Security Vulnerabilities Could Let Hackers Access In-Flight Systems

Cyber-hijacking an airplane and taking control of its flight capabilities is a recipe for a thrilling and scary action movie. You know what’s scary? The category for such film is simply an action movie and not a science fiction one. This is because such scenario is certainly possible according to this online security group.

DNSChanger Malware Used In Malvertising Campaign

DNSChanger first hit the headlines in 2007, and for the five years that followed, this malware exploit infected millions of computers and networks throughout the world subjecting them to security vulnerabilities and threats.

Exodus Flaw Leaked and Used to Unmask a Tor-Based Child Exploitation Site

Exodus Intel is one of the very few companies that develops, buys, and sells software vulnerabilities. The Exodus firm has proven to be useful as the government can use its exploits to hack those websites it deems conducting illicit activities, mostly Tor hidden services.
Hand in jail

Snowden Says Petraeus Shared More Sensitive Info Than He Ever Did

Edward Snowden, the former National Security Agency (NSA) contractor, now lives as a fugitive in Moscow, Russia. He was charged with treason, as he was found guilty of leaking thousands of classified documents. During a recent interview, Edward Snowden argues that the retired general, David Petraeus, was responsible for having mishandled far more sensitive information than he ever did during his time in office.
Cropped photo of FBI agent using laptop

FBI Obtained Over 8,000 IP Addresses In Hacking Operation

In one of the most infamous mass hacking operations conducted by the U.S. Federal agency, the FBI, court documents had initially revealed that over 1,000 computers from users based in the United States had been compromised.
torandroid

Tor Project Creates a New Version of a Tor-Enabled Mobile Device

The Tor Project has been making great strides in enhancing user privacy and security online. Their latest release promises to enhance mobile security, specifically that of devices running on Android-based platforms.
man working on a virtual screen of the future and sees the inscription: Ddos attack

What Onion Service Operators Can Do To Mitigate DDoS Attacks

Since late last October, onion service operators have been on the receiving end of numerous DoS and DDoS attacks, both on the deep web onion service and also on the clearnet websites. The Dos and DDoS attacks have generally alternated between the deep web and the clearnet over the span of a couple of days and as things stand now, the motivation behind the attacks are anyone’s guesses.
The operating systems used by hackers are mostly Linux-based although Windows and Ubuntu are still of some importance to hackers with specific needs.

The Operating Systems Real Hackers Use

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations. Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.

Spamhaus Hacker Will No Longer Spend Time In Jail

Sven Olaf Kamphuis, the Dutch hacker responsible for the biggest cyber-attack of all time, is apparently a free man once again after most of his sentence was suspended by the court.

Tor Announces the Release of Tor 0.2.9.5 Alpha

Tor’s latest browser, Tor 0.2.9.5-alpha, comes with a lot of promise in terms of major and minor bug fixes alongside some few minor features aimed at optimizing user experience and upgrades on its hidden services, download scheduling and a few other tweaks here and there to make the browser more efficient in all respects.
Social media

Turks Flock to Tor after Government Blocked Popular Social Media Sites

The hard-fought censorship battle going on between the Turkish government and its citizens is still raging as Turkish citizens are finding more and more ways to avoid the government’s measures to stop them from accessing social media sites.

Hacking Group “The Shadow Brokers” Leaked More Files”

The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download

Deanonymizing Tor Users With DNS Exploit

One of the famous anonymity network Tor is used widely to work anonymously. Tor or The Onion Router is a modern web browser which is operated by the non-profit, Tor Project. Almost 2 million users utilize this service regularly because it enables them to use the internet without revealing their identities.

Wikipedia Editors Now Use Tor After Receiving Threats

Following the onslaught of pervasive threats on the lives and well-being of a number of Wikipedia editors, they have now resorted to hiding their identities under the cloak of anonymity offered by Tor.

How HTML5 May Bring In New Internet Security Threats

Over the past few years, there have been a lot of changes affecting the key technologies that power the internet.HTML is the dominant web...

Tor and Mozilla Working on To Make Malware Attacks More Difficult

Law enforcement agencies and malicious hackers may have a harder time getting access to the IP addresses of Tor users. Thanks to upcoming security upgrades that Tor Project and the creators of Mozilla Firefox have been discreetly working on.
Photo of Wikipedia article page about Edward Snowden on a ipad monitor screen through a magnifying glass

The Influence of Edward Snowden’s Revelations

Edward Snowden decided to seek asylum in Russia after the controversial leakage in the United States classified government surveillance information. Things had begun to cool down in the U.S. however, three years down the line, the revelations of former NSA contractor Edward Snowden still have a huge impact in the current world.
Book with title federal law on a table

Tor Joins Fight Against the Proposed Amendments to Rule 41

Tor finally broke their silence on September 12th concerning the proposed amendments to Rule 41 of the Federal Rules of Criminal Procedure, as Tor fervently opposed the idea in its entirety.

