Secure Enclave can help keep you safe.

making https less secure 1
What Is SSL Stripping and How Can You Defend Against It?

By downgrading a secure HTTPS connection to HTTP, a hacker could intercept all your data and alter what you see online. Here's how.

computer keyboard with lock icon above and man with hands outstretched behind 1
The 5 Best Privacy-Focused Operating Systems

Want more privacy on your computer or laptop? Consider these lesser-known operating systems.

An yellow tinted image with a person using laptop 1
How to Fix a Yellow Tint on a Windows Laptop Screen

If everything looks a bit yellowish on your laptop screen, here's how to fix it on Windows.

digital graphic of wifi symbol encircled by satellite on grid background 1
What Is Wi-Fi Eavesdropping? Understanding the Risks and How to Stay Secure

Cybercriminals can listen in on your Wi-Fi activity by eavesdropping. Here's how it works and how you can avoid it.

private property stencil 1
How to Delete Private Browsing History and Protect Your Privacy

No, simply using Incognito or Private Mode isn't enough: records of your online activities are still kept. Here's what you need to do.

An image with HTTPS written on it in green with a green padlock icon 1
What Is HTTPS Spoofing?

Most of us trust the padlock we see next to a URL that begins with "https", but cybercriminals have found a smart way to exploit this.

windows 11 laptop 1
How to Find Your Windows Laptop Model Number

Your laptop's model number can ensure you get the right app, part, or service for your computer.

A laptop on a wooden table with a Bluetooth logo on it 1
What Is the BlueSmack Attack?

BlueSmack attacks target your device's Bluetooth. Here's how.

picture of children in school using smartphones 1
How to Protect Kids From Cyberbullying

Cyberbullying is a prominent threat to our children, so it's important to know how to keep them safe.

padlock on a classic shield 1
What Is a DNS Sinkhole?

You can easily fall for online scams and get infected by malware by visiting malicious sites. DNS sinkholes might stop you from being a victim.

Apple and Android logos seen on dark background 1
Android vs. iOS: Which Operating System Is More Vulnerable to Cyberattacks?

Android's open source foundation makes it possible to create super secure phones, but most models aren't quite as secure as iOS devices.

The word  1
What Are the Different Types of Rootkits and How Can You Stay Safe?

Rootkits attack your PC at the system administrator level, giving them the power to do a great deal of harm.

ChatGPT search results on the iPhone App Store 1
How to Spot Fake ChatGPT Apps on the Apple App Store

Looking to use ChatGPT AI on your iPhone? Be extra vigilant because cybercriminals are spreading fake versions to scam innocent users like you.

using your thumb print fingerprint 1
What Is a Device Fingerprint? Here's How Cybercriminals Can Use It

Your device doesn't need an inkpad to leave a noticeable fingerprint, and the result can be just as personally identifiable.

Top above high angle view of his he nice attractive focused skilled guy geek typing coding web development remote support security safety at modern loft industrial home office work place station 1
What Is VDI and Is It a Safe Way to Work Online?

Virtual Desktop Infrastructure has become commonplace, but it comes with additional security risks compared to working in the office.

A hooded person holding an ace of spades card in front of their face 1
5 Free Anonymous Web Browsers That Are Completely Private

Anonymous web browsing is one way to protect your online privacy. Here are the best anonymous web browsers to use.

private browsing secure incogni 1
How to Secure Your Browsing Data (and Why You Need To)

Yes, even your browser stores data about you—data that can be used by hackers, advertisers, and more. Here's how to keep your personal info private.

A person using Google Chrome on a MacBook 1
How to Remove Bing From Chrome and Reset the Default Search Engine

If you've been stuck with Bing as the search engine on Chrome, here's how to remove it and reset the default search engine.

secure your iphone using a vpn 1
VPN
How to Turn Off a VPN on iPhone

Yes, they keep you more secure, but VPNs can also restrict your browsing experience. So here's how to disable and reactivate your VPN on iOS.

1 2 3 4
Page 1 / 4