Daily Archives: February 23, 2018

Home » February 2018 » Archives for February 23, 2018

Intel did not tell U.S. cyber officials about chip flaws until made public

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: reuters

Intel Corp did not inform U.S. cyber security officials of the so-called Meltdown and Spectre chip security flaws until they leaked to the public, six months after Alphabet Inc notified the chipmaker of the problems, according to letters sent by tech […]

By |February 23rd, 2018|Cyber News|

Cryptojackers are hacking websites to mine cryptocurrencies

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: hartfordbusiness

Hackers have a new trick up their sleeves: hijacking computers to generate digital coins.

As bitcoin and other cryptocurrency prices soar, “cryptojacking” attackers surreptitiously take over web browsers, phones and servers to make some serious profit.

“Every avenue out there is being exploited […]

By |February 23rd, 2018|Cyber News|

North Korean hacking group ‘Reaper’ grows into global threat: FireEye

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: IndianExpress

North Korean cyber-spy group ‘Reaper’ is emerging as a global threat, conducting espionage well beyond the Korean peninsula in support of Pyongyang’s military and economic interests, FireEye Inc said.

The group, known also as APT37, in 2017 began attacking targets in […]

By |February 23rd, 2018|Cyber News|

uTorrent Exploit Can Leave PCs Vulnerable To Hacking Exploits

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: ABC News

An exploit in the P2P program BitTorrent, uTorrent and uTorrent Web could effectively allow hackers to remotely hijack a user’s PC via DNS rebinding. Allowing them to install remote code and execute malware.

Google researcher Tavis Ormandy revealed the vulnerability over […]

By |February 23rd, 2018|Cyber News|