Image Credit: @tjhorner
Today, election hacking is not just about hacking voting machines, rather it now also includes hacking and leaking dirty secrets of the targeted political parties—and there won’t be a perfect example than the last year’s US presidential election.
But, in countries like America, even hacking electronic voting machines is possible—that too, in a matter of minutes.
Posted in def con hacking conference, election hacking, electronic voting machine, hacking competition, hacking voting machine, voting machine | Comments (0)
Why we can’t detect all security loopholes and patch them before hackers exploit them?
Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.
Now to solve this hurdle, DARPA
Posted in automated penetration testing, capture the flag, DARPA, def con hacking conference, hacking competition, hacking conference, Penetration testing tools, vulnerability assessment, vulnerability assessment tools | Comments (0)
With the growing number of cyber attacks and data breaches, a significant number of companies and organizations have started Bug Bounty Programs to encourage hackers and security researchers to find and responsibly report bugs in their services and get a reward.
Now, even pornography sites are starting to embrace bug bounty practices in order to safeguard its user’s security.
<!– adsense –>
Posted in Bug Bounty Program, hacking competition, hacking news, Vulnerability, website hacking, website security | Comments (0)
The United States Department of Defense (DoD) has the plan to boost their internal and network security by announcing what it calls “the first cyber Bug Bounty Program in the history of the federal government,” officially inviting hackers to take up the challenge.
Dubbed “Hack the Pentagon,” the bug bounty program invites the hackers and security researchers only from the United States to
Posted in Bug Bounty Program, capture the flag, ethical hacking training, Hack the Pentagon, hacking competition, hacking conference, hacking news, The Pentagon, United States, US Military | Comments (0)
Great news for Hackers and Bug-hunters who enjoy Programming and playing around with Software.
A worldwide group of like-minded computer programmers is hosting The Next Hacker IPPC event on the 26th and 27th of February in Berlin, Germany, where participants can meet hackers and programmers from around the world while getting an opportunity to participate in one of the major
Posted in bug hunting, hackathon, hacker next conference, hacking competition, hacking conference, Java, Java Programming, Programming, Programming competition | Comments (0)
The Annual Pwn2Own Hacking Competition 2015 held in Vancouver is over and participants from all over the world nabbed $557,500 in bug bounties for 21 critical bugs in top four web browsers as well as Windows OS, Adobe Reader and Adobe Flash.
During the second and final day of this year’s hacking contest, the latest version of all the four major browsers including Microsoft Internet
Posted in browser hacking, Google Chrome, hacking competition, hacking news, Jung Hoon Lee hacker, lokihardt hacker, Mozilla Firefox, PWN2OWN, Web browser security | Comments (0)