Extreme Hacking

We work in Dark, to serve the Light

Home

Did the WannaCry Ransomware Attack Originate on the Dark Web?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Mass hysteria has broken out across the internet in response to the recent WannaCry Ransomware attack. Panic is leaking into reality. A hacker group calling themselves the Shadow Brokers is taking credit. You can read all […]

By |May 26th, 2017|Cyber News|

Android is vulnerable to “Cloak and Dagger” attack

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A new vulnerability affects all Android versions called “dubbed Cloak and Dagger”, has been discovered by security researchers at Georgia Institute of Technology.

According to the researchers:
“Cloak and dagger” is a new type of attack vector that […]

By |May 26th, 2017|Cyber News|

Is the Dark Web’s Popular Black Market AlphaBay the New Silk Road?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

It’s been almost four years since the arrest of Ross William Ulbricht, the mastermind behind the dark web’s biggest black market, The Silk Road.

Calling himself Dread Pirate Roberts (a grab from the movie Princess Bride), Ulbricht […]

By |May 26th, 2017|Cyber News|

What is Rootkit?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Rootkit originated from the concept of root access in the Unix operating system, which allows full user permissions to change files and settings. All rootkits serve the same general function to hide either their existence or […]

By |May 26th, 2017|Cyber News|

Thousands of Linux devices are vulnerable!

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Samba is a free software re-implementation of the SMB networking protocol and provide file and print services for different Microsoft Windows clients. The name originates from the SMB (Server Message Block) protocol which is used by […]

By |May 25th, 2017|Cyber News|

A new Ransomware called “Jaff”

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Another active threat was discovered, Jaff is a new ransomware family that appeared just days before the WannaCry outbreak.

The new family of Jaff was discovered by Brad Duncan (a security researcher) that has a new design […]

By |May 25th, 2017|Cyber News|

What is HTTP (Hypertext Transfer Protocol)?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Hypertext transfer protocol (HTTP) is the core communications protocol used to reach the World Wide Web and nowadays is used by all of the web applications. It is a simple protocol that was originally generated for […]

By |May 25th, 2017|Cyber News|

A Sex Trafficking Ring Born on the Deep Web is Brought Down

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

It is no surprise that the most terrifying things are found on the internet, or more specifically on an entity dubbed as the “deep web”.  Just browsing the surface of the deep web can introduce you […]

By |May 25th, 2017|Cyber News|

Who Will The Dark Overlord’s Next Target Be?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

If you haven’t heard of The Dark Overlord by now, you probably don’t get on the internet much. Although they’ve been scavenging online for the last several years as an infamous hacker group, TDO just recently […]

By |May 25th, 2017|Cyber News|

HSBC Bank new voice recognition security system was fooled!

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A BBC Click reporter Dan Simmons set up an HSBC account and signed up for the new voice ID authentication service. The bank said that the system is secure because each person has its “unique” voice.

The […]

By |May 25th, 2017|Cyber News|