The NSA Surveillance Is Not Ending Any Time Soon

Thanks to the leaks made by Edward Snowden two years ago, most people are now aware that the NSA has the power of unwarranted...

Tor Project Joined HackerOne to Launch Bug Bounty Program

Within the world of technology, those who create new programs and software solutions put their products through rigorous tests before releasing them to the...
Book with title federal law on a table

Tor Joins Fight Against the Proposed Amendments to Rule 41

Tor finally broke their silence on September 12th concerning the proposed amendments to Rule 41 of the Federal Rules of Criminal Procedure, as Tor fervently opposed the idea in its entirety.

Loopix: A New Anonymity Network

“Loopix” is a newly developed anonymity network that can be an alternative to Tor, the popular dark web browser. The mix-based architecture of the...

Secure Messaging App

TextSecure is an open-source messaging app for exchanging encrypted messages made by Open Whisper Systems. All messages send through TextSecure are end-to-end encrypted, meaning that they are encrypted before being sent and decrypted after arriving on recipient’s device. This makes it impossible for any third party to intercept sensitive data being traded.

Security Vulnerabilities Could Let Hackers Access In-Flight Systems

Cyber-hijacking an airplane and taking control of its flight capabilities is a recipe for a thrilling and scary action movie. You know what’s scary? The category for such film is simply an action movie and not a science fiction one. This is because such scenario is certainly possible according to this online security group.

British Hacker Pleads Guilty to Hacking into DoD Satellite Network

A 25-year-old British man was arrested for hacking into the United States Department of Defense system.Sean Caffrey, a resident of Sutton Coldfield in the...

Feds Tell Senators How They Hack iPhone

The iPhone 5C has been the heart of the contentious ongoing public spat between Apple and the FBI. This Apple product was used by gunman Syed Rizwan Farook in the terrorist attack that killed 14 people in San Bernardino, California last December. FBI has cracked its way into the iPhone 5C, but the Apple-FBI saga continues as the agency spills the beans of the hack to members of Congress.

Tor Relay of a Brazilian University Banned by Tor

The Tor Project enforces strict guidelines and rules on the usage of its anonymous network.That’s why it banned the Tor relay node of a...

ProtonMail Launches a Tor Hidden Service

Privacy-oriented email service ProtonMail has decided to take their security measures a step further by announcing the release of their new Tor hidden service.

Koolova Ransomware Decrypts Files If You Read 2 Cybersecurity Articles

Ransomware is a kind of computer malware that disables users from accessing their PC or selected files in their systems until a certain amount of money is paid as “ransom.”

How Hackers Get Rich Spreading Malware

Computer viruses and malware are spreading faster than their biological counterparts it seems. Numbers from security firms point to the fact that close to 20 million malware threats have been neutralized in the first quarter of 2016. This equates to about 27,000 in one single day.

DoD Now Accepts Applications For “Hack the Pentagon” Program

The US Department of Defense has started accepting applications for its “Hack the Pentagon” commercial bug bounty program. According to an announcement released by the Defense Department, the goal of the Hack the Pentagon program is to identify as well as resolve vulnerabilities in security within the department’s websites through crowdsourcing.

PGP (Pretty Good Privacy)

Name: PGP (Pretty Good Privacy)Description:PGP or Pretty Good Privacy is software developed for the purpose of providing good, fast and accessible encryption to anyone...
Surf The Web Anonymously Using Tor Browser

94% of Tor Traffic is Malicious, According To CloudFlare

A recent report from CloudFlare says that over 94 percent of all the requests that come from across the Tor browsing network are of a malicious nature.That is, they use Tor to scam or phish or cause digital chaos.However, this does not seem to represent the whole story
Conceptual image of a NSA processor inside a computer.

Edward Snowden Thinks Russia Is Behind The NSA Hack

Edward Snowden, the whistleblower, is of the belief that, in all probability, Russia is responsible for the alleged US National Security Agency (NSA) hack. Hackers allegedly got hold of digital arsenal or malware deployed by Equation Group, the cyber espionage unit that has links with the NSA.

