New App Threatens Online Users’ Privacy

A new app developed by computer scientists from the Worcester Polytechnic Institute threatens online anonymity by monitoring computer web usage.

DNSChanger Malware Used In Malvertising Campaign

DNSChanger first hit the headlines in 2007, and for the five years that followed, this malware exploit infected millions of computers and networks throughout the world subjecting them to security vulnerabilities and threats.
The operating systems used by hackers are mostly Linux-based although Windows and Ubuntu are still of some importance to hackers with specific needs.

The Operating Systems Real Hackers Use

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations. Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.

NSA Contractor Accused of Leaking Classified File on Russian Hacking

Prosecutors claim that a National Security Agency contractor has leaked a classified file showing details of Russia hacking voting vendors and breaching the local system.The...
Firefox web browser under magnifying glass

Firefox Browser to Implement Tor-Based Privacy Feature

If you have wondered how ads keep popping up on your monitor that relate to some of the sites you had recently visited, it...

New Phishing Campaign Targets Gmail Users

Recent developments in the cyber-crime domain have indicated that not even well-established industry players are immune from cyber-attacks.
Domain name choice concept. Knob switch button and website internet domain names

DNS Providers That Don’t Log Queries

There is really no limit to what every individual would expect from their domain name service (DNS) provider. The pages should download fast, it...

A Practical Guide to the Theory and Practice of Online Privacy

Just what is privacy anyway? What is anonymity? Are they the same, or is one more desirable than the other? Are privacy and security...

Over 1 Million People Support the Pardon Snowden Campaign

The relentless push to secure a presidential pardon for former National Security Agency (NSA) contractor Edward Snowden has recently reached a new milestone. The Pardon Snowden campaign addressed a petition to outgoing President Barrack Obama.
man pressing lock icon with binary code, cyber security concept.

Supreme Court Grants FBI Permission To Hack Virtually Anyone

Users of anonymity services such as Tor and VPN could be hacked as well as spied by law enforcement agencies, including the FBI, under the new law changes approved by the US Supreme Court.
Hand in jail

Snowden Says Petraeus Shared More Sensitive Info Than He Ever Did

Edward Snowden, the former National Security Agency (NSA) contractor, now lives as a fugitive in Moscow, Russia. He was charged with treason, as he was found guilty of leaking thousands of classified documents. During a recent interview, Edward Snowden argues that the retired general, David Petraeus, was responsible for having mishandled far more sensitive information than he ever did during his time in office.
Man With anonymous association mask working on the laptop

Some Ways to Share Files Anonymously

File sharing and anonymous peer-to-peer (P2P) file sharing, in particular, have always been a hot-button issue in propriety as well as open source software communities. There is a myriad of reasons why internet users might seek to share files anonymously, with the first that comes to mind being the plight of whistleblowers or political activists trying to avoid persecution.

Should Edward Snowden Be Given A Pardon?

The recently released biopic by Oliver Stone that is based on the actions of former National Security Agency (NSA) contractor, Edward Snowden, has inspired the campaign for his pardon. This movement aims to call on President Barack Obama to pardon the man behind the biggest intelligence leak in the NSA’s history.
man working on a virtual screen of the future and sees the inscription: Ddos attack

What Onion Service Operators Can Do To Mitigate DDoS Attacks

Since late last October, onion service operators have been on the receiving end of numerous DoS and DDoS attacks, both on the deep web onion service and also on the clearnet websites. The Dos and DDoS attacks have generally alternated between the deep web and the clearnet over the span of a couple of days and as things stand now, the motivation behind the attacks are anyone’s guesses.

Koolova Ransomware Decrypts Files If You Read 2 Cybersecurity Articles

Ransomware is a kind of computer malware that disables users from accessing their PC or selected files in their systems until a certain amount of money is paid as “ransom.”

Edward Snowden Wants to Protect Journalists and Sources

Former CIA employee and contractor for the United States government, Edward Snowden is reportedly working to build a hardware tool to protect journalists and whistleblowers from state surveillance and government-sponsored hackers.

Essay: Totalitarian Surveillance in a Grim Dark Future

What happens when a technocratic police state mandates that all communication within its borders must follow only an encryption scheme of which the government...

NSA Whistleblower Edward Snowden At LibrePlanet Conference

A look back in January of this year is the announcement that thrilled, if not shook the earth. The FSF revealed that National Security Agency whistleblower, Edward Snowden, is bound to be the opening keynote for the upcoming LibrePlanet 2016.

Section 215 Dies – Freedom Act To Take Its Place

On June 1st, the Patriot Act expired at long last. Most importantly, it took with it the infamous section 215 that has allowed the...
Conceptual image of a NSA processor inside a computer.

Edward Snowden Thinks Russia Is Behind The NSA Hack

Edward Snowden, the whistleblower, is of the belief that, in all probability, Russia is responsible for the alleged US National Security Agency (NSA) hack. Hackers allegedly got hold of digital arsenal or malware deployed by Equation Group, the cyber espionage unit that has links with the NSA.

Why Australian Dark Web Users Should Be Worried

Australians’ online privacy is in jeopardy as ISPs and telecom companies now have to collect and store all phone and internet activity.

Bail Denied to Alleged NSA Leaker

Alleged National Security Agency leaker Reality Winner was once again denied bail by federal judge Brian Epps after the case prosecutors cautioned that she...

The Shadow Brokers Dumps More Alleged Exploits

The Shadow Brokers, a rogue hacking outfit that stole data from the NSA, has released the password to a previous file dump.
Business button mail lock web security icon email online

Secure Email by Lavabit

The web is currently cluttered with burgeoning secure email platforms that aim to circumvent the long arm of government surveillance.Many of these projects have...

