Daily Archives: May 6, 2019

Israel Retaliates To A Cyber-Attack With Immediate Physical Action In A World First

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The Israel Defense Forces (IDF) has launched a physical attack on Hamas in immediate response to an alleged cyber-assault. The IDF hit a building in the Gaza Strip with an airstrike after claiming the site had been used by […]

By |May 6th, 2019|Cyber News|

White House issues Executive Order on cybersecurity, including hacker Hunger Games

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

“A year after the White House eliminated the position of cybersecurity coordinator, President Donald Trump called for everyone else to do the opposite and push cybersecurity coordination through worker training and recruitment.”

“America built the internet and shared it with […]

By |May 6th, 2019|Cyber News|

Mystery Git ransomware appears to blank commits, demands Bitcoin to rescue code

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Programmers say they’ve been hit by ransomware that seemingly wipes their Git repositories’ commits and replaces them with a ransom note demanding Bitcoin.

An unusual high number of developers have griped online about the effects of the software nasty, with […]

By |May 6th, 2019|Cyber News|

UK taxman falls foul of GDPR, agrees to wipe 5 million voice recordings used to make biometric IDs

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Her Majesty’s Revenue and Customs, aka the tax collector, has agreed to delete five million voice recordings it used to create biometric IDs.

The Voice IDs were used to speed access to its phone line but were created before the implementation […]

By |May 6th, 2019|Cyber News|