A NEW WAY TO HACK DATA VIA COOLING FAN VIBRATION

A novel way that hackers could steal sensitive data from a highly secured computer: by tapping into the vibrations from a cooling system fan discovered by Israeli Researchers. According to researchers data encoded by hackers into fan vibrations could be transmitted to a smartphone placed in the vicinity of the targeted computer.Computers vibrate at a frequency … Continue reading A NEW WAY TO HACK DATA VIA COOLING FAN VIBRATION

Iranian Hackers join forces against U.S. and Israeli Targets.

Iranian 'APT' hacking groups are likely combining to attack U.S. and Israeli  2010 Stuxnet worm attack on the Natanz nuclear plant that was eventually attributed to the U.S. and Israeli governments, Iran has been taking "cyber" seriously. The cyber-attack that took down 25% of the Iranian internet on February 8 has not been attributed to U.S. threat actors, let … Continue reading Iranian Hackers join forces against U.S. and Israeli Targets.

HOW EASY IS TO HACK U.S. ARMY.

U.S. Army was hacked by 52 hackers. GETTY "During five weeks between October 9 and November 15, 2019, the U.S. Army was hacked by a total of 52 hackers." Hack the Army 2.0 was a joint venture between the U.S. Department of Defense, the Defense Digital Service and the HackerOne bug bounty platform. The HackerOne hacker-powered … Continue reading HOW EASY IS TO HACK U.S. ARMY.

Iphone Vulnerable to Hacking exposed by google

Apple iPhone could be hacked remotely, within minutes demonstrated by Google Project Zero Google Project Zero’s ethical hackers showed just how easy it can be to access your iPhone or iPad without your knowledge. Security researcher Samuel Groß was able to remotely hack an iPhone within minutes, stealing passwords, text messages and emails with Apple id password only. … Continue reading Iphone Vulnerable to Hacking exposed by google

Bug Bounty program Extended to security researchers by Apple.

The Apple just dediced to up the ante by formally opening its extended bug bounty program to all researchers, accepting vulnerability reports for bug pertaining to iOS, iPadOS, macOS, tvOS, watchOS, and iCloud. Apple is also increasing its maximum bug bounty reward from $200,000 to $1,500,000, factored by the exploit chain's complexity and severity.Apple published … Continue reading Bug Bounty program Extended to security researchers by Apple.

Creating an Invisible Internet

Invisible Internet Creating an 'Invisible Internet' to stop police spying on cyber-crime deals being done on the dark net, research suggests. Instead of trading on marketplaces, criminals have turned to "gated" chat forums, invitation-only communities and encrypted apps. The change could make it hard for law enforcement agencies to spot and trace attacks, they warn. They also … Continue reading Creating an Invisible Internet

How Russian Hackers interfered in 2016 Presidential Election in 2016.How Trump was benefited from Russians?

Chip Somodevilla/Getty Images  Russian President Vladimir Putin denies Russia’s involvement and, being a friend, Putin even offered to help investigate whoever committed these crimes. Here is a detailed account of how Russian intelligence officers stole information from key Democratic groups during the 2016 presidential election. The hack was described in FBI special counsel Robert Mueller’s indictment against 12 … Continue reading How Russian Hackers interfered in 2016 Presidential Election in 2016.How Trump was benefited from Russians?