Please disable your Ad Blocker to better interact with this website.

The computer age has made many things easier and more readily available, however, like any advancement, it comes with its own risks. That risk is the chance anyone else gaining access to whatever information or secrets are stored on any computer anywhere, as long as that computer is linked to the internet.

As we’ve seen in recent years, hackers seem to be able to access any computer system they want, regardless of security measures. We’ve seen hundreds of millions of credit card numbers hacked and stolen from various retailers and the number of stolen identities and finances has also skyrocketed.

The latest report of hackers comes from Seoul, South Korea where they claim that North Korean hackers managed to access top secret documents that contain military plans on how to deal with North Korea.

North Korean hackers stole a huge trove of classified U.S. and South Korean military documents last year, including a plan to “decapitate” the leadership in Pyongyang in the event of war, a lawmaker in Seoul said Tuesday.

The revelations, if substantiated, come at a time of heightened tensions over North Korea, with President Trump most recently saying that “only one thing will work” when it comes to Pyongyang, hinting at military action.

The defense minister in Japan, a close military ally of the United States, said Tuesday that Trump might take such action against North Korea as soon as next month.

“I think President Trump will judge in the middle of November how effective pressure and other efforts have been,” Itsunori Onodera told reporters in Tokyo. “If there have been no changes from North Korea, it’s possible that the U.S. will take severe measures.” …

The only positive that could come of this is that the hack and stolen plans from September 2016 when Obama was still in the White House and he had yet to take any kind of strong action against North Korea. Now that Trump is President and he has changed his defense personnel, new strategy has surely been developed, hopefully stored somewhere where hackers are unable to access.

READ MORE HERE

 

GET MORE STORIES LIKE THIS

IN YOUR INBOX!

Sign up for our daily email and get the stories everyone is talking about.

GET MORE STORIES LIKE THIS

IN YOUR INBOX!

Sign up for our daily email and get the stories everyone is talking about.