Conceptual image of a NSA processor inside a computer.

Edward Snowden Thinks Russia Is Behind The NSA Hack

Edward Snowden, the whistleblower, is of the belief that, in all probability, Russia is responsible for the alleged US National Security Agency (NSA) hack. Hackers allegedly got hold of digital arsenal or malware deployed by Equation Group, the cyber espionage unit that has links with the NSA.
the logo of the brand "Apple", Frankfurt am Main, Germany.

Apple to Close Security Loophole Authorities Use to Hack into iPhones

Over the years, Apple has gained a reputation in the tech industry as a company that offers quality and secured smartphones among other products.In...
New Chat Application Google Allo

Edward Snowden Warns About Google’s Messaging App “Allo”

Google officially launched its widely anticipated messaging app, Allo, last September. The App is poised to become a major competitor of the popular WhatsApp and iMessage. However, former NSA contractor and whistleblower, Edward Snowden has informed smartphone users to avoid the app due to a number of privacy concerns.

Why Australian Dark Web Users Should Be Worried

Australians’ online privacy is in jeopardy as ISPs and telecom companies now have to collect and store all phone and internet activity.

Hacker Known As “Cracka” Arrested Over FBI, DHS Data Breaches

FBI and DHS Data BreachesCops in East Midlands, England have arrested a 16 yr. old boy allegedly behind the FBI and DHS data breaches. The...
Man With anonymous association mask working on the laptop

Some Ways to Share Files Anonymously

File sharing and anonymous peer-to-peer (P2P) file sharing, in particular, have always been a hot-button issue in propriety as well as open source software communities. There is a myriad of reasons why internet users might seek to share files anonymously, with the first that comes to mind being the plight of whistleblowers or political activists trying to avoid persecution.

Spamhaus Hacker Will No Longer Spend Time In Jail

Sven Olaf Kamphuis, the Dutch hacker responsible for the biggest cyber-attack of all time, is apparently a free man once again after most of his sentence was suspended by the court.
Privacy Data Secure Protection Safety Concept

Privacy vs. Anonymity

Privacy and anonymity are vital components of a functioning society. As the internet has shown us, both are necessities even in the modern world.

The Shadow Brokers Dumps More Alleged Exploits

The Shadow Brokers, a rogue hacking outfit that stole data from the NSA, has released the password to a previous file dump.

The NSA Surveillance Is Not Ending Any Time Soon

Thanks to the leaks made by Edward Snowden two years ago, most people are now aware that the NSA has the power of unwarranted...

Hacking Group “The Shadow Brokers” Leaked More Files”

The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download
The operating systems used by hackers are mostly Linux-based although Windows and Ubuntu are still of some importance to hackers with specific needs.

The Operating Systems Real Hackers Use

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations. Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.
Photo of Wikipedia article page about Edward Snowden on a ipad monitor screen through a magnifying glass

The Influence of Edward Snowden’s Revelations

Edward Snowden decided to seek asylum in Russia after the controversial leakage in the United States classified government surveillance information. Things had begun to cool down in the U.S. however, three years down the line, the revelations of former NSA contractor Edward Snowden still have a huge impact in the current world.

U.S. Orders to Stop Using Kaspersky Software in Federal Agencies

The United States government has just passed a ban regarding the use and operation of security software developed by a leading Russian brand, citing...

Guide to Tails OS

Introduction: Tails is an operating system aimed at protecting the user’s anonymity.Unlike a standard operating system like Windows or Linux, it does not need to...

Secure Messaging App

TextSecure is an open-source messaging app for exchanging encrypted messages made by Open Whisper Systems. All messages send through TextSecure are end-to-end encrypted, meaning that they are encrypted before being sent and decrypted after arriving on recipient’s device. This makes it impossible for any third party to intercept sensitive data being traded.

Hackers Said To Donate Money To Charity

A new strain of ransomware, nicknamed CryptMix, is promising hacking victims that part of the money they send to unlock their blocked files will be donated to a kids’ charity.

