Iranian Hackers join forces against U.S. and Israeli Targets.

Iranian 'APT' hacking groups are likely combining to attack U.S. and Israeli  2010 Stuxnet worm attack on the Natanz nuclear plant that was eventually attributed to the U.S. and Israeli governments, Iran has been taking "cyber" seriously. The cyber-attack that took down 25% of the Iranian internet on February 8 has not been attributed to U.S. threat actors, let … Continue reading Iranian Hackers join forces against U.S. and Israeli Targets.

HOW EASY IS TO HACK U.S. ARMY.

U.S. Army was hacked by 52 hackers. GETTY "During five weeks between October 9 and November 15, 2019, the U.S. Army was hacked by a total of 52 hackers." Hack the Army 2.0 was a joint venture between the U.S. Department of Defense, the Defense Digital Service and the HackerOne bug bounty platform. The HackerOne hacker-powered … Continue reading HOW EASY IS TO HACK U.S. ARMY.

Iphone Vulnerable to Hacking exposed by google

Apple iPhone could be hacked remotely, within minutes demonstrated by Google Project Zero Google Project Zero’s ethical hackers showed just how easy it can be to access your iPhone or iPad without your knowledge. Security researcher Samuel Groß was able to remotely hack an iPhone within minutes, stealing passwords, text messages and emails with Apple id password only. … Continue reading Iphone Vulnerable to Hacking exposed by google

Bug Bounty program Extended to security researchers by Apple.

The Apple just dediced to up the ante by formally opening its extended bug bounty program to all researchers, accepting vulnerability reports for bug pertaining to iOS, iPadOS, macOS, tvOS, watchOS, and iCloud. Apple is also increasing its maximum bug bounty reward from $200,000 to $1,500,000, factored by the exploit chain's complexity and severity.Apple published … Continue reading Bug Bounty program Extended to security researchers by Apple.

Creating an Invisible Internet

Invisible Internet Creating an 'Invisible Internet' to stop police spying on cyber-crime deals being done on the dark net, research suggests. Instead of trading on marketplaces, criminals have turned to "gated" chat forums, invitation-only communities and encrypted apps. The change could make it hard for law enforcement agencies to spot and trace attacks, they warn. They also … Continue reading Creating an Invisible Internet

How Russian Hackers interfered in 2016 Presidential Election in 2016.How Trump was benefited from Russians?

Chip Somodevilla/Getty Images  Russian President Vladimir Putin denies Russia’s involvement and, being a friend, Putin even offered to help investigate whoever committed these crimes. Here is a detailed account of how Russian intelligence officers stole information from key Democratic groups during the 2016 presidential election. The hack was described in FBI special counsel Robert Mueller’s indictment against 12 … Continue reading How Russian Hackers interfered in 2016 Presidential Election in 2016.How Trump was benefited from Russians?

Taking down Global Internet and so the Entire World in Few Steps.See how it is possible?

SOURCE:PCCW Global Boost Internet Before I step into "how" lets unravel what "Internet is" and the complex mechanism behind it. In a few simple words Internet is a vast interconnected network of data centers spanning the globe. These data centers have exchange points, protocols and routes that they have to follow. With every year that … Continue reading Taking down Global Internet and so the Entire World in Few Steps.See how it is possible?