Sunday May 27, 2018
Home India Hoax bomb thr...

Hoax bomb threat jolts Delhi airport: officials tighten up scrutiny

0
//
75
Republish
Reprint

By NewsGram Staff-Writer

Six international flights got cancelled at Delhi and Bangalore airport owing to threat calls made within a span of ten minutes on Saturday.

According to reports, Delhi had to call back two flights when they were about to exit the Indian air space. Further, a third flight was stopped from approaching the runway immediately after a call was received at the Gurgaon call centre of Delhi International Airport limited (DIAL).

credit: news.statetimes.in
credit: news.statetimes.in

As stated by the security officials, the threat call warned of bombs on three flights. Two of the three flights were Hong Kong bound and the third was Zurich bound. A high level bomb threat committee looked into the threat call and declared the threat as specific, according to a statement made by an official of CISF( Central Industrial Security Force).

Both the flights bound to Hong Kong were asked by the air traffic control to withdraw and taken to the isolation bay and the Zurich bound flight was taken to another bay from the runaway.

The bomb disposal squad of the CiSF did a thorough checking of the escorted passengers and removed baggage from the cabins of the concerned flights, said a CISF official, as reported in Hindustan Times.

It was for the first time that the three isolation bays of the Delhi airport were put to use simultaneously; the bays had been constructed to take planes with explosives in them. The hoax bomb alerts acted as a litmus test for the CISF officials deputed with the duty to look over the security of the airport.

The CISF staff took around four hours to declare that the call was hoaxed after a proper scrutiny of the flights and frisking of the passengers. Hoax callers should be penalized thoroughly as it consumes a lot of time and over 600 passengers were subjected to precarity owing to the same, said an airport official as quoted in the leading daily.

Click here for reuse options!
Copyright 2015 NewsGram

Next Story

Another Security flaw is Revealed By Intel in its Chips

Intel has disclosed a new variant of the Spectre and Meltdown security flaws in the chips that hackers may use to extract sensitive data from hundreds of millions of computers and mobile devices.

0
//
20
With ML, an attacker doesn't even need to know what exactly is occurring as the computer is trained on a series of inputs and outputs of a system
Due to its nature, the chip is physically unclonable and can, thus, render the device invulnerable to hijacking, counterfeiting or replication by cyber-criminals. pixabay

Intel has disclosed a new variant of the Spectre and Meltdown security flaws in the chips that hackers may use to extract sensitive data from hundreds of millions of computers and mobile devices.

Intel is calling the new strain — Speculative Store Bypass (Variant 4) — and it is similar to the earlier flaw that taps into many of the same security vulnerabilities that were first revealed in January.

However, this time around it uses a different method to extract sensitive information, CNET quoted Intel as saying.

The new vulnerability also includes firmware updates for CPUs and Intel has already delivered microcode updates for Speculative Store Bypass in beta form to original equipment manufacturers.

Intel is classifying Variant 4 as a medium risk because many of the exploits it uses in web browsers, like Safari, Edge, and Chrome were fixed in the original set of patches, according to a blog post from the company.

IoT devices will become affordable with the help of Microchips.
Microchips, Wikimedia Commons

Intel has promised that the patches would be rolled out broadly in the next few weeks. The firmware updates would set the Speculative Store Bypass protection to off-by-default.

“If enabled, we have observed a performance impact of approximately two-to-eight per cent based on overall scores for benchmarks,” Leslie Culbertson, Intel’s Security Chief, was quoted as saying.

As a result, end users would have to pick between security or optimal performance.

Spectre and Meltdown vulnerabilities have been causing problems to companies like Intel, Arm and AMD that are major producers of chips for computers, laptops and mobile devices.

While Meltdown impacts only Intel chips, Spectre affects all other chips, including ARM and AMD. The vulnerabilities allow attackers to read sensitive information on users’ CPU.

Also Read: This Way China Can Help India In The Terms of Artificial Intelligence

While companies like Intel, Apple and Microsoft have issued updates to patch the flaws, the fixes have not always worked as intended, sometimes causing computer problems.

Earlier this year, following the news of the bugs getting out, all major tech players such as Microsoft, Google, Apple, including Intel, released security patches to help protect users from potential data theft. (IANS)

Next Story