man pressing lock icon with binary code, cyber security concept.

Supreme Court Grants FBI Permission To Hack Virtually Anyone

Users of anonymity services such as Tor and VPN could be hacked as well as spied by law enforcement agencies, including the FBI, under the new law changes approved by the US Supreme Court.
Photo of Wikipedia article page about Edward Snowden on a ipad monitor screen through a magnifying glass

The Influence of Edward Snowden’s Revelations

Edward Snowden decided to seek asylum in Russia after the controversial leakage in the United States classified government surveillance information. Things had begun to cool down in the U.S. however, three years down the line, the revelations of former NSA contractor Edward Snowden still have a huge impact in the current world.

Hacking Group “The Shadow Brokers” Leaked More Files”

The Shadow Brokers are at it again, this time having released what they call “a Halloween special trick or treat for Amerikanskis.” This release follows their bigger, more hard-hitting leak in August this year when they availed NSA hacking tools for anyone to download

Hacker Known As “Cracka” Arrested Over FBI, DHS Data Breaches

FBI and DHS Data BreachesCops in East Midlands, England have arrested a 16 yr. old boy allegedly behind the FBI and DHS data breaches. The...
Hacker wear anonymus mask with notebook in the dark .Editorial photo.

Best Anonymous Messaging Apps

With hacking attempts and NSA surveillance news hogging the internet, it’s not surprising to see the average user feel paranoid about their privacy. After...

NSA Planned To Hack App Stores To Track Smartphones

As I write this, just a week remains until the patriot act expires, and the end hopefully comes to years of unconstitutional, unwarranted surveillance...

Grams Helix – Bitcoin Tumbling Service

Name: Grams HelixDescription: Helix is a bitcoin tumbling service created and operated by the creator of Grams. What tumbling your “Bitcoin” does is let you mix...

The NSA Surveillance Is Not Ending Any Time Soon

Thanks to the leaks made by Edward Snowden two years ago, most people are now aware that the NSA has the power of unwarranted...

Sigaint Darknet Email Service Down for Weeks

Sigaint, one of the largest darknet email providers, has been down from February 11.To date, there are no signs of the site going online...

New App Threatens Online Users’ Privacy

A new app developed by computer scientists from the Worcester Polytechnic Institute threatens online anonymity by monitoring computer web usage.

The Shadow Brokers Dumps More Alleged Exploits

The Shadow Brokers, a rogue hacking outfit that stole data from the NSA, has released the password to a previous file dump.

Hacker Allegedly Selling 272 Million Credentials For Less Than $1

Anonymous Russian hacker going by the moniker “The Collector” is allegedly selling the 272 million credentials in the form of emails and passwords in the dark web for less than a dollar.
Privacy Data Secure Protection Safety Concept

Privacy vs. Anonymity

Privacy and anonymity are vital components of a functioning society. As the internet has shown us, both are necessities even in the modern world.

Loopix: A New Anonymity Network

“Loopix” is a newly developed anonymity network that can be an alternative to Tor, the popular dark web browser. The mix-based architecture of the...

Bitcoin Creator Finally Revealed His Identity

Bitcoin is the dominant player over cryptocurrencies, allowing consumers to make electronic transactions without any fees, nor have to use commercial banks, companies, or the government as intermediaries.

Should Edward Snowden Be Given A Pardon?

The recently released biopic by Oliver Stone that is based on the actions of former National Security Agency (NSA) contractor, Edward Snowden, has inspired the campaign for his pardon. This movement aims to call on President Barack Obama to pardon the man behind the biggest intelligence leak in the NSA’s history.
FBI Wants To Access Browsing History Without A Warrant

FBI Wants To Access Browsing History Without A Warrant

An amendment to the surveillance law is being sought by the Obama administration so that the FBI is vested with the authority to access internet browsing history of a person without a warrant in cases involving espionage and terrorism, according to reports.

Hackers Said To Donate Money To Charity

A new strain of ransomware, nicknamed CryptMix, is promising hacking victims that part of the money they send to unlock their blocked files will be donated to a kids’ charity.

