HackDig : Dig high-quality web security articles for hacker

New Tor Browser 7.0 implements multiprocess mode, content sandbox, and Unix domain sockets

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and Unix domain sockets. The Tor Project has released the stable release of Tor Browser 7.0 that includes many security features and according to the development team, it also improved performance. The Tor network implements an anonymous c
Publish At:2017-06-09 11:35 | Read:327 | Comments:0 | Tags:Breaking News Deep Web Security anonymity Dark Web Hacking T

How to Browse The Internet Securely And Anonymously

These are some of the top methods you can use to browse the internet securely and anonymously. Even as the world becomes more aware of the imminent threat to our online privacy, few people understand the need to hide crucial information, such as IP addresses and private data streams, from entities such as our Internet Service Providers (ISPs), various online
Publish At:2017-03-09 00:25 | Read:568 | Comments:0 | Tags:Breaking News Digital ID Hacking Intelligence Security anony

Privacy groups claim FBI hacking operation in the PlayPen case was unconstitutional

According to Privacy groups, the FBI search warrant used to hack into thousands of computers around the world in the PlayPen case was unconstitutional, Privacy groups are claiming the FBI hacking campaign against the Playpen child pornography community violated international law. According to the court documents, the FBI monitored the Playpen bulletin board
Publish At:2017-02-12 03:10 | Read:577 | Comments:0 | Tags:Breaking News Deep Web Hacking Intelligence Laws and regulat

Microsoft Windows DRM issue could be exploited to uncloak Tor Browser users

HackerHouse researchers have discovered that media content protected by Digital Rights Management (DRM) can be used to uncloak Windows Tor Browser users. The anonymity of the Tor users is threatened by a new issue related the Microsoft’s DRM. Windows users running the Tor browser can be de-anonymized with a trick based on the Microsoft DRM (Digital Rig
Publish At:2017-02-06 18:10 | Read:625 | Comments:0 | Tags:Breaking News Digital ID Hacking anonymity Digital Rights Ma

Dozens of Android VPN Apps Fail to Protect Users’ Privacy, Study Reveals

One of the best friends a user can have in today’s digital age is a virtual private network (VPN). This tool masks a user’s IP address and tunnels their data through a network of servers. In so doing, a VPN helps a user anonymously and more securely browse the web.Unfortunately, not all VPNs fulfill that purpose. A group of researchers from Queen
Publish At:2017-01-30 18:30 | Read:461 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Android an

TorWorld helps you to manage a Tor node, promising an upcoming Tor-as-a-Service

The TorWorld initiative aims to build a community area for those people that desire to set up either a Tor Relay or a Tor Exit node. We all recognize the importance of the Tor network, an important instrument to protect users’ anonymity and avoid censorship. Today I desire to present you an interesting initiative launched by Tor passionates, the TorWor
Publish At:2017-01-26 05:50 | Read:628 | Comments:0 | Tags:Breaking News Digital ID Security anonymity TaaS Tor Tor Exi

Lavabit, the Snowden recommended encrypted email service, is back

Lavabit, the Snowden recommended encrypted email service, is back. Its CEO Ladar Levison announced new privacy-enhancing features. Do you remember Lavabit? It was the US Encrypted Email Service used by the popular whistleblower Edward Snowden. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the
Publish At:2017-01-21 15:15 | Read:791 | Comments:0 | Tags:Breaking News Digital ID Hacking anonymity Dark Internet Mai

ProtonMail announced that its Tor Hidden Service is online

The popular encrypted email provider ProtonMail has launched the Tor Hidden Service to provide further protection to its users. ProtonMail is the world’s largest encrypted email provider with over 2 million users worldwide. Its popularity exploded just after the US presidential election, its users include journalists, activists, businesses, and normal
Publish At:2017-01-20 20:50 | Read:639 | Comments:0 | Tags:Breaking News Digital ID anonymity Censorship privacy Proton

ZeroNet could be a solution against censorship and much more

ZeroNet is a new and revolutionary decentralized P2P internet that promise to avoid censorship and improve user privacy on the open web. ZeroNet is a decentralized and open source web platform. It’s based on BitTorrent(p2p) technology and BitCoin cryptography. These features ensure a decentralized censorship-resistant network. The contents published by
Publish At:2017-01-04 10:40 | Read:649 | Comments:0 | Tags:Breaking News Digital ID Security anonymity Censorship priva

Tor Project released an alpha version of the Sandboxed Tor Browser

Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. to protect users’ anonymity. Experts from the Tor project have launched an early alpha version of Sandboxed Tor Browser 0.0.2. The Sandboxed Tor Browser aims to isolate the Tor Browser from other processes of the operating system in order to limit its abi
Publish At:2016-12-13 01:20 | Read:812 | Comments:0 | Tags:Breaking News Digital ID Hacking Security anonymity Mozilla

The code of a Firefox Zero-Day Exploit used to unmask Tor Users is online

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code on Windows machines. The news is disconcerting and confirms the existence of a zero-day exploit in the wild that’s being used by threat actors to de-anonymize Tor users by executing malicious code on their machine. The zero-day exploit ta
Publish At:2016-11-30 18:00 | Read:734 | Comments:0 | Tags:Breaking News Deep Web Digital ID