A novel way that hackers could steal sensitive data from a highly secured computer: by tapping into the vibrations from a cooling system fan discovered by Israeli Researchers. According to researchers data encoded by hackers into fan vibrations could be transmitted to a smartphone placed in the vicinity of the targeted computer.Computers vibrate at a frequency … Continue reading A NEW WAY TO HACK DATA VIA COOLING FAN VIBRATION
Iranian 'APT' hacking groups are likely combining to attack U.S. and Israeli 2010 Stuxnet worm attack on the Natanz nuclear plant that was eventually attributed to the U.S. and Israeli governments, Iran has been taking "cyber" seriously. The cyber-attack that took down 25% of the Iranian internet on February 8 has not been attributed to U.S. threat actors, let … Continue reading Iranian Hackers join forces against U.S. and Israeli Targets.
U.S. Army was hacked by 52 hackers. GETTY "During five weeks between October 9 and November 15, 2019, the U.S. Army was hacked by a total of 52 hackers." Hack the Army 2.0 was a joint venture between the U.S. Department of Defense, the Defense Digital Service and the HackerOne bug bounty platform. The HackerOne hacker-powered … Continue reading HOW EASY IS TO HACK U.S. ARMY.
Apple iPhone could be hacked remotely, within minutes demonstrated by Google Project Zero Google Project Zero’s ethical hackers showed just how easy it can be to access your iPhone or iPad without your knowledge. Security researcher Samuel Groß was able to remotely hack an iPhone within minutes, stealing passwords, text messages and emails with Apple id password only. … Continue reading Iphone Vulnerable to Hacking exposed by google
The Apple just dediced to up the ante by formally opening its extended bug bounty program to all researchers, accepting vulnerability reports for bug pertaining to iOS, iPadOS, macOS, tvOS, watchOS, and iCloud. Apple is also increasing its maximum bug bounty reward from $200,000 to $1,500,000, factored by the exploit chain's complexity and severity.Apple published … Continue reading Bug Bounty program Extended to security researchers by Apple.
Invisible Internet Creating an 'Invisible Internet' to stop police spying on cyber-crime deals being done on the dark net, research suggests. Instead of trading on marketplaces, criminals have turned to "gated" chat forums, invitation-only communities and encrypted apps. The change could make it hard for law enforcement agencies to spot and trace attacks, they warn. They also … Continue reading Creating an Invisible Internet
Chip Somodevilla/Getty Images Russian President Vladimir Putin denies Russia’s involvement and, being a friend, Putin even offered to help investigate whoever committed these crimes. Here is a detailed account of how Russian intelligence officers stole information from key Democratic groups during the 2016 presidential election. The hack was described in FBI special counsel Robert Mueller’s indictment against 12 … Continue reading How Russian Hackers interfered in 2016 Presidential Election in 2016.How Trump was benefited from Russians?