Secure And Anonymous Email Service

Name: Lelantos Description: Lelantos is a secure and anonymous email service operating and offering its services to Tor users.Given its nature as an anonymous email provider,...

Are You Being Tracked? Use these Codes to Find Out!

There are times when you may just have a gut feeling you’re being tracked, in the sense that someone is listening to your phone...

Over 1 Million People Support the Pardon Snowden Campaign

The relentless push to secure a presidential pardon for former National Security Agency (NSA) contractor Edward Snowden has recently reached a new milestone. The Pardon Snowden campaign addressed a petition to outgoing President Barrack Obama.

Sigaint Darknet Email Service Down for Weeks

Sigaint, one of the largest darknet email providers, has been down from February 11.To date, there are no signs of the site going online...
Domain name choice concept. Knob switch button and website internet domain names

DNS Providers That Don’t Log Queries

There is really no limit to what every individual would expect from their domain name service (DNS) provider. The pages should download fast, it...
Cropped photo of FBI agent using laptop

FBI Obtained Over 8,000 IP Addresses In Hacking Operation

In one of the most infamous mass hacking operations conducted by the U.S. Federal agency, the FBI, court documents had initially revealed that over 1,000 computers from users based in the United States had been compromised.

Families Who Sheltered Edward Snowden Seeking Canada Asylum

A trio of families in Hong Kong who hosted rogue NSA contractor Edward Snowden in 2013 are seeking asylum in Canada.
google

How to Stop Google from Recording Your Voice Searches and Increase Online Anonymity

The fact that Google gathers personal data on its users using a variety of their services is in no way recent news. It has...
Firefox web browser under magnifying glass

Firefox Browser to Implement Tor-Based Privacy Feature

If you have wondered how ads keep popping up on your monitor that relate to some of the sites you had recently visited, it...
FBI Logo

Ruling Says FBI Cannot Collect Foreign Data With A Warrant

Recently, in a landmark ruling that favored privacy, a panel of judges announced that any search warrant sent to Microsoft cannot be applied outside the country’s borders. In the particular case, the appeals court made it clear that Microsoft is not compelled to divulge the email communications that formed part of a drug investigation.

Vuvuzela, A New Anonymity Tool Created By MIT Researchers

What is Vuvuzela?The new anonymity network system prototype (anonymity network) was developed by researchers Nickolai Zeldovich, David Lazar, Jelle van den Hoof, and Matei Zaharia from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). It derives its name from one for the world’s most annoying and noisy musical instruments (as seen from the 2010 FIFA World Cup), the “Vuvuzela.” The network’s name couldn’t have been any more precise as its core functionality involves spamming legitimate conversations with a noisy atmosphere to enforce anonymity.

NSA Contractor Accused of Leaking Classified File on Russian Hacking

Prosecutors claim that a National Security Agency contractor has leaked a classified file showing details of Russia hacking voting vendors and breaching the local system.The...
man working on a virtual screen of the future and sees the inscription: Ddos attack

What Onion Service Operators Can Do To Mitigate DDoS Attacks

Since late last October, onion service operators have been on the receiving end of numerous DoS and DDoS attacks, both on the deep web onion service and also on the clearnet websites. The Dos and DDoS attacks have generally alternated between the deep web and the clearnet over the span of a couple of days and as things stand now, the motivation behind the attacks are anyone’s guesses.

Teen Arrested for Making Anonymous Bomb Threats

An Israeli teenager is under arrest on suspicion that he used various anonymity tools to make hoax bomb threats to Jewish institutions.

Behavioral Profiling – Risk To Anonymity And Privacy

Deriving information from a person from a website they visit is not something new, but making an inference from their speed of keying in...

Freenet – Another Secure Anonymity Browser

The erosion of privacy and growth of censorship on the internet increasingly threaten freedom of expression in the digital age.Information flows are becoming subject...

Should Edward Snowden Be Given A Pardon?

The recently released biopic by Oliver Stone that is based on the actions of former National Security Agency (NSA) contractor, Edward Snowden, has inspired the campaign for his pardon. This movement aims to call on President Barack Obama to pardon the man behind the biggest intelligence leak in the NSA’s history.

