HackDig : Dig high-quality web security articles for hacker

Tor Project fixed TorMoil, a critical Tor Browser flaw that can leak users IP Address

The Tor Project fixed a critical vulnerability dubbed TorMoil that could leak users real IP addresses to potential attackers. Tor users must update their Tor browser to fix a critical vulnerability, dubbed TorMoil, that could leak their real IP addresses to potential attackers when they visit websites with certain content. The Tor Project released the Tor Br
Publish At:2017-11-05 16:20 | Read:133 | Comments:0 | Tags:Breaking News Hacking anonymity encryption Tor Tor Project T

FBI masqueraded the NIT in a video-bait to unmask sextortionist on Tor

The FBI used a NIT involving a specially crafted video file to unmask a sextortionist that via Tor was threatening youngsters. The FBI has used once again the network investigative technique (NIT) for unmasking Tor users, this time the feds used it to arrest a suspected sextortionist. The man is accused of having tricked young girls into sharing nude pics o
Publish At:2017-08-10 03:20 | Read:394 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking anonymity child p

Tor launches Bug Bounty Program, hackers can earn between $2,000 and $4,000 for high severity flaws

The Tor Project announced the launch of a public bug bounty program. Bug hunters can earn between $2,000 and $4,000 for high severity flaws. It’s official, the Tor Project announced the launch of a public bug bounty program through the HackerOne platform, the initiative was possible with support from the Open Technology Fund. “With support from t
Publish At:2017-07-20 22:05 | Read:448 | Comments:0 | Tags:Breaking News Deep Web Digital ID Hacking anonymity privacy

AlphaBay Market, one of the largest Dark Web marketplaces is down. Is it an Exit-Scam?

The AlphaBay Market went down Tuesday night without any explanation, many users that have purchased products on the marketplace fear the Exit-Scam. The news is shocking, the AlphaBay Market, one of the largest Dark Web black markets is down. We have analyzed many times the popular black market where it was possible to buy any kind of illegal goods, including
Publish At:2017-07-06 08:10 | Read:584 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web anonymity AphaBay black m

New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and Unix domain sockets. The Tor Project has released the stable release of Tor Browser 7.0 that includes many security features and according to the development team, it also improved performance. The Tor network implements an anonymous c
Publish At:2017-06-09 11:35 | Read:966 | Comments:0 | Tags:Breaking News Deep Web Security anonymity Dark Web Hacking T

How to Browse The Internet Securely And Anonymously

These are some of the top methods you can use to browse the internet securely and anonymously. Even as the world becomes more aware of the imminent threat to our online privacy, few people understand the need to hide crucial information, such as IP addresses and private data streams, from entities such as our Internet Service Providers (ISPs), various online
Publish At:2017-03-09 00:25 | Read:1084 | Comments:0 | Tags:Breaking News Digital ID Hacking Intelligence Security anony

Privacy groups claim FBI hacking operation in the PlayPen case was unconstitutional

According to Privacy groups, the FBI search warrant used to hack into thousands of computers around the world in the PlayPen case was unconstitutional, Privacy groups are claiming the FBI hacking campaign against the Playpen child pornography community violated international law. According to the court documents, the FBI monitored the Playpen bulletin board
Publish At:2017-02-12 03:10 | Read:1124 | Comments:0 | Tags:Breaking News Deep Web Hacking Intelligence Laws and regulat

Microsoft Windows DRM issue could be exploited to uncloak Tor Browser users

HackerHouse researchers have discovered that media content protected by Digital Rights Management (DRM) can be used to uncloak Windows Tor Browser users. The anonymity of the Tor users is threatened by a new issue related the Microsoft’s DRM. Windows users running the Tor browser can be de-anonymized with a trick based on the Microsoft DRM (Digital Rig
Publish At:2017-02-06 18:10 | Read:853 | Comments:0 | Tags:Breaking News Digital ID Hacking anonymity Digital Rights Ma

Dozens of Android VPN Apps Fail to Protect Users’ Privacy, Study Reveals

One of the best friends a user can have in today’s digital age is a virtual private network (VPN). This tool masks a user’s IP address and tunnels their data through a network of servers. In so doing, a VPN helps a user anonymously and more securely browse the web.Unfortunately, not all VPNs fulfill that purpose. A group of researchers from Queen
Publish At:2017-01-30 18:30 | Read:718 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Android an

TorWorld helps you to manage a Tor node, promising an upcoming Tor-as-a-Service

The TorWorld initiative aims to build a community area for those people that desire to set up either a Tor Relay or a Tor Exit node. We all recognize the importance of the Tor network, an important instrument to protect users’ anonymity and avoid censorship. Today I desire to present you an interesting initiative launched by Tor passionates, the TorWor
Publish At:2017-01-26 05:50 | Read:1111 | Comments:0 | Tags:Breaking News Digital ID Security anonymity TaaS Tor Tor Exi

Lavabit, the Snowden recommended encrypted email service, is back

Lavabit, the Snowden recommended encrypted email service, is back. Its CEO Ladar Levison announced new privacy-enhancing features. Do you remember Lavabit? It was the US Encrypted Email Service used by the popular whistleblower Edward Snowden. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the
Publish At:2017-01-21 15:15 | Read:1486 | Comments:0 | Tags:Breaking News Digital ID Hacking anonymity Dark Internet Mai

ProtonMail announced that its Tor Hidden Service is online

The popular encrypted email provider ProtonMail has launched the Tor Hidden Service to provide further protection to its users. ProtonMail is the world’s largest encrypted email provider with over 2 million users worldwide. Its popularity exploded just after the US presidential election, its users include journalists, activists, businesses, and normal
Publish At:2017-01-20 20:50 | Read:903 | Comments:0 | Tags:Breaking News Digital ID anonymity Censorship privacy Proton

ZeroNet could be a solution against censorship and much more

ZeroNet is a new and revolutionary decentralized P2P internet that promise to avoid censorship and improve user privacy on the open web. ZeroNet is a decentralized and open source web platform. It’s based on BitTorrent(p2p) technology and BitCoin cryptography. These features ensure a decentralized censorship-resistant network. The contents published by
Publish At:2017-01-04 10:40 | Read:1135 | Comments:0 | Tags:Breaking News Digital ID Security anonymity Censorship priva

Tor Project released an alpha version of the Sandboxed Tor Browser

Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. to protect users’ anonymity. Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. The Sandboxed Tor Browser aims to isolate the Tor Browser from other processes of the operating system in order to limit its abi
Publish At:2016-12-13 01:20 | Read:1242 | Comments:0 | Tags:Breaking News Digital ID Hacking Security anonymity Mozilla

The code of a Firefox Zero-Day Exploit used to unmask Tor Users is online

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code on Windows machines. The news is disconcerting and confirms the existence of a zero-day exploit in the wild that’s being used by threat actors to de-anonymize Tor users by executing malicious code on their machine. The zero-day exploit ta
Publish At:2016-11-30 18:00 | Read:1136 | Comments:0 | Tags:Breaking News Deep Web Digital ID Hacking Laws and regulatio

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud