Freenet – Another Secure Anonymity Browser
The erosion of privacy and growth of censorship on the internet increasingly threaten freedom of expression in the digital age.Information flows are becoming subject...
Sigaint Darknet Email Service Down for Weeks
Sigaint, one of the largest darknet email providers, has been down from February 11.To date, there are no signs of the site going online...
Supreme Court Grants FBI Permission To Hack Virtually Anyone
Users of anonymity services such as Tor and VPN could be hacked as well as spied by law enforcement agencies, including the FBI, under the new law changes approved by the US Supreme Court.
The Shadow Brokers Dumps More Alleged Exploits
The Shadow Brokers, a rogue hacking outfit that stole data from the NSA, has released the password to a previous file dump.
Hacking Group “The Shadow Brokers” Leaked More Files”
The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download
How Hackers Get Rich Spreading Malware
Computer viruses and malware are spreading faster than their biological counterparts it seems. Numbers from security firms point to the fact that close to 20 million malware threats have been neutralized in the first quarter of 2016. This equates to about 27,000 in one single day.
Operating Systems for Browsing the Dark Web: Windows, Mac, or Linux?
If you are reading this, then you have obviously decided to take a trip down the rabbit hole into the dark web.Like any other...
Hacker Allegedly Selling 272 Million Credentials For Less Than $1
Anonymous Russian hacker going by the moniker “The Collector” is allegedly selling the 272 million credentials in the form of emails and passwords in the dark web for less than a dollar.
How to Stop Google from Recording Your Voice Searches and Increase Online Anonymity
The fact that Google gathers personal data on its users using a variety of their services is in no way recent news. It has...
FBI Obtained Over 8,000 IP Addresses In Hacking Operation
In one of the most infamous mass hacking operations conducted by the U.S. Federal agency, the FBI, court documents had initially revealed that over 1,000 computers from users based in the United States had been compromised.
Sci-Hub Has A New Feature
Sci-Hub has introduced a new feature, a Telegram Messenger app, which helps users to search for peer-reviewed academic papers. Users’ communication with the app is encrypted.
Are You Being Tracked? Use these Codes to Find Out!
There are times when you may just have a gut feeling you’re being tracked, in the sense that someone is listening to your phone...
New Phishing Campaign Targets Gmail Users
Recent developments in the cyber-crime domain have indicated that not even well-established industry players are immune from cyber-attacks.
Best Anonymous Messaging Apps
With hacking attempts and NSA surveillance news hogging the internet, it’s not surprising to see the average user feel paranoid about their privacy. After...
The Influence of Edward Snowden’s Revelations
Edward Snowden decided to seek asylum in Russia after the controversial leakage in the United States classified government surveillance information. Things had begun to cool down in the U.S. however, three years down the line, the revelations of former NSA contractor Edward Snowden still have a huge impact in the current world.
Hacktivist Group “Anonymous” Hacks The Thai Government Job Portal
Anonymous, the international network of activist that comprises mainly of online hackers, is well known for its cyber-attacks on government, corporate, and religious websites since its inception in 2003.
DoD Now Accepts Applications For “Hack the Pentagon” Program
The US Department of Defense has started accepting applications for its “Hack the Pentagon” commercial bug bounty program. According to an announcement released by the Defense Department, the goal of the Hack the Pentagon program is to identify as well as resolve vulnerabilities in security within the department’s websites through crowdsourcing.
Some Ways to Share Files Anonymously
File sharing and anonymous peer-to-peer (P2P) file sharing, in particular, have always been a hot-button issue in propriety as well as open source software communities. There is a myriad of reasons why internet users might seek to share files anonymously, with the first that comes to mind being the plight of whistleblowers or political activists trying to avoid persecution.
FBI Wants To Access Browsing History Without A Warrant
An amendment to the surveillance law is being sought by the Obama administration so that the FBI is vested with the authority to access internet browsing history of a person without a warrant in cases involving espionage and terrorism, according to reports.
Why Australian Dark Web Users Should Be Worried
Australians’ online privacy is in jeopardy as ISPs and telecom companies now have to collect and store all phone and internet activity.
Snowden’s Favorite Email Provider, Lavabit, Relaunches
Four years ago, Lavabit was caught on the horns of a massive dilemma that would have forced it to release the crucial encryption keys for their encrypted email service, risking the privacy of their hundreds of thousands of users in the process.
New Ransomware Called “GoldenEye” Targets HR Departments
It seems that cyber criminals are constantly modifying and improving the tactics they use to achieve t
New App Threatens Online Users’ Privacy
A new app developed by computer scientists from the Worcester Polytechnic Institute threatens online anonymity by monitoring computer web usage.
Best Phones for Privacy and Security
When there are so many smartphones on the market, you might often find yourself intimidated by the choices. Besides design, specifications and pricing, privacy...
Grams Darknet Search Engine Shuts Down
In 2014, a ground-breaking invention made its debut. Referred to as Grams, this was an exclusive darknet search engine designed to ease access to...
Bitcoin Creator Finally Revealed His Identity
Bitcoin is the dominant player over cryptocurrencies, allowing consumers to make electronic transactions without any fees, nor have to use commercial banks, companies, or the government as intermediaries.
Koolova Ransomware Decrypts Files If You Read 2 Cybersecurity Articles
Ransomware is a kind of computer malware that disables users from accessing their PC or selected files in their systems until a certain amount of money is paid as “ransom.”
