HackDig : Dig high-quality web security articles for hacker

Freedom Hosting owner pleads guilty to distributing child abuse images

byJohn E DunnThe man arrested for running what was once believed to be the largest child abuse hosting provider on the dark web, has pleaded guilty in a US court to the charge of advertising child pornography.That service was Freedom Hosting and the man who operated it from its founding in 2008 until his arrest in Ireland in 2013 was dual US-Irish national,
Publish At:2020-02-11 09:34 | Read:204 | Comments:0 | Tags:Law & order child abuse child abuse imagery Eric Eoin Marque

A week in security (October 14 – 20)

Last week on Malwarebytes Labs, we tried to unlock the future of the password (its vulnerabilities, current alternatives, and possible future disappearance), analyzed the lagging response by many businesses in adopting a patch for Pulse VPN vulnerability, looked at Instagram’s bulked-up security against phishing emails scams, and were reminded that ransomwar
Publish At:2019-10-21 16:50 | Read:771 | Comments:0 | Tags:A week in security amazon Dark Web domestic abuse domestic a

Trojanized Tor Browser targets shoppers of Darknet black marketplaces

A tainted version of the Tor Browser is targeting dark web market shoppers to steal their cryptocurrency and gather information on their browsing activity. A Trojanized version of the Tor Browser is targeting shoppers of black marketplaces in the dark web, threat actors aim to steal their cryptocurrency and gather information on their browsing activity.
Publish At:2019-10-18 10:45 | Read:840 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking information secur

Safari, Chrome, Firefox: Which is the most private browser for Mac?

Everyone needs a web browser, and while Safari comes pre-installed on Macs, many people choose to use a different browser. You may want to do this for compatibility reasons—there may be sites or services you use that Safari doesn't handle correctly—or because you use a different browser at work; if you want to be able to sync bookmarks and history from your
Publish At:2019-09-19 16:40 | Read:931 | Comments:0 | Tags:Security & Privacy Brave browser browsers Chrome Chrome Brow

Tor Project fixed TorMoil, a critical Tor Browser flaw that can leak users IP Address

The Tor Project fixed a critical vulnerability dubbed TorMoil that could leak users real IP addresses to potential attackers. Tor users must update their Tor browser to fix a critical vulnerability, dubbed TorMoil, that could leak their real IP addresses to potential attackers when they visit websites with certain content. The Tor Project released the Tor Br
Publish At:2017-11-05 16:20 | Read:5450 | Comments:0 | Tags:Breaking News Hacking anonymity encryption Tor Tor Project T

“TorWitness” Docker Container: Automated (Tor) Websites Screenshots

The idea of this Docker container came after reading the excellent Micah Hoffman’s blog post: Dark Web Report + TorGhost + EyeWitness == Goodness. Like Micah, I’m also receiving a daily file with new websites discovered on the (dark|deep) web (name it as you prefer). This service is provided by @hunchly Twitter account. Once a day, you get an XLS
Publish At:2017-10-25 15:50 | Read:3642 | Comments:0 | Tags:Docker Software Tor Website

Dream Market dark web drug dealer OxyMonster arrested on way to beard contest

The Dream Market dark web drug dealer was arrested by US authorities after he traveled the US for this year’s annual World Beard and Mustache Championships. A Dark-Web drug dealer was arrested by US authorities after he traveled the US for this year’s annual World Beard and Mustache Championships. The French national Gal Vallerius (38) was arrested a few we
Publish At:2017-10-02 15:20 | Read:3949 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Cybercrime Dark Web Dream

Tor relay of a Brazilian University was banned after harvesting .onions

The Tor relay of a Brazilian University was banned by the Tor administrators because it was spotted collecting the .onion addresses of visitors. A team of researchers from a Brazilian University of Campinas in São Paulo, Brazil, has had its Tor relay node banned because it was spotted collecting the .onion addresses of visitors. Marcus Rodrigues, a junior re
Publish At:2017-08-27 19:35 | Read:3554 | Comments:0 | Tags:Breaking News Deep Web Hacking data harversting Tor Tor Proj

FBI masqueraded the NIT in a video-bait to unmask sextortionist on Tor

The FBI used a NIT involving a specially crafted video file to unmask a sextortionist that via Tor was threatening youngsters. The FBI has used once again the network investigative technique (NIT) for unmasking Tor users, this time the feds used it to arrest a suspected sextortionist. The man is accused of having tricked young girls into sharing nude pics o
Publish At:2017-08-10 03:20 | Read:3971 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking anonymity child p

FBI hacked a US Darknet shopper who tried to purchase Mail Bomb

The FBI hacked the system of a dark web user who tried to purchase a mail bomb from an undercover investigator in the US. According to a plea agreement, filed on April 28, 2017, Clinton Scott Bass of Georgia (US) tried in a first time to purchase a car bomb. The man, who was using two different pseudo names, contacted an undercover FBI agent on a darknet mar
Publish At:2017-07-02 12:06 | Read:3684 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Laws and regulati

Analyzing the attack landscape of the Dark Web. There is no honor among thieves.

Security researchers at Trend Micro used Tor honeypots to conduct a six-months study of the attack landscape of the Dark Web, Security experts at Trend Micro have conducted a six-months study of the attack landscape of the Dark Web, researchers operated a honeypot setup simulating several underground services on the Dark Web in order to analyze the way they
Publish At:2017-06-12 13:15 | Read:3779 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking Cybercrime Dark W

Trump’s Dumps: ‘Making Dumps Great Again’

It’s not uncommon for crooks who peddle stolen credit cards to seize on iconic American figures of wealth and power in the digital advertisements for their shops that run incessantly on various cybercrime forums. Exhibit A: McDumpals, a hugely popular carding site that borrows the Ronald McDonald character from McDonald’s and caters to bulk buyer
Publish At:2017-05-26 17:30 | Read:4957 | Comments:0 | Tags:Other Dark Web DomainTools.com Home Depot breach Magento McD

The Deep Web: Myths And Truths You Need To Know

Every now and then the media comes up with a sensational story about the Deep Web. Often these tales are shocking and frightening – but are they true? What is the Dark Web and Deep Web? Before going further, we need to understand what the Deep Web actually is – fortunately the concept is much easier than you might think. Any web page that you can locate from
Publish At:2017-04-27 12:00 | Read:3131 | Comments:0 | Tags:Mobile News News dark web deep web Internet tor

Post-FCC Privacy Rules, Should You VPN?

Many readers are understandably concerned about recent moves by the U.S. Congress that would roll back privacy rules barring broadband Internet service providers (ISPs) from sharing or selling customer browsing history, among other personal data. Some are concerned enough by this development that they’re looking at obfuscating all of their online brows
Publish At:2017-03-31 00:25 | Read:5896 | Comments:0 | Tags:Other DNS leak eff Electronic Frontier Foundation IPv6 leak

How to Browse The Internet Securely And Anonymously

These are some of the top methods you can use to browse the internet securely and anonymously. Even as the world becomes more aware of the imminent threat to our online privacy, few people understand the need to hide crucial information, such as IP addresses and private data streams, from entities such as our Internet Service Providers (ISPs), various online
Publish At:2017-03-09 00:25 | Read:4492 | Comments:0 | Tags:Breaking News Digital ID Hacking Intelligence Security anony

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud