Deep Web

New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and…

7 years ago

Dark Web users of a child porn website tracked after visiting file sharing site

The U.S. Department of Homeland Security has identified dark web users after they downloaded media through a file sharing services. The…

7 years ago

Zomato Data breach – Nearly 17 million usernames and hashed passwords stolen

Nearly 17 million Zomato usernames and hashed passwords have been stolen by hackers., the company suspects it is an insider's…

7 years ago

Hackers are selling fake diplomas and certifications in the dark web

According to Israeli threat intelligence firm Sixgill, certifications and fake diplomas are very cheap and easy to buy in the…

7 years ago

European law enforcement takes down Darknet marketplace

Europol supported the Slovak NAKA crime unit in an operation that resulted in the seizure of the Bloomsfield darknet marketplace.…

7 years ago

Graph theory applied to a portion of the Dark Web shows it a set of largely isolated dark silos

A group of researchers conducted a study on the Dark Web leveraging the Graph theory. This hidden space appears as…

7 years ago

US Court sentenced Russian hacker Roman Seleznev to 27 years in jail for hacking

Roman Seleznev, the son of the prominent Russian Parliament member Valery Seleznev was sentenced to 27 years in jail for…

7 years ago

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

Security firm Flashpoint published an interesting paper titled, 'Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies' about cybercriminal communications of threat…

7 years ago

Karmen Ransomware, a cheap RaaS service that implements anti-analysis features

Experts at Recorded Future have discovered a cheap RaaS, the Karmen Ransomware that deletes decryptor if detects a sandbox. Security experts…

7 years ago

Are you searching for stolen US University email credentials? Search on the Dark Web

According to a new research published by the nonprofit DCA, millions of stolen US University email credentials are available for…

7 years ago

This website uses cookies.