1178 results
A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative to the popular Tor network. Hornet allows for anonymous web surfing protecting the user’s privacy. The principal advantage HORNET has respect other anonymizing networks like Tor, is the speed. The Hornet is able to manage anonymous traffic […]
Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm HackingTeam has suffered. In this article we will go through an issue with a company that buys and sells exploits (Netragard) and the steps it was forced to take since one of their clients was […]
Thi post was written by the security experts and colleagues at RedSocks, they explored the argument of the “Attribution” for the Hacking Team data Breach. Attribution is probably one of the toughest things to deal with during a major Cyber Security breach, yet it is one of the most demanded skills.Earlier in the first incident […]
The experts at Trend Micro discovered GamaPoS, a new PoS malware that is spread through the Andromeda botnet in the US and Canada. GamaPoS is the name of the last PoS malware used by criminal crews to steal credit card data from the memory of payment systems. Security experts at Trend Micro discovered which discovered the […]
A security researcher conducted an experiment to demonstrate that someone is sniffing passing traffic from Tor network exit nodes. When talking about Tor network, normally everyone assumes that you have an end-to-end security, but someone believes it may be wrong as it was discovered by the security researcher Chloe. Tor network is free and it […]
Researchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. According to researchers from the Expertise Centre for Digital Media at the Hasselt University in Belgium, the frame aggregation mechanism implemented by the 802.11n wireless networking standard is affected by a security a […]
The silent war between black markets in the deep web, Mr Nice Guy hired a blackmailer to hit TheRealDeal and its competitors. TheRealDeal hacked back. Today I desire to tell you a story of ordinary war among operators behind principal black markets. A few weeks ago I have published a detailed analysis of a new black market […]
A group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. Early detection of a data breach is crucial to limit the data exposure, unfortunately sometimes they are necessary many months before a breach is detected by security experts. To […]
Find out more about online crime and understand why it can be so fruitful, unlike other forms of crime, in order to thoroughly protect your financial transactions and banking details. Unfortunately, nowadays due to the fact that we are used to going on vacation and hold a lot of money in our pockets, it is […]
Thomas Jiřikovský suspected of owning the black marketplace Sheep Marketplace, an alternative for Silk Road, was arrested while trying to buy a luxury house. The Operation Onymous and the seizure of the popular Silkroad black market have deeply influenced the underground ecosystem. The closure of Silkroad advantaged other black markets like Evolution and Sheep Marketplace. The Evolution […]