Tor Browser 7.0 Has Now Been Released

The latest iteration of the Tor Browser series is now released, joined by a wealth of new features exciting for users.Earlier this month, Tor...

Freenet – Another Secure Anonymity Browser

The erosion of privacy and growth of censorship on the internet increasingly threaten freedom of expression in the digital age.Information flows are becoming subject...

Vuvuzela, A New Anonymity Tool Created By MIT Researchers

What is Vuvuzela?The new anonymity network system prototype (anonymity network) was developed by researchers Nickolai Zeldovich, David Lazar, Jelle van den Hoof, and Matei Zaharia from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). It derives its name from one for the world’s most annoying and noisy musical instruments (as seen from the 2010 FIFA World Cup), the “Vuvuzela.” The network’s name couldn’t have been any more precise as its core functionality involves spamming legitimate conversations with a noisy atmosphere to enforce anonymity.

U.S. Orders to Stop Using Kaspersky Software in Federal Agencies

The United States government has just passed a ban regarding the use and operation of security software developed by a leading Russian brand, citing...

Bail Denied to Alleged NSA Leaker

Alleged National Security Agency leaker Reality Winner was once again denied bail by federal judge Brian Epps after the case prosecutors cautioned that she...

Families Who Sheltered Edward Snowden Seeking Canada Asylum

A trio of families in Hong Kong who hosted rogue NSA contractor Edward Snowden in 2013 are seeking asylum in Canada.

Snowden’s Favorite Email Provider, Lavabit, Relaunches

Four years ago, Lavabit was caught on the horns of a massive dilemma that would have forced it to release the crucial encryption keys for their encrypted email service, risking the privacy of their hundreds of thousands of users in the process.

ProtonMail Adds Bitcoin in Its Payment Methods

ProtonMail is a popular anonymous email service operating from Switzerland and is known for encrypting emails by default.Emails exchanged between the users of this service...

Lebanon Library To Support Tor, Causes Debate

A huge debate between law enforcement and civil libertarians ensued after Kilton Public Library from Lebanon, New Hampshire, announced its intention to dedicate their computers to become part of the Tor network.

Tor – A Beginner’s Guide

Intro: If you want to browse the Deep Web, Tor, The Onion Router, is a critical first step.Without it your dreams of deep web adventures,...

Hacker Known As “Cracka” Arrested Over FBI, DHS Data Breaches

FBI and DHS Data BreachesCops in East Midlands, England have arrested a 16 yr. old boy allegedly behind the FBI and DHS data breaches. The...

Why Australian Dark Web Users Should Be Worried

Australians’ online privacy is in jeopardy as ISPs and telecom companies now have to collect and store all phone and internet activity.

“Autonomy Cube” Serves As A Tor Relay

It has been some years since Trevor Paglen became part of a fine artists’ movement that has been helping gallery-goers to deal with government spying and online privacy.
FBI Wants To Access Browsing History Without A Warrant

FBI Wants To Access Browsing History Without A Warrant

An amendment to the surveillance law is being sought by the Obama administration so that the FBI is vested with the authority to access internet browsing history of a person without a warrant in cases involving espionage and terrorism, according to reports.
man pressing lock icon with binary code, cyber security concept.

Supreme Court Grants FBI Permission To Hack Virtually Anyone

Users of anonymity services such as Tor and VPN could be hacked as well as spied by law enforcement agencies, including the FBI, under the new law changes approved by the US Supreme Court.

NSA Planned To Hack App Stores To Track Smartphones

As I write this, just a week remains until the patriot act expires, and the end hopefully comes to years of unconstitutional, unwarranted surveillance...
Cybercrime concept, on the computer keyboard

New Ransomware Called “GoldenEye” Targets HR Departments

It seems that cyber criminals are constantly modifying and improving the tactics they use to achieve t

Should Edward Snowden Be Given A Pardon?

