Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in the anonymizing network. Is the Mevade malware the real responsible for the spike observed in the number of users directly connected to the Tor network? In an article I wrote recently I analyzed the impact on the use […]
The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor network is the primary reason for the use of the popular network, hacktivists, whistleblowers, hackers, and cybercriminals are enticed by the possibility to be not traceable. Straying far from prying eyes is the primary attraction for the user of Tor project. In reality […]
Security researchers found a malicious script that takes advantage of a Firefox Zero-day to identify some users of the Tor anonymity network. My readers know very well Tor network and the capability of the system to remain anonymous under specific conditions. We have used terms such as Deep Web, Dark web and hidden web to remark […]
On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor. There are pro and cons for this design choice, of course the greatest advantage resides in the difficulty for the localization of the […]
After much work during the last months I’m proud and happpy to announce the publishing of The Deep Dark Web book. It is AVAILABLE @Amazon website http://www.amazon.com/The-Deep-Dark-Web-hidden/dp/1480177598 PAPER BOOK It is AVAILABLE @Amazon website http://www.amazon.com/dp/B009VN40DU KINDLE It is AVAILABLE @SmashWords website http://www.smashwords.com/books/view/247146 It is AVAILABLE @Barnes & Noble website http://www.barnesandnoble.com/w/the-deep-dark-web-pierluigi-paganini/1113594408?ean=2940015852837 and we have uploaded it also to Amazon […]
As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment to grow up profitable business. We have mainly discussed of deep web such as a portion of cyber space mainly used to sell any kind of good, from malware agent to drugs and other criminal […]
Last week, on blog.torproject.org was published the news relative to a security vulnerability found in Cyberoam DPI devices (CVE-2012-3372). All is started when a user in Jordan reported seeing a fake certificate to torproject.org. The certificate was issued by Cyberoam companies and the researchers of the Tor project believed that the CA has been tricked […]
We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a powerful instrument to elude censorship introduced by governments in critical areas of the planet. We have provided the examples of Syria and Iran, but the world is full of similar operations that introduce a detailed […]
The demand of anonymity services is increased in response to the increase network monitoring and censorship,but the anonymity is a concept that induces fear. Everyday, all our web actions leave traces of ourselves and of our way of life through the storing of massive amounts of personal data in databases in the internet, all these information […]
Tor Metrics Cyber intelligence units are working to develop tools and applications for a deep inspection of the hidden web with the intent of steal classified secret documents of a potential adversary and to maintain the control over cybercrime and terrorists activities and communications. Let’s start from the beginning, which are the available metrics to […]