Monthly Archives: August 2019

//August

You can easily secure America’s e-voting systems tomorrow. Use paper – Bruce Schneier

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat While various high-tech solutions to secure electronic voting systems are being touted this week to election officials across the United States, according to infosec guru Bruce Schneier there is only one tried-and-tested approach that should be considered: pen […]

By |August 9th, 2019|Cyber News|

Pwn an iPhone to bank $1m, Check Point gripes about WhatsApp privacy again, Broadcom eats Symantec enterprise biz

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat Here’s a quick summary of some important infosec happenings from inside and outside the Black Hat USA conference in Las Vegas on Thursday.
Apple embiggens bug-bounty program
Apple’s security engineering boss Ivan Krstić told Black Hat attendees that Cupertino is expanding its […]

By |August 9th, 2019|Cyber News|

How powerful are Russian hackers? One new law could transform global crime operations

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat The introduction of Russia’s Sovereign Internet rules is having an impact on the way criminal hackers around the world do business.

This is according to security house IntSights, which says that the law, set to become official in a few […]

By |August 9th, 2019|Cyber News|

Transport for London Oyster system pulled offline after credential-stuffing crooks board customers’ accounts

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Exclusive Transport for London’s online Oyster travel smartcard system has been accessed by miscreants using stolen customer login credentials, The Reg can reveal, forcing IT bods to pull the website offline for a second day.

The UK capital’s transport authority has blamed the […]

By |August 9th, 2019|Cyber News|

WTF is Boeing on? Not just customer databases lying around on the web. 787 jetliner code, too, security bugs and all

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat A Black Hat presentation on how to potentially hijack a 787 – by exploiting bugs found in internal code left lying around on a public-facing server – was last night slammed as “irresponsible and misleading” by Boeing.

At the […]

By |August 8th, 2019|Cyber News|

FBI, NSA to hackers: Let us be blunt. Weed need your help. We’ll hire you even if you’ve smoked a little pot in the past

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat America’s crime-fighters, desperate to recruit white-hat hackers to collar spies and cyber-crooks, have been quietly and slightly relaxing the ban on hiring anyone who has used illegal drugs.

Generally speaking, dabbling in any kind of substance abuse will rule […]

By |August 8th, 2019|Cyber News|

Hack computers to steal someone’s identity in China? Why? You can just buy one from a bumpkin for, like, $3k

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat Black Hat founder Jeff Moss opened this year’s shindig in Las Vegas with tales of quite how odd the hacking culture in China is.

You see, Moss also founded the DEF CON conference series, and has started running DEF […]

By |August 8th, 2019|Cyber News|

Hack-age delivery! Wardialing, wardriving… Now warshipping: Wi-Fi-spying gizmos may lurk in future parcels

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Black Hat IBM’s X-Force hacking team have come up with an interesting variation on wardriving – you know, when you cruise a neighborhood scouting for Wi-Fi networks. Well, why not try using the postal service instead, and called it “warshipping,” […]

By |August 8th, 2019|Cyber News|

Deja-wooo-oooh! Intel chips running Windows potentially vulnerable to scary Spectre variant

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Spectre – a family of data-leaking side-channel vulnerabilities arising from speculative execution that was disclosed last year and affects various vendors’ chips – has a new sibling that bypasses previous mitigations.

Designated CVE-2019-1125 and rated moderate in terms of severity, the issue […]

By |August 7th, 2019|Cyber News|

They say piracy killed the Amiga. Know what else it’s killing? Malware sales. Awww, diddums

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

BSides LV Life’s tough as a malware developer. If the cops or Feds don’t collar you, your fellow scumbags will screw you over – or perhaps both will happen.

In a presentation at the Bsides Las Vegas hacking conference today, Winnona […]

By |August 7th, 2019|Cyber News|