The recently released biopic by Oliver Stone that is based on the actions of former National Security Agency (NSA) contractor, Edward Snowden, has inspired the campaign for his pardon. This movement aims to call on President Barack Obama to pardon the man behind the biggest intelligence leak in the NSA’s history.

Guide to Tails OS

Introduction: Tails is an operating system aimed at protecting the user’s anonymity.Unlike a standard operating system like Windows or Linux, it does not need to...

Section 215 Dies – Freedom Act To Take Its Place

On June 1st, the Patriot Act expired at long last. Most importantly, it took with it the infamous section 215 that has allowed the...

Hackers Said To Donate Money To Charity

A new strain of ransomware, nicknamed CryptMix, is promising hacking victims that part of the money they send to unlock their blocked files will be donated to a kids’ charity.

Mozilla Seeks Details On The FBI’s Pedophile Tor Hack

Last year, the Federal Bureau of Investigation (FBI) hacked the hidden service Tor in order to track people who used child sex websites.

What are Some of the Different Ways of Using Tor?

The Tor network, the brainchild of the Tor Project, has grown to become the most popular and effective anonymity tool since its conception.
Photo of Wikipedia article page about Edward Snowden on a ipad monitor screen through a magnifying glass

The Influence of Edward Snowden’s Revelations

Edward Snowden decided to seek asylum in Russia after the controversial leakage in the United States classified government surveillance information. Things had begun to cool down in the U.S. however, three years down the line, the revelations of former NSA contractor Edward Snowden still have a huge impact in the current world.
tor-project-new-board-members-announced

Tor Project Appoints New Board of Directors

After Jacob Appelbaum resigned following allegations of sexual abuse against him, the Tor Project recently announced its new board of directors. The non-profit digital privacy group formed a new board and before stepping down and handing over the baton, the existing board members said that it was their responsibility to ensure that a competent leadership was at the helm of affairs as the Project moved into its second decade of existence.

Teen Arrested for Making Anonymous Bomb Threats

An Israeli teenager is under arrest on suspicion that he used various anonymity tools to make hoax bomb threats to Jewish institutions.

Wikipedia Editors Now Use Tor After Receiving Threats

Following the onslaught of pervasive threats on the lives and well-being of a number of Wikipedia editors, they have now resorted to hiding their identities under the cloak of anonymity offered by Tor.

Hacker Allegedly Selling 272 Million Credentials For Less Than $1

Anonymous Russian hacker going by the moniker “The Collector” is allegedly selling the 272 million credentials in the form of emails and passwords in the dark web for less than a dollar.

Hacktivist Group “Anonymous” Hacks The Thai Government Job Portal

Anonymous, the international network of activist that comprises mainly of online hackers, is well known for its cyber-attacks on government, corporate, and religious websites since its inception in 2003.

Sigaint Darknet Email Service Down for Weeks

Sigaint, one of the largest darknet email providers, has been down from February 11.To date, there are no signs of the site going online...

Choosing The Best Shredders

Name: Bonsaii DocShred C156-C 8-Sheet Micro-Cut Description: As far as physical shredders go, there are several factors that need to be looked into when deciding on...

Exodus Flaw Leaked and Used to Unmask a Tor-Based Child Porn Site

Exodus Intel is one of the very few companies that develops, buys, and sells software vulnerabilities. The Exodus firm has proven to be useful as the government can use its exploits to hack those websites it deems conducting illicit activities, mostly Tor hidden services.

Edward Snowden Willing To Return To US If Guaranteed A Fair Trial

Truth be told, anyone who was alive in the infamous Julian Assange era also caught wind of famed former NSA contractor Edward Snowden. Apparently, the whistleblower has been hiding in Russia, for almost three years after he did the unthinkable - divulged the highly classified intelligence records that featured “activities the US federal government would rather have remain under the radar.”

Tor Strengthening Security With “Selfrando” Technique

According to reports, the Tor project researchers are beefing up the security of their browser so that it is kept safe from hacking attempts made by government investigating agencies such as the FBI. The security researchers are specifically testing a new technique called “Selfrando” to protect the browser from the exploits of the hackers.

Send this to a friend