Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

ProtonMail filters this into its junk folder: New claim it goes out of its way to help cops spy

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Updated ProtonMail, a provider of encrypted email, has denied claims that it voluntarily provides real-time surveillance to authorities.

Earlier this month, Martin Steiger, a lawyer based in Zurich, Switzerland, attended a presentation in which public prosecutor Stephan Walder, who heads the […]

By |May 30th, 2019|Cyber News|

IEEE tells contributors with links to Chinese corp: Don’t let the door hit you on Huawei out

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Compsci academics are startled by how the US-based IEEE is complying with American sanctions on Huawei. That includes halting peer review by anyone connected to the Chinese company – and banning them from buying IEEE-branded coffee mugs.

The New York-headquartered […]

By |May 30th, 2019|Cyber News|

Guilty of hacking in the UK? Worry not: Stats show prison is unlikely

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Analysis Nearly 90 per cent of hacking prosecutions in the UK last year resulted in convictions, though the odds of dodging prison remain high, an analysis by The Register has revealed.

Government data from the last 11 years revealed the full extent of […]

By |May 29th, 2019|Cyber News|

Contain yourself, Docker: Race-condition bug puts host machines at risk… sometimes, ish

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

A vulnerability in all versions of Docker can be potentially exploited by miscreants to escape containers’ security protections, and read and write data on host machines, possibly leading to code execution.

This is according to senior SUSE software engineer Aleksa […]

By |May 29th, 2019|Cyber News|

Two weeks after Microsoft warned of Windows RDP worms, a million internet-facing boxes still vulnerable

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The critical Windows Remote Desktop flaw that emerged this month may have set the stage for the worst malware attack in years.

The vulnerability, designated CVE-2019-0708 and dubbed BlueKeep, can be exploited by miscreants to execute malicious code and install malware on […]

By |May 29th, 2019|Cyber News|

Germany mulls giving end-to-end chat app encryption das boot: Law requiring decrypted plain-text is in the works

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Government officials in Germany are reportedly mulling a law to force chat app providers to hand over end-to-end encrypted conversations in plain text on demand.

According to Der Spiegel this month, the Euro nation’s Ministry of the Interior wants a new set […]

By |May 29th, 2019|Cyber News|

Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The maker of vehicle license plate readers used extensively by the US government and cities to identify and track citizens and immigrants has been hacked. Its internal files were pilfered, and are presently being offered for free on the […]

By |May 27th, 2019|Cyber News|

Why telcos ‘handed over’ people’s GPS coords to a bounty hunter: He just had to ask nicely

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

A bounty hunter was able to get the live location of a number of different individuals from American cellphone networks through a single phone call, it is claimed.

Matthew Marre was charged  last month with allegedly obtaining “confidential phone record information […]

By |May 27th, 2019|Cyber News|

British Army cyber ‘n’ psyops unit 77 Brigade can’t even brainwash civvies into helping it meet recruitment targets

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

The British Army’s psyops unit 77 Brigade is still falling short of recruiting targets, despite cyber skills being bigged up repeatedly by the military and government.

The unit – whose remit covers information operations, psyops and similar shady things – […]

By |May 27th, 2019|Cyber News|

We’ll hack back at Russians, declare UK ministers in cyber-Blitz blitz

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

British ministers are stepping up their rhetoric on cyber warfare, with £22m to be splurged on embiggening an “offensive hacking” unit as Foreign Secretary Jeremy Hunt vowed to retaliate against Russian cyber-attacks.

In a speech delivered this morning at Lancaster […]

By |May 27th, 2019|Cyber News|