U.S. Army was hacked by 52 hackers. GETTY "During five weeks between October 9 and November 15, 2019, the U.S. Army was hacked by a total of 52 hackers." Hack the Army 2.0 was a joint venture between the U.S. Department of Defense, the Defense Digital Service and the HackerOne bug bounty platform. The HackerOne hacker-powered … Continue reading HOW EASY IS TO HACK U.S. ARMY.
Invisible Internet Creating an 'Invisible Internet' to stop police spying on cyber-crime deals being done on the dark net, research suggests. Instead of trading on marketplaces, criminals have turned to "gated" chat forums, invitation-only communities and encrypted apps. The change could make it hard for law enforcement agencies to spot and trace attacks, they warn. They also … Continue reading Creating an Invisible Internet
Chip Somodevilla/Getty Images Russian President Vladimir Putin denies Russia’s involvement and, being a friend, Putin even offered to help investigate whoever committed these crimes. Here is a detailed account of how Russian intelligence officers stole information from key Democratic groups during the 2016 presidential election. The hack was described in FBI special counsel Robert Mueller’s indictment against 12 … Continue reading How Russian Hackers interfered in 2016 Presidential Election in 2016.How Trump was benefited from Russians?
SOURCE:PCCW Global Boost Internet Before I step into "how" lets unravel what "Internet is" and the complex mechanism behind it. In a few simple words Internet is a vast interconnected network of data centers spanning the globe. These data centers have exchange points, protocols and routes that they have to follow. With every year that … Continue reading Taking down Global Internet and so the Entire World in Few Steps.See how it is possible?
Cybercriminals can now steal money by taking advantage of the one security measure every internet user has been trained to trust: the green padlock in web browsers' This is how hackers managed to take down the entire DNS infrastructure of a Brazilian bank in order to rob customers. By using certificates from Lets Encrypt, the … Continue reading How to take down DNS Infrastructure of Bank Easily.Find out how?
IoT looks likely to revolutionise the way we live, work, travel and play, it could also represent a threat to the IT networks that support it. Over 5,000 connected devices on a US university campus, including vending machines, were recently infected by malware that caused a form of DDoS attack. Repeated and frequent DNS queries … Continue reading How to secure DNS from IOT threats that cost million $ in damage?
can blockchain help create the internet of trust? At the moment, data is held in centralised databases, such as a data centre, but if the company controlling the data is compromised, with say a simple phishing attack, you have a problem. “One person to click on link, then the whole data is compromised,” this leads … Continue reading How to create the Internet of trust?