Skip to main content

Quantum Computing | Qubit, Basic Structure, Difference with Classical Computers, Applications and More

Computational problems, Yes, the Solution of computational problems, that can never be solved in a feasible time period by the existing supercomputers is the basic need of a Quantum computer.  Quantum Computers use quantum-mechanical phenomena like Superposition and Entanglement to perform computation. Superposition refers to the presence of a quantum particle like an atom or a photon in two states simultaneously, exactly it is not simultaneous but it spins so quickly that it appears to be in both positions at the same time. Entanglement is a physical phenomenon in which a group of quantum particles, interact, share spatial proximity in such a way that their quantum states remain dependent on one other even if they get separated by larger distance. Such particles show wave-like properties, and when frequency and waveform of these particles become identical, they are said to be in Coherence. Coherence is a mandatory condition to perform computing. In a Quantum System, Superposi...

How was Twitter hacked in 2020?

How Twitter hacking 2020 happened?

 



Recently Twitter accounts with a blue tick( shows the authenticity of a public interest account ) of big voices of the world like US Presidential election candidate Joe Biden, billionaire Elon Musk, tv star Kim Kardashian, former US President Barack Obama, and several others got hacked.

 Twitter Hacking News 2020.


The Hackers targeted their accounts and tried to reset their login credentials, and succeeded as well.

Nowadays we can easily transfer money just by using simple Twitter posts using the following Steps

  • The sender creates a voucher to @bank in the format #Pay Receiver's Twitter account Amount 
  • You will receive a passcode from @bank The sender shares the passcode with the Reciever.
  • The Receiver will receive a tweet from @bank and informing the Reciever that someone wants to send money to him with a link in the tweet.
  • The Reciever must need to authenticate himself by verifying his twitter User ID and account password.
  • Now the Reciever just needs to put the passcode shared by the Sender.
The Hackers took advantage of this facility and sent $100000 to the different email addresses as reported by Blockchain.

Blockchain is a Cryptocurrency wallet that records the exchange of cryptocurrency, and by design, it is resistant to modification means once a transaction happens it can never be modified.

The hackers targeted 130 twitter accounts and they managed to reset login credentials of 45 accounts.

In response to this attack, Twitter said that the tools accessed to carry out this attack are only available to our internal support( didn't reveal their names).

That means Twitter says that there was no technical vulnerability( flaw or bug ) in their system.

However, the attack was carried out by a group of young hackers.

They said that they were just middlemen and serving to a man who planned everything and told his name to be 'Kirk'.

After the attack took place, an Instagram account took the responsibility for the attack and said that the money would be used for charity.

This is one of the biggest attacks in recent years.

Now the questions that must be answered are-

  • Why should people trust Twitter?
  • Is Twitter a secure platform to be used for financial transactions?

Please Stay tuned, Content will be updated.


You may be interested in

 
         
 

Comments

Popular Posts.......

Cell Phones | Working Principle, Radio Waves

Cell phones are basically full-duplex radio transmitters and receivers , that are capable of transmitting and receiving radio signals using an  antenna . Full duplex means both the sender and recipient can talk at the same time but at different frequencies. A cell phone uses two frequencies per call, one for speaking and one listening. Digital Cell phone Radio waves occupy the range of  30 Hz to 300 GHz with wavelengths of 10000 km to 1 mm respectively in the electromagnetic spectrum. Why Radio waves are used in communication? Radio waves are transmitted easily through the air. They don't cause damage to the human body. These waves can be easily reflected to change their direction. How cell phones work? Your phone converts the radio waves into electrical signals and then into voice, similarly, voice is converted into electrical signals and then into radio waves . Cell phones operate within the cells . Each cell has a hexagonal shape . A typical cell occupies an area of 26 s...

Quantum Computing | Qubit, Basic Structure, Difference with Classical Computers, Applications and More

Computational problems, Yes, the Solution of computational problems, that can never be solved in a feasible time period by the existing supercomputers is the basic need of a Quantum computer.  Quantum Computers use quantum-mechanical phenomena like Superposition and Entanglement to perform computation. Superposition refers to the presence of a quantum particle like an atom or a photon in two states simultaneously, exactly it is not simultaneous but it spins so quickly that it appears to be in both positions at the same time. Entanglement is a physical phenomenon in which a group of quantum particles, interact, share spatial proximity in such a way that their quantum states remain dependent on one other even if they get separated by larger distance. Such particles show wave-like properties, and when frequency and waveform of these particles become identical, they are said to be in Coherence. Coherence is a mandatory condition to perform computing. In a Quantum System, Superposi...

Third-Party Apps | Meaning, Download Risks and Security Measures

What are Third-party apps? Third-party apps are apps developed by someone other than your phone manufacturer( Apple, Nokia, Motorola...) or Operating system provider(Android, iOS...).                                                                                       Third-party Apps Such apps are often downloaded by us to get any specific task done but they can be a threat to the security of our phones and even to our bank accounts. Because these apps always ask us to grant permissions like using Storage, Contacts, Microphone, Location, etc. Using these permissions they can easily access our private information such as passwords, user IDs, documents, media files, etc. How third-party apps are dangerous to our phone's security? These apps are often embedded (attached f...

5G Technology | Bands, Millimetre Wave 5G, Beam Steering, Applications

What is 5G? 5G or Fifth Generation technology standard for Mobile Networks enables users to use ultra-high-speed data transmission facility, a peak speed of 20 Gbps with a maximum latency of 4 milliseconds . 5G Cellular Network Such high-speed data transmission is attained by higher-frequency radio-waves . The higher frequency radio waves have a shorter range (c   = f • λ ), so to provide a wide range  5G network requires more number of cells. 5G network technologies operate on bands like Low band 5G (600-700 MHz, a little faster than 4G) Mid band 5G (2.5-3.7 GHz, download speed   100-900  Mbps ) High band 5G (25-39 GHz, download speed 1 Gbps) Millimeter Waves 5G (30-300 GHz, download speed 20 Gbps) How much faster than 4G LTE (Long Term Evolution) The bandwidth of 4G LTE is  600-700 MHz  with a peak speed of 5-12 Mbps while the bandwidth of 5G is 25-300  GHz with a peak speed of 20Gbps The peak latency of 4G LTE is 20ms while 5G gives us the ma...