• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Hilary Clinton’s Presidential Campaign also Hacked in Attack on Democratic Party

September 4, 2016 by Mengxue Ni 2 Comments

Hillary-Clinton-Presidential-Campaign-hacked

I believed everyone had heard more or less about that Hilary Clinton’s computer systems were hacked about two months ago and about 20,000 emails from top Democratic National Convention (DNC) officials were leaked on WikiLeaks. According to the WikiLeaks Founder Julian Assange, he still had more data from the DNC hack and some could eventually result in the arrest of Hilary Clinton.

This action could influence the presidential election in a tremendous way. Hack and leakage is absolutely illegal, but it may help some people to see the real dark side of politic and even Hilary Clinton. If the contents of the emails are true, will you still vote for Hilary Clinton? The candidate of president of USA still have cyber security problem, how could he/she protect our privacy? Or maybe other candidate of president hired hackers to reveal any information they want to know. This makes me very insecure and felt disappointed about the country.

Link:http://thehackernews.com/2016/07/hillary-clinton-hacked.html

Filed Under: Week 02: TCP/IP and Network Architecture Tagged With:

Reader Interactions

Comments

  1. Wade Mackey says

    September 5, 2016 at 11:40 pm

    One of the things I hope all of you will come to understand as we go through the semester is that there is no such thing as a “secure” system. All any of us can hope is to harden are systems to make it more difficult. If an attacker is determined, they will get in.

    Log in to Reply
  2. Noah J Berson says

    September 7, 2016 at 5:08 pm

    I feel a bit hopeful knowing that the President doesn’t get to make a lot of technology calls. Obama was stuck with a Blackberry for years. He has finally upgraded to a smartphone, but it is so locked down that it can be considered a dumbphone. It can’t do pictures, music, or texting at all. I believe the staff around the President will be able to consult with the top offices of our spy agencies to make sure secrets stay safe in the White House.

    source: http://www.theverge.com/2016/6/11/11910306/obama-upgrades-from-blackberry

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in