InShortViral: Teen hacked into the reputed CIA director email account, James Clapper, it is claimed that several account has been compromised yesterday report.
The US intelligence agencies really not certain distance, and a few months ago they just hacked the CIA director Brennan’s email account, and now a comeback, directly break the US National Intelligence Director James Clapper several private accounts have been compromised by a teenager who claimed as a hacker.
US National Intelligence Director Personal Email Hacked
According to the report, these hackers have black out CIA director email is the same group of people, they claim to have mastered the Clapper several private accounts, including email and telephone accounts. Hackers even engage in mischief, the Clapper home phone all transferred to the freedoms of the Palestinian Campaign Office.
However, the US Director of National Intelligence Office spokesman Brian Hale said they had informed of the matter and reported the situation to the US intelligence agencies.
In recent years, these hackers targeting the heads of US intelligence agencies. CIA director, they are targeting the US Department of Defense because of a link to be implanted malicious code.
In both cases, hackers use what is not sophisticated computer technology, they use the human weakness of the victim.
Previously, Brennan received malicious content in his own mailbox and seriously he was very angry after those teen hacked his CIA personal mail., he said the future hackers will become the biggest enemy of the National Intelligence and Security Agencies.
“Hackers are doing very wicked, he will make you feel a sense of insecurity. We must make great efforts to address this new threat.” Brennan emphasizes in his speech.
Security experts say such attacks belongs to the category of social engineering, because the hackers did not use any new technology, they are just pretending to fool the customer service users. Fortunately, however, this approach is not perfect.
In fact, to combat this type of hacker, the most effective method is a two-step authentication, because the phone in the hands of users, if someone wants to remotely change the password, they must learn mobile phone of the users to receive a random password, which is almost impossible.