Monthly Archives: January 2018

//January

TV stars settle ‘six-figure’ hacking claims

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: BCC

The publishers of The Sun and the defunct News of the World have settled more claims for phone hacking.

News Group Newspapers offered payments to Coronation Street actor Jimmi Harkishin, TV presenter Kate Thornton, comedian Vic Reeves and former Spice Girls […]

By |January 20th, 2018|Cyber News|

Who Is Selling Hacking Subscriptions to Governments?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: theatlantic

Just north of a perennially jammed arterial, sandwiched between the French embassy complex and a university administration building, a beige monolith with a vertical slash of reflective windows is set back from the road, guarded by a row of high barriers […]

By |January 20th, 2018|Cyber News|

North Korea accused of hacking cryptocurrency exchanges selling Bitcoin and Monero

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credit: metro

North Korea has been accused of hacking South Korean cryptocurrency exchanges in a series of cyber-heists. A mysterious hacking squad called the Lazarus Group is thought to have launched operations aimed at cryptocurrency businesses based in democratic South Korea.

Although it’s often hard […]

By |January 20th, 2018|Cyber News|

Hacking campaign using fake apps traced to Lebanon

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: FT News

A spying campaign that uses fake versions of encrypted apps to hack smartphones has been traced to Lebanon’s intelligence agency, revealing the growing capabilities of nation-state hackers beyond the global superpowers.

The hackers created fake versions of WhatsApp, Telegram and […]

By |January 20th, 2018|Cyber News|

Pentagon considers nuclear response to retaliate for large cyber attacks

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: csoonline

Why use hack-back tactics when you can drop a nuke on your cyber attackers?

According to the draft for the Pentagon’s 2018 Nuclear Posture Review, the U.S. would consider using nuclear weapons to respond to non-nuclear attacks.

While the Pentagon’s proposed policy change suggests […]

By |January 20th, 2018|Cyber News|

Govt launches Cyber Surakshit Bharat initiative in partnership with top tech companies

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: India Times

The founding partners of the consortium are leading IT companies, Intel, Redhat and Dimension Data for the initiative which is the first public-private partnership of its kind.

Organisations such as Cert-In, NIC, NASSCOM and the FIDO Alliance, CISCO and consultancy […]

By |January 20th, 2018|Cyber News|

Threat actors are delivering the Zyklon Malware exploiting three Office vulnerabilities

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: securityaffairs

Researchers at FireEye reported the malware was used in attacks against organizations in the telecommunications, financial, and insurance sectors.

Zyklon has been spotted for the first time in 2016, it is a publicly available malware that could be used for multiple purposes such as espionage […]

By |January 18th, 2018|Cyber News|

Mirai Okiru: New DDoS botnet targets ARC-based IoT devices

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: csoonline

Well, this is bad…very bad. Mirai malware and its many variants which have targeted CPU architectures in the past, is now targeting the second most popular type of CPU core – ARC processors.

Meet Mirai Okiru, the Mirai variant targeting ARC processors, which […]

By |January 17th, 2018|Cyber News|

Cyber insurance in the 2018 regulatory landscape

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: csoonline

The year 2017 had no shortage of headlines pertaining to cyber incidents.  On the commercial side, you have the Equifax and Uber cases and on the government side, you have the DHS event.  These cyber incidents ran parallel to awareness campaigns run out of the […]

By |January 17th, 2018|Cyber News|

Centre plans setting up of Cyber Warrior Police Force to tackle internet-related crimes

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: HindustanTimes

The government has decided to set up a Cyber Warrior Police Force (CWPF) to tackle internet-related crimes such as cyber threats, child pornography and online stalking.

The CWPF is likely to operate under the National Information Security Policy and Guidelines wing […]

By |January 17th, 2018|Cyber News|