Should Edward Snowden Be Given A Pardon?
The recently released biopic by Oliver Stone that is based on the actions of former National Security Agency (NSA) contractor, Edward Snowden, has inspired the campaign for his pardon. This movement aims to call on President Barack Obama to pardon the man behind the biggest intelligence leak in the NSA’s history.
U.S. Orders to Stop Using Kaspersky Software in Federal Agencies
The United States government has just passed a ban regarding the use and operation of security software developed by a leading Russian brand, citing...
What Onion Service Operators Can Do To Mitigate DDoS Attacks
Since late last October, onion service operators have been on the receiving end of numerous DoS and DDoS attacks, both on the deep web onion service and also on the clearnet websites. The Dos and DDoS attacks have generally alternated between the deep web and the clearnet over the span of a couple of days and as things stand now, the motivation behind the attacks are anyone’s guesses.
Hong Kong Denied Asylum to Families Who Helped Snowden
The families that helped hide Edward Snowden following the infamous NSA surveillance data leak in 2013 have been denied asylum by the Hong Kong government.
Vuvuzela, A New Anonymity Tool Created By MIT Researchers
What is Vuvuzela?The new anonymity network system prototype (anonymity network) was developed by researchers Nickolai Zeldovich, David Lazar, Jelle van den Hoof, and Matei Zaharia from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). It derives its name from one for the world’s most annoying and noisy musical instruments (as seen from the 2010 FIFA World Cup), the “Vuvuzela.” The network’s name couldn’t have been any more precise as its core functionality involves spamming legitimate conversations with a noisy atmosphere to enforce anonymity.
Behavioral Profiling – Risk To Anonymity And Privacy
Deriving information from a person from a website they visit is not something new, but making an inference from their speed of keying in...
Tor – A Beginner’s Guide
Intro:
If you want to browse the Deep Web, Tor, The Onion Router, is a critical first step.Without it your dreams of deep web adventures,...
Hackers Said To Donate Money To Charity
A new strain of ransomware, nicknamed CryptMix, is promising hacking victims that part of the money they send to unlock their blocked files will be donated to a kids’ charity.
Edward Snowden Willing To Return To US If Guaranteed A Fair Trial
Truth be told, anyone who was alive in the infamous Julian Assange era also caught wind of famed former NSA contractor Edward Snowden. Apparently, the whistleblower has been hiding in Russia, for almost three years after he did the unthinkable - divulged the highly classified intelligence records that featured “activities the US federal government would rather have remain under the radar.”
OPM Overpays for Identity Theft Protections After 2015 Data Breach
The Office of Personal Management seems to be paying too much money for an identity theft protection program for the victims of its 2015 data breach.
Feds Tell Senators How They Hack iPhone
The iPhone 5C has been the heart of the contentious ongoing public spat between Apple and the FBI. This Apple product was used by gunman Syed Rizwan Farook in the terrorist attack that killed 14 people in San Bernardino, California last December. FBI has cracked its way into the iPhone 5C, but the Apple-FBI saga continues as the agency spills the beans of the hack to members of Congress.
DNS Providers That Don’t Log Queries
There is really no limit to what every individual would expect from their domain name service (DNS) provider. The pages should download fast, it...
A Practical Guide to the Theory and Practice of Online Privacy
Just what is privacy anyway? What is anonymity? Are they the same, or is one more desirable than the other? Are privacy and security...
Firefox Browser to Implement Tor-Based Privacy Feature
If you have wondered how ads keep popping up on your monitor that relate to some of the sites you had recently visited, it...
NSA Contractor Accused of Leaking Classified File on Russian Hacking
Prosecutors claim that a National Security Agency contractor has leaked a classified file showing details of Russia hacking voting vendors and breaching the local system.The...
Families Who Sheltered Edward Snowden Seeking Canada Asylum
A trio of families in Hong Kong who hosted rogue NSA contractor Edward Snowden in 2013 are seeking asylum in Canada.
Snowden Says Petraeus Shared More Sensitive Info Than He Ever Did
Edward Snowden, the former National Security Agency (NSA) contractor, now lives as a fugitive in Moscow, Russia. He was charged with treason, as he was found guilty of leaking thousands of classified documents. During a recent interview, Edward Snowden argues that the retired general, David Petraeus, was responsible for having mishandled far more sensitive information than he ever did during his time in office.
Loopix: A New Anonymity Network
“Loopix” is a newly developed anonymity network that can be an alternative to Tor, the popular dark web browser. The mix-based architecture of the...
Brave Browser Integrates Tor in Its Private Tabs Feature
Privacy-focused browser Brave has announced the integration of Tor into a new private tab feature.The latest release of the software, while still in beta,...
How HTML5 May Bring In New Internet Security Threats
Over the past few years, there have been a lot of changes affecting the key technologies that power the internet.HTML is the dominant web...
Op-Ed: ZeroNet, the Dark Web & the Future of Internet Freedom
ZeroNet was created in 2015 as a genuine alternative to the internet as we see it today.It’s a technical “next step” for protecting freedom...
Apple to Close Security Loophole Authorities Use to Hack into iPhones
Over the years, Apple has gained a reputation in the tech industry as a company that offers quality and secured smartphones among other products.In...
Web Hosting Company DreamHost Targeted by DDoS Attack
In what could be named a coincidence or an organized occurrence, a new development has come to light in the aftermath of the Daily...