Guccifer 2.0 Hacks & Leaks

Guccifer 2.0 Hacks & Leaks

Much has been made of the hacker Guccifer 2.0 and his three published leaks from the Democratic National Committee (DNC) servers. There have been hundreds of pages that have been released and also passing on documents to Wikileaks whom have stated they have enough alone to indict presumptive Democratic Presidential candidate Hilary Clinton.

An investigation led by the DNC found that Guccifer 2.0 was an agent of the Russian government, which the hacker vehemently denies. What has been of more interest is the content of the leaks while also containing evidence of collusion between the DNC and Hilary Clinton before her announced run for the presidency (which has led to a lawsuit from Bernie Sanders supporters).

While portions of the leaks had to deal with DNC opposition efforts against presumptive Republican Presidential candidate Donald Trump and have shed light on the ongoing corruption concerns with Hillary Clinton, the most interesting aspect of the leak is surrounding just how easy it is for hackers to access important documents.

While Guccifer 2.0 has stated that he is an Eastern European male, he is extremely confident that he will not be captured by authorities. It’s likely that the small bit of information he willingly gave to reporters will aid in an investigation to find his exact location and real motivations behind his actions.

Whether Guccifer 2.0 will be found is an open question as is the ultimate influence the leaks will have on the American political system.

What's Hottest

New FAA drone regulations

With the purpose of keeping the standard of having the safest and most complex airspace in the world, the Department of Transportation’s Federal Aviation Administration released in August a series of regulations for the lawful use of unmanned aircraft systems (UAS) or “drones”.…

Companies to Block Extremist Videos

While companies are silent on whether rumors over the use of technology to automatically delete extremist content from their sites, it has been confirmed that they have met with the Counter Extremism Project (CEP) to adopt similar measures that Google, Microsoft, and Internet Service Providers used…

Japan abandons lost satellite

Astro-H satellite, also known as “Hitomi”, was a satellite sent by Japan´s space agency on February 17 to study black holes. The idea was primarily to study X-rays emitted by them. However, on March 26, contact with the satellite was lost. This brought all Japanese most brilliant…

Malvertisers use digital fingerprints

If you’ve ever owned a PC, odds are pretty good that at some point you’ve been a victim of malvertising. This is when you visit a website, and it installs a program onto your computer. Often, this happens without the user being aware of it. As many of us have experienced, these programs…

What is Bot Fraud?

Fraud is an issue in our modern society that we just cannot escape. Many people know of identity theft, online scams, and other measures of deception online, but what is bot fraud? Can robots really be fraudulent? Yes, robots can be created to steal identities online and pose many other threats to…

What is cellphone spyware & who uses it?

As the word itself suggests, cellphone spyware or spy software is precisely that: spying on a target phone in such a way that a person can have access to practically all cellphone activity. Now, it sounds like NSA would have access to all your activity and completely strip us of our privacy. This is…

Spot Light

China’s Tesla autopilot crash caused by the words “zidong jiashi”

Another controversy for Tesla’s autopilot - another crash was reported in China. The accident is the first recorded in China and occurred months after a terrible crash in Florida. These events have added pressure on regulators and auto industry executives to tighten up regulations on autopilot…

Read More

News Flash