Deep Web

Pierluigi Paganini November 20, 2014
A deep look into the Brazilian underground cyber-market

Trend Micro has published a new study on black cyber-markets focusing on product and services offered on the Brazilian underground. Trend Micro has published a new interesting report on the underground cyber-markets, this is a third study focused on the Brazilian cyber-underground offer, the previous ones analyzed Russian and Chinese marketplaces. The new study, exactly like […]

Pierluigi Paganini November 15, 2014
81 percent of Tor clients can be identified with traffic analysis attack

The research revealed that more than 81 percent of Tor clients can be de-anonymized by exploiting a new traffic analysis attack based on Netflow technology. A team of researchers conducted a study between 2008 and 2014 on the de-anonymization of the Tor users, the team worked to disclose their originating IP addresses. A group led by […]

Pierluigi Paganini September 17, 2012
The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines, according a raw estimation of some security experts clear web represents only a small portion of the […]

Pierluigi Paganini August 09, 2012
Traveling the Silk Road, study of the famous market places

Yes Guys, when we think to the deep web the media tell us only about its dark side, it’s considered the paradise of cybercrime, the reign of the theft, a place to escape, but is it true? The governments want you to ay far from the hidden web, because they cannot spy on you, the […]

Pierluigi Paganini July 04, 2012
Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber criminal project. Few months ago I wrote on the excellent customer relationship management (CRM) model implemented by its creators. Thanks a malware evolution dictated by market needs, the trojan has evolved in time, many instances […]