Edward Snowden Willing To Return To US If Guaranteed A Fair Trial

Truth be told, anyone who was alive in the infamous Julian Assange era also caught wind of famed former NSA contractor Edward Snowden. Apparently, the whistleblower has been hiding in Russia, for almost three years after he did the unthinkable - divulged the highly classified intelligence records that featured “activities the US federal government would rather have remain under the radar.”

Loopix: A New Anonymity Network

“Loopix” is a newly developed anonymity network that can be an alternative to Tor, the popular dark web browser. The mix-based architecture of the...

British Hacker Pleads Guilty to Hacking into DoD Satellite Network

A 25-year-old British man was arrested for hacking into the United States Department of Defense system.Sean Caffrey, a resident of Sutton Coldfield in the...

Bitcoin Creator Finally Revealed His Identity

Bitcoin is the dominant player over cryptocurrencies, allowing consumers to make electronic transactions without any fees, nor have to use commercial banks, companies, or the government as intermediaries.
keyboard with word SHUTDOWN

Grams Darknet Search Engine Shuts Down

In 2014, a ground-breaking invention made its debut. Referred to as Grams, this was an exclusive darknet search engine designed to ease access to...
Hand in jail

Snowden Says Petraeus Shared More Sensitive Info Than He Ever Did

Edward Snowden, the former National Security Agency (NSA) contractor, now lives as a fugitive in Moscow, Russia. He was charged with treason, as he was found guilty of leaking thousands of classified documents. During a recent interview, Edward Snowden argues that the retired general, David Petraeus, was responsible for having mishandled far more sensitive information than he ever did during his time in office.
The concept of security in the Internet.

Should You Be Buying Your VPN with Cryptocurrency?

Remaining anonymous on the internet is nearly impossible in today’s era of multi-tiered threats.These threats come from all angles and following a solid threat...

How HTML5 May Bring In New Internet Security Threats

Over the past few years, there have been a lot of changes affecting the key technologies that power the internet.HTML is the dominant web...

Security Vulnerabilities Could Let Hackers Access In-Flight Systems

Cyber-hijacking an airplane and taking control of its flight capabilities is a recipe for a thrilling and scary action movie. You know what’s scary? The category for such film is simply an action movie and not a science fiction one. This is because such scenario is certainly possible according to this online security group.
FBI Wants To Access Browsing History Without A Warrant

FBI Wants To Access Browsing History Without A Warrant

An amendment to the surveillance law is being sought by the Obama administration so that the FBI is vested with the authority to access internet browsing history of a person without a warrant in cases involving espionage and terrorism, according to reports.
woman holding notebook with app vpn creation Internet protocols for protection private network

VPN Browser Extensions for Chrome Leak Users’ DNS

Recent reports made on cybersecurity have confirmed that DNS requests are being leaked to other entities by VPN tools.Chrome extensions proved to be leaking...

Russia Has Received No Request for Edward Snowden Extradition to US

The United States has not made any formal request to Russia for the deportation of Edward Snowden as of yet, according to Edward Snowden’s attorney Anatoly Kucherena.

Edward Snowden Wants to Protect Journalists and Sources

Former CIA employee and contractor for the United States government, Edward Snowden is reportedly working to build a hardware tool to protect journalists and whistleblowers from state surveillance and government-sponsored hackers.

DNSChanger Malware Used In Malvertising Campaign

DNSChanger first hit the headlines in 2007, and for the five years that followed, this malware exploit infected millions of computers and networks throughout the world subjecting them to security vulnerabilities and threats.

Operating Systems for Browsing the Dark Web: Windows, Mac, or Linux?

If you are reading this, then you have obviously decided to take a trip down the rabbit hole into the dark web.Like any other...

Grams Helix – Bitcoin Tumbling Service

Name: Grams HelixDescription: Helix is a bitcoin tumbling service created and operated by the creator of Grams. What tumbling your “Bitcoin” does is let you mix...

Send this to a friend