Hacking Group “The Shadow Brokers” Leaked More Files”

The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download
Privacy Data Secure Protection Safety Concept

Privacy vs. Anonymity

Privacy and anonymity are vital components of a functioning society. As the internet has shown us, both are necessities even in the modern world.
Privacy Access login PERFORMANCE Identification Password Passcode and Privacy

Best Phones for Privacy and Security

When there are so many smartphones on the market, you might often find yourself intimidated by the choices. Besides design, specifications and pricing, privacy...

Whonix or Tails?

Getting on to the dark web can be a bit of a process. You can’t just fire up Chrome, type in an address and...

Operating Systems for Browsing the Dark Web: Windows, Mac, or Linux?

If you are reading this, then you have obviously decided to take a trip down the rabbit hole into the dark web.Like any other...

Warning – Encrypted Messenger IronChat Compromised

A statement from police in the Netherlands that was released on Tuesday confirmed that they had managed to decrypt over a quarter of a...

Sigaint Darknet Email Service Down for Weeks

Sigaint, one of the largest darknet email providers, has been down from February 11.To date, there are no signs of the site going online...

DHS And FBI Employees’ Data Exposed In Hack

A few days ago, hackers have reportedly released more than 20,000 confidential FBI employee data to the internet. The exposure came only a day after...

PGP (Pretty Good Privacy)

Name: PGP (Pretty Good Privacy)Description:PGP or Pretty Good Privacy is software developed for the purpose of providing good, fast and accessible encryption to anyone...

Tor – A Beginner’s Guide

Intro: If you want to browse the Deep Web, Tor, The Onion Router, is a critical first step.Without it your dreams of deep web adventures,...

Freenet – Another Secure Anonymity Browser

The erosion of privacy and growth of censorship on the internet increasingly threaten freedom of expression in the digital age.Information flows are becoming subject...

Hacker Known As “Cracka” Arrested Over FBI, DHS Data Breaches

FBI and DHS Data BreachesCops in East Midlands, England have arrested a 16 yr. old boy allegedly behind the FBI and DHS data breaches. The...

Behavioral Profiling – Risk To Anonymity And Privacy

Deriving information from a person from a website they visit is not something new, but making an inference from their speed of keying in...

Hacktivist Group “Anonymous” Hacks The Thai Government Job Portal

Anonymous, the international network of activist that comprises mainly of online hackers, is well known for its cyber-attacks on government, corporate, and religious websites since its inception in 2003.

ProtonMail Adds Bitcoin in Its Payment Methods

ProtonMail is a popular anonymous email service operating from Switzerland and is known for encrypting emails by default.Emails exchanged between the users of this service...

Secure Messaging App

TextSecure is an open-source messaging app for exchanging encrypted messages made by Open Whisper Systems. All messages send through TextSecure are end-to-end encrypted, meaning that they are encrypted before being sent and decrypted after arriving on recipient’s device. This makes it impossible for any third party to intercept sensitive data being traded.
keyboard with word SHUTDOWN

Grams Darknet Search Engine Shuts Down

In 2014, a ground-breaking invention made its debut. Referred to as Grams, this was an exclusive darknet search engine designed to ease access to...

Choosing The Best Shredders

Name: Bonsaii DocShred C156-C 8-Sheet Micro-Cut Description: As far as physical shredders go, there are several factors that need to be looked into when deciding on...
Photo of Wikipedia article page about Edward Snowden on a ipad monitor screen through a magnifying glass

The Influence of Edward Snowden’s Revelations

Edward Snowden decided to seek asylum in Russia after the controversial leakage in the United States classified government surveillance information. Things had begun to cool down in the U.S. however, three years down the line, the revelations of former NSA contractor Edward Snowden still have a huge impact in the current world.

Vuvuzela, A New Anonymity Tool Created By MIT Researchers

What is Vuvuzela?The new anonymity network system prototype (anonymity network) was developed by researchers Nickolai Zeldovich, David Lazar, Jelle van den Hoof, and Matei Zaharia from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). It derives its name from one for the world’s most annoying and noisy musical instruments (as seen from the 2010 FIFA World Cup), the “Vuvuzela.” The network’s name couldn’t have been any more precise as its core functionality involves spamming legitimate conversations with a noisy atmosphere to enforce anonymity.

Hong Kong Denied Asylum to Families Who Helped Snowden

The families that helped hide Edward Snowden following the infamous NSA surveillance data leak in 2013 have been denied asylum by the Hong Kong government.

How HTML5 May Bring In New Internet Security Threats

Over the past few years, there have been a lot of changes affecting the key technologies that power the internet.HTML is the dominant web...
Brave Browser: Fast AdBlocker dev application on Smartphone screen.

Brave Browser Integrates Tor in Its Private Tabs Feature

Privacy-focused browser Brave has announced the integration of Tor into a new private tab feature.The latest release of the software, while still in beta,...

Snowden’s Favorite Email Provider, Lavabit, Relaunches

Four years ago, Lavabit was caught on the horns of a massive dilemma that would have forced it to release the crucial encryption keys for their encrypted email service, risking the privacy of their hundreds of thousands of users in the process.

Russia Has Received No Request for Edward Snowden Extradition to US

The United States has not made any formal request to Russia for the deportation of Edward Snowden as of yet, according to Edward Snowden’s attorney Anatoly Kucherena.

Secure And Anonymous Email Service

Name: Lelantos Description: Lelantos is a secure and anonymous email service operating and offering its services to Tor users.Given its nature as an anonymous email provider,...

Send this to a friend