WhatsApp Blockage In Brazil

On May 2, 2016, a judge from the state of Sergipe ordered all mobile carriers across Brazil to block the popular messaging service Whatsapp for 72 hours.The ban was supposedly imposed because WhatsApp did not comply with the police and provide information during an ongoing investigation.

Edward Snowden Willing To Return To US If Guaranteed A Fair Trial

Truth be told, anyone who was alive in the infamous Julian Assange era also caught wind of famed former NSA contractor Edward Snowden. Apparently, the whistleblower has been hiding in Russia, for almost three years after he did the unthinkable - divulged the highly classified intelligence records that featured “activities the US federal government would rather have remain under the radar.”

ProtonMail Adds Bitcoin in Its Payment Methods

ProtonMail is a popular anonymous email service operating from Switzerland and is known for encrypting emails by default.Emails exchanged between the users of this service...

Hacktivist Group “Anonymous” Hacks The Thai Government Job Portal

Anonymous, the international network of activist that comprises mainly of online hackers, is well known for its cyber-attacks on government, corporate, and religious websites since its inception in 2003.

Teen Arrested for Making Anonymous Bomb Threats

An Israeli teenager is under arrest on suspicion that he used various anonymity tools to make hoax bomb threats to Jewish institutions.

Freenet – Another Secure Anonymity Browser

The erosion of privacy and growth of censorship on the internet increasingly threaten freedom of expression in the digital age.Information flows are becoming subject...

Hong Kong Denied Asylum to Families Who Helped Snowden

The families that helped hide Edward Snowden following the infamous NSA surveillance data leak in 2013 have been denied asylum by the Hong Kong government.

Web Hosting Company DreamHost Targeted by DDoS Attack

In what could be named a coincidence or an organized occurrence, a new development has come to light in the aftermath of the Daily...

U.S. Orders to Stop Using Kaspersky Software in Federal Agencies

The United States government has just passed a ban regarding the use and operation of security software developed by a leading Russian brand, citing...

How HTML5 May Bring In New Internet Security Threats

Over the past few years, there have been a lot of changes affecting the key technologies that power the internet.HTML is the dominant web...

Major Security Breach Leaks Files Of Over 4.1 Million US Government Employees on the...

Almost as if to spite the NSA’s expansion of its Internet “defense” program, or spying to the rest of us, a major data breach...
man working on a virtual screen of the future and sees the inscription: Ddos attack

What Onion Service Operators Can Do To Mitigate DDoS Attacks

Since late last October, onion service operators have been on the receiving end of numerous DoS and DDoS attacks, both on the deep web onion service and also on the clearnet websites. The Dos and DDoS attacks have generally alternated between the deep web and the clearnet over the span of a couple of days and as things stand now, the motivation behind the attacks are anyone’s guesses.

A Practical Guide to the Theory and Practice of Online Privacy

Just what is privacy anyway? What is anonymity? Are they the same, or is one more desirable than the other? Are privacy and security...

Security Vulnerabilities Could Let Hackers Access In-Flight Systems

Cyber-hijacking an airplane and taking control of its flight capabilities is a recipe for a thrilling and scary action movie. You know what’s scary? The category for such film is simply an action movie and not a science fiction one. This is because such scenario is certainly possible according to this online security group.
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

OPM Data Appears To Be For Sale – Is it Legit?

Back in Mid-April, the Office of Personnel Management in the US discovered a major security breach that had caused on the leaking of data...
Cybercrime concept, on the computer keyboard

New Ransomware Called “GoldenEye” Targets HR Departments

It seems that cyber criminals are constantly modifying and improving the tactics they use to achieve t

CyberScrub: For Safe And Secure Data Deletion

Name: CyberScrub Description: CyberScrub is software used for safely and completely erasing data from your drive. It is a fact that erasing data or formatting a hard...
The operating systems used by hackers are mostly Linux-based although Windows and Ubuntu are still of some importance to hackers with specific needs.

The Operating Systems Real Hackers Use

Black and gray hat hackers are what most people consider professional despite the morally disputable nature of their operations. Most hackers’ skill sets are often put to use against institutions, governmental organizations or the media either for monetary gains or personal interest.

Send this to a friend