Tor Users May Not Need To Solve Annoying CAPTCHA Puzzles Soon

People who want to browse the web with anonymity using the Tor network are having problems with too many CAPTCHAs that they encounter before gaining access to a site. CAPTCHAs are the simple security tests or puzzles that are set to prove that the user is indeed a human being and not a robot or software. CloudFlare is the content delivery company behind these restrictive CAPTCHAs.
New Chat Application Google Allo

Edward Snowden Warns About Google’s Messaging App “Allo”

Google officially launched its widely anticipated messaging app, Allo, last September. The App is poised to become a major competitor of the popular WhatsApp and iMessage. However, former NSA contractor and whistleblower, Edward Snowden has informed smartphone users to avoid the app due to a number of privacy concerns.

Should Edward Snowden Be Given A Pardon?

The recently released biopic by Oliver Stone that is based on the actions of former National Security Agency (NSA) contractor, Edward Snowden, has inspired the campaign for his pardon. This movement aims to call on President Barack Obama to pardon the man behind the biggest intelligence leak in the NSA’s history.
sigaint

Darknet Email Service “SIGAINT” Adds Tor Relay for Monero

SIGAINTsigaint In August 2016, AlphaBay and Oasis announced that they would integrate Monero. Since then, the demand of Monero has drastically increased. Recently, a darknet email service provider “SIGAINT” added a Tor relay for Monero transactions.

Two VPN Servers Seized By Authorities

A VPN provider by the name Perfect Privacy was targeted by the Dutch police on the 24th of August after two of their servers were seized for investigation. No notice whatsoever had been issued beforehand, and the VPN provider only came to know of the incident after they were informed by a Rotterdam hosting company by the name I3D.
tor_browser_logo

Tor Browser 6.0.5 Has Been Released

Tor Browser 6.0.5 is now available for download. The latest release of the Tor dark web browser comes with a number of improvements, one of which is a crucial security update.
google

How to Stop Google from Recording Your Voice Searches and Increase Online Anonymity

The fact that Google gathers personal data on its users using a variety of their services is in no way recent news. It has...

Protesters Asks Users Not To Use Tor on September 1

A group has called for a full-day shutdown of the Tor network as a mark of protest against two issues: handling of sexual misconduct accusations against Jacob Appelbaum and rumor that project might employ former government agents.
Conceptual image of a NSA processor inside a computer.

Edward Snowden Thinks Russia Is Behind The NSA Hack

Edward Snowden, the whistleblower, is of the belief that, in all probability, Russia is responsible for the alleged US National Security Agency (NSA) hack. Hackers allegedly got hold of digital arsenal or malware deployed by Equation Group, the cyber espionage unit that has links with the NSA.
DOJ Official Told Judges to Use Tor

DOJ Official Told Judges to Use Tor to Protect Against Breaches

Recently, an official of the Department of Justice, Ovie Carroll, director of the Cybercrime Lab, urged a roomful of federal judges, numbering about a hundred, to use Tor to protect their personal information on their computers against data breaches.
tor browser

Tor Pledges Not To Implement Any Backdoors into Their Project

The Tor Project published a blog on August 9, 2016, revealing their new social contract which includes the “no backdoors” pledge. In the blog, The Project has also said that the tools they make help to promote and protect human rights and that they make it possible through a set of guiding principles, which for a long time had remained unspoken.
OnionDSL

Engineer Designed a Tor-Based System called “OnionDSL”

Lawmakers in the UK are currently closing in on their newest and most comprehensive legal regime for mass-surveillance since the Snowden revelations. UK’s Investigatory Powers bill seems very near towards being signed as a law, yet a determined network engineer will not easily surrender privacy in the surveillance fight and makes good use of Tor.
tor browser

Tor Project Implements New Policies And Practices

The executive director of Tor Project, Shari Steele, has announced that they would be implementing new rules to avoid future incidents such as the sexual assault allegations against Jacob Appelbaum, one of Tor’s leading developers.
Internet-of-Things

Tor Project Wants To Create New Security System For IoT

According to reports, the Guardian Project, Tor Project, and Home Assistant have come together to create a new security system that can protect IoT (Internet of Things) devices.
Resignation-letter

Tor Contributor Lucky Green Quits The Project

One of the earliest contributors to the Tor Project, Lucky Green, decided to quit and close down all the important nodes that are under his administrative purview. Green, the man who recently decided to leave the Project, was associated with it even before the network was named as Tor.
tor-project-new-board-members-announced

Tor Project Appoints New Board of Directors

After Jacob Appelbaum resigned following allegations of sexual abuse against him, the Tor Project recently announced its new board of directors. The non-profit digital privacy group formed a new board and before stepping down and handing over the baton, the existing board members said that it was their responsibility to ensure that a competent leadership was at the helm of affairs as the Project moved into its second decade of existence.
FBI Logo

Ruling Says FBI Cannot Collect Foreign Data With A Warrant

Recently, in a landmark ruling that favored privacy, a panel of judges announced that any search warrant sent to Microsoft cannot be applied outside the country’s borders. In the particular case, the appeals court made it clear that Microsoft is not compelled to divulge the email communications that formed part of a drug investigation.
tor-riffle

New Anonymity Network “Riffle” Claimed To Be More Secure Than Tor

Riffle is being seen as a solution for the problems that Tor has been having of late. Researchers at the Artificial Intelligence Laboratory at MIT and the Polytechnic School of Lausanne in Switzerland have developed a new anonymity tool similar to Tor called Riffle.

Tor Strengthening Security With “Selfrando” Technique

According to reports, the Tor project researchers are beefing up the security of their browser so that it is kept safe from hacking attempts made by government investigating agencies such as the FBI. The security researchers are specifically testing a new technique called “Selfrando” to protect the browser from the exploits of the hackers.
FBI Wants To Access Browsing History Without A Warrant

FBI Wants To Access Browsing History Without A Warrant

An amendment to the surveillance law is being sought by the Obama administration so that the FBI is vested with the authority to access internet browsing history of a person without a warrant in cases involving espionage and terrorism, according to reports.

Tor Project Developer Stepped Down From His Position

Thirty-three-year-old Jacob Appelbaum, a prominent developer with Tor Project developer and privacy activist, has resigned from his position on the board on May 25, according to reports.Tor announced his departure through a blog post without giving any reasons.

How Hackers Get Rich Spreading Malware

Computer viruses and malware are spreading faster than their biological counterparts it seems. Numbers from security firms point to the fact that close to 20 million malware threats have been neutralized in the first quarter of 2016. This equates to about 27,000 in one single day.

Sci-Hub Has A New Feature

Sci-Hub has introduced a new feature, a Telegram Messenger app, which helps users to search for peer-reviewed academic papers. Users’ communication with the app is encrypted.

WhatsApp Blockage In Brazil

On May 2, 2016, a judge from the state of Sergipe ordered all mobile carriers across Brazil to block the popular messaging service Whatsapp for 72 hours.The ban was supposedly imposed because WhatsApp did not comply with the police and provide information during an ongoing investigation.

Lead Tor Developer Claims FBI Is Harassing Her

Isis Agora Lovecruft, a lead developer who has been working with the Tor team for many years, has accused the FBI of harassment. The FBI has wanted to talk to her but would not tell why. She has worked with the Tor team on many encryption and security products.

Mozilla Seeks Details On The FBI’s Pedophile Tor Hack

Last year, the Federal Bureau of Investigation (FBI) hacked the hidden service Tor in order to track people who used child sex websites.

Hackers Said To Donate Money To Charity

A new strain of ransomware, nicknamed CryptMix, is promising hacking victims that part of the money they send to unlock their blocked files will be donated to a kids’ charity.

Opera Added Free VPN To Their Browser

Last month, Opera announced that developers of this major browser maker have integrated a free and unlimited VPN (Virtual Private Network) to the existing desktop version of the browser.This will allow users to browse anonymously and retain their online privacy.It would also allow users to access websites that are blocked.

Hacker Allegedly Selling 272 Million Credentials For Less Than $1

Anonymous Russian hacker going by the moniker “The Collector” is allegedly selling the 272 million credentials in the form of emails and passwords in the dark web for less than a dollar.
man pressing lock icon with binary code, cyber security concept.

Supreme Court Grants FBI Permission To Hack Virtually Anyone

Users of anonymity services such as Tor and VPN could be hacked as well as spied by law enforcement agencies, including the FBI, under the new law changes approved by the US Supreme Court.

Bitcoin Creator Finally Revealed His Identity

Bitcoin is the dominant player over cryptocurrencies, allowing consumers to make electronic transactions without any fees, nor have to use commercial banks, companies, or the government as intermediaries.

“Autonomy Cube” Serves As A Tor Relay

It has been some years since Trevor Paglen became part of a fine artists’ movement that has been helping gallery-goers to deal with government spying and online privacy.

Send this to a friend