The research revealed that more than 81 percent of Tor clients can be de-anonymized by exploiting a new traffic analysis attack based on Netflow technology. A team of researchers conducted a study between 2008 and 2014 on the de-anonymization of the Tor users, the team worked to disclose their originating IP addresses. A group led by […]
What is changed after the law enforcement conducted the takedown of several illegal marketplaces as part of the Operation Onymous? The recent shutdown of several black market places in the Tor network, including the popular SilkRoad 2.0, has captured the attention of media of the extension of illegal activities in the part of the web […]
A group of hackers was identified by the FBI while trying to sale a mockup of the XBox One for $5,000. A group of men was accused of running a hacking campaign that lasted at least three years and which hit the gaming industry to steal intellectual properties. Dylan Wheeler, 19, of Perth said in an interview […]
The FBI Operational Technology Division which is responsible for malware analysis opens its Malware Investigator portal to the private industry. The FBI has opened its Malware Investigator portal to industry in order to information sharing on this type of cyber threat and to improve incident response in case  of attacks against. The FBI hopes to speed […]
DoJ proposal is trying to legitimate FBI hacking operations against Internet users that make use of any kind of anonymizing technology. The FBI wants greater authority to hack overseas computers, according to a law professor. The Department of Justice (DoJ) is declaring war to online anonymity, its proposal to amend Rule 41 of the Federal […]
Google has announced that its new Android L will encrypt users’ data by default, the rise of the User Controlled Encryption paradigm. Google decided to make a further step to improve security of its customers enabling data encryption by default in the next version of Android OS. According to a Google spokesman, encryption on Android devices is already […]
A Hacker claims to have hacked the network of Gamma International firm and he has leaked docs related to the malware-for-government FinFisher. Earlier this week the British company Gamma International appears to have been hacked and a collection of files from its systems have been leaked on the Internet. The security firm is popular because it […]
A report disclosed by Wired suggests that the FBI is using a malware to identify Tor users by infecting machines on a large scale. It’s not a mystery that usage of the Tor network represents a problem for investigators of law enforcement agencies and for government entities that need to track users on the popular anonymizing network. […]
Executing an order of a Nevada Court, Microsoft has seized domains belonging to the No-IP.com Dynamic DNS Service affecting the traffic of million users. Microsoft has executed a large-scale operation against a malware network thought to be responsible for more than 7.4 million infections of Windows machines worldwide. The operation conducted by Microsoft has brought down millions of […]
ENISA and Europol have signed an agreement with the intent to facilitate the cooperation in the fight to the cyber criminal activities. The fight to the cybercrime needs a joint effort of governments, law enforcement agencies and private entities. Cyber threats are becoming even more sophisticated and bad actors behind them are structured in efficient organizations difficult […]