Koolova Ransomware Decrypts Files If You Read 2 Cybersecurity Articles

Ransomware is a kind of computer malware that disables users from accessing their PC or selected files in their systems until a certain amount of money is paid as “ransom.”
Photo of Wikipedia article page about Edward Snowden on a ipad monitor screen through a magnifying glass

The Influence of Edward Snowden’s Revelations

Edward Snowden decided to seek asylum in Russia after the controversial leakage in the United States classified government surveillance information. Things had begun to cool down in the U.S. however, three years down the line, the revelations of former NSA contractor Edward Snowden still have a huge impact in the current world.

Edward Snowden Wants to Protect Journalists and Sources

Former CIA employee and contractor for the United States government, Edward Snowden is reportedly working to build a hardware tool to protect journalists and whistleblowers from state surveillance and government-sponsored hackers.

Sigaint Darknet Email Service Down for Weeks

Sigaint, one of the largest darknet email providers, has been down from February 11.To date, there are no signs of the site going online...

How Hackers Get Rich Spreading Malware

Computer viruses and malware are spreading faster than their biological counterparts it seems. Numbers from security firms point to the fact that close to 20 million malware threats have been neutralized in the first quarter of 2016. This equates to about 27,000 in one single day.

Why Australian Dark Web Users Should Be Worried

Australians’ online privacy is in jeopardy as ISPs and telecom companies now have to collect and store all phone and internet activity.
Business button mail lock web security icon email online

Secure Email by Lavabit

The web is currently cluttered with burgeoning secure email platforms that aim to circumvent the long arm of government surveillance.Many of these projects have...
Privacy Data Secure Protection Safety Concept

Privacy vs. Anonymity

Privacy and anonymity are vital components of a functioning society. As the internet has shown us, both are necessities even in the modern world.
man pressing lock icon with binary code, cyber security concept.

Supreme Court Grants FBI Permission To Hack Virtually Anyone

Users of anonymity services such as Tor and VPN could be hacked as well as spied by law enforcement agencies, including the FBI, under the new law changes approved by the US Supreme Court.

Whonix or Tails?

Getting on to the dark web can be a bit of a process. You can’t just fire up Chrome, type in an address and...

Grams Helix – Bitcoin Tumbling Service

Name: Grams HelixDescription: Helix is a bitcoin tumbling service created and operated by the creator of Grams. What tumbling your “Bitcoin” does is let you mix...

Over 1 Million People Support the Pardon Snowden Campaign

The relentless push to secure a presidential pardon for former National Security Agency (NSA) contractor Edward Snowden has recently reached a new milestone. The Pardon Snowden campaign addressed a petition to outgoing President Barrack Obama.

Feds Tell Senators How They Hack iPhone

The iPhone 5C has been the heart of the contentious ongoing public spat between Apple and the FBI. This Apple product was used by gunman Syed Rizwan Farook in the terrorist attack that killed 14 people in San Bernardino, California last December. FBI has cracked its way into the iPhone 5C, but the Apple-FBI saga continues as the agency spills the beans of the hack to members of Congress.

Hacking Group “The Shadow Brokers” Leaked More Files”

The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download
google

How to Stop Google from Recording Your Voice Searches and Increase Online Anonymity

The fact that Google gathers personal data on its users using a variety of their services is in no way recent news. It has...

British Hacker Pleads Guilty to Hacking into DoD Satellite Network

A 25-year-old British man was arrested for hacking into the United States Department of Defense system.Sean Caffrey, a resident of Sutton Coldfield in the...

Hackers Said To Donate Money To Charity

A new strain of ransomware, nicknamed CryptMix, is promising hacking victims that part of the money they send to unlock their blocked files will be donated to a kids’ charity.

DNSChanger Malware Used In Malvertising Campaign

DNSChanger first hit the headlines in 2007, and for the five years that followed, this malware exploit infected millions of computers and networks throughout the world subjecting them to security vulnerabilities and threats.

Russia Has Received No Request for Edward Snowden Extradition to US

The United States has not made any formal request to Russia for the deportation of Edward Snowden as of yet, according to Edward Snowden’s attorney Anatoly Kucherena.

