HOW EASY IS TO HACK U.S. ARMY.

U.S. Army was hacked by 52 hackers. GETTY "During five weeks between October 9 and November 15, 2019, the U.S. Army was hacked by a total of 52 hackers." Hack the Army 2.0 was a joint venture between the U.S. Department of Defense, the Defense Digital Service and the HackerOne bug bounty platform. The HackerOne hacker-powered … Continue reading HOW EASY IS TO HACK U.S. ARMY.

Iphone Vulnerable to Hacking exposed by google

Apple iPhone could be hacked remotely, within minutes demonstrated by Google Project Zero Google Project Zero’s ethical hackers showed just how easy it can be to access your iPhone or iPad without your knowledge. Security researcher Samuel Groß was able to remotely hack an iPhone within minutes, stealing passwords, text messages and emails with Apple id password only. … Continue reading Iphone Vulnerable to Hacking exposed by google

Creating an Invisible Internet

Invisible Internet Creating an 'Invisible Internet' to stop police spying on cyber-crime deals being done on the dark net, research suggests. Instead of trading on marketplaces, criminals have turned to "gated" chat forums, invitation-only communities and encrypted apps. The change could make it hard for law enforcement agencies to spot and trace attacks, they warn. They also … Continue reading Creating an Invisible Internet

How Russian Hackers interfered in 2016 Presidential Election in 2016.How Trump was benefited from Russians?

Chip Somodevilla/Getty Images  Russian President Vladimir Putin denies Russia’s involvement and, being a friend, Putin even offered to help investigate whoever committed these crimes. Here is a detailed account of how Russian intelligence officers stole information from key Democratic groups during the 2016 presidential election. The hack was described in FBI special counsel Robert Mueller’s indictment against 12 … Continue reading How Russian Hackers interfered in 2016 Presidential Election in 2016.How Trump was benefited from Russians?

Taking down Global Internet and so the Entire World in Few Steps.See how it is possible?

SOURCE:PCCW Global Boost Internet Before I step into "how" lets unravel what "Internet is" and the complex mechanism behind it. In a few simple words Internet is a vast interconnected network of data centers spanning the globe. These data centers have exchange points, protocols and routes that they have to follow. With every year that … Continue reading Taking down Global Internet and so the Entire World in Few Steps.See how it is possible?

How to take down DNS Infrastructure of Bank Easily.Find out how?

Cybercriminals can now steal money by taking advantage of the one security measure every internet user has been trained to trust: the green padlock in web browsers' This is how hackers managed to take down the entire DNS infrastructure of a Brazilian bank in order to rob customers. By using certificates from Lets Encrypt, the … Continue reading How to take down DNS Infrastructure of Bank Easily.Find out how?

How to secure DNS from IOT threats that cost million $ in damage?

IoT looks likely to revolutionise the way we live, work, travel and play, it could also represent a threat to the IT networks that support it. Over 5,000 connected devices on a US university campus, including vending machines, were recently infected by malware that caused a form of DDoS attack. Repeated and frequent DNS queries … Continue reading How to secure DNS from IOT threats that cost million $ in damage?