Section 215 Dies – Freedom Act To Take Its Place

On June 1st, the Patriot Act expired at long last. Most importantly, it took with it the infamous section 215 that has allowed the...

Secure Messaging App

TextSecure is an open-source messaging app for exchanging encrypted messages made by Open Whisper Systems. All messages send through TextSecure are end-to-end encrypted, meaning that they are encrypted before being sent and decrypted after arriving on recipient’s device. This makes it impossible for any third party to intercept sensitive data being traded.

Loopix: A New Anonymity Network

“Loopix” is a newly developed anonymity network that can be an alternative to Tor, the popular dark web browser. The mix-based architecture of the...

Web Hosting Company DreamHost Targeted by DDoS Attack

In what could be named a coincidence or an organized occurrence, a new development has come to light in the aftermath of the Daily...

Warning – Encrypted Messenger IronChat Compromised

A statement from police in the Netherlands that was released on Tuesday confirmed that they had managed to decrypt over a quarter of a...

Op-Ed: ZeroNet, the Dark Web & the Future of Internet Freedom

ZeroNet was created in 2015 as a genuine alternative to the internet as we see it today.It’s a technical “next step” for protecting freedom...
Firefox web browser under magnifying glass

Firefox Browser to Implement Tor-Based Privacy Feature

If you have wondered how ads keep popping up on your monitor that relate to some of the sites you had recently visited, it...

Teen Arrested for Making Anonymous Bomb Threats

An Israeli teenager is under arrest on suspicion that he used various anonymity tools to make hoax bomb threats to Jewish institutions.
Man With anonymous association mask working on the laptop

Some Ways to Share Files Anonymously

File sharing and anonymous peer-to-peer (P2P) file sharing, in particular, have always been a hot-button issue in propriety as well as open source software communities. There is a myriad of reasons why internet users might seek to share files anonymously, with the first that comes to mind being the plight of whistleblowers or political activists trying to avoid persecution.
The operating systems used by hackers are mostly Linux-based although Windows and Ubuntu are still of some importance to hackers with specific needs.

The Operating Systems Real Hackers Use

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations. Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.
New Chat Application Google Allo

Edward Snowden Warns About Google’s Messaging App “Allo”

Google officially launched its widely anticipated messaging app, Allo, last September. The App is poised to become a major competitor of the popular WhatsApp and iMessage. However, former NSA contractor and whistleblower, Edward Snowden has informed smartphone users to avoid the app due to a number of privacy concerns.

Major Security Breach Leaks Files Of Over 4.1 Million US Government Employees on the...

Almost as if to spite the NSA’s expansion of its Internet “defense” program, or spying to the rest of us, a major data breach...
Conceptual hand writing showing How Does It Work Question. Business photo text asking about device or machine operation Tutorial written on Tear Notebook paper placed on the Laptop Marker next to it.

What is SADD.IO and How Does It Work?

On the internet, when people don’t want anyone else to know their browsing history, they use the Tor browser or subscribe to a Virtual...

Freenet – Another Secure Anonymity Browser

The erosion of privacy and growth of censorship on the internet increasingly threaten freedom of expression in the digital age.Information flows are becoming subject...
Hacker wear anonymus mask with notebook in the dark .Editorial photo.

Best Anonymous Messaging Apps

With hacking attempts and NSA surveillance news hogging the internet, it’s not surprising to see the average user feel paranoid about their privacy. After...

Vuvuzela, A New Anonymity Tool Created By MIT Researchers

What is Vuvuzela?The new anonymity network system prototype (anonymity network) was developed by researchers Nickolai Zeldovich, David Lazar, Jelle van den Hoof, and Matei Zaharia from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). It derives its name from one for the world’s most annoying and noisy musical instruments (as seen from the 2010 FIFA World Cup), the “Vuvuzela.” The network’s name couldn’t have been any more precise as its core functionality involves spamming legitimate conversations with a noisy atmosphere to enforce anonymity.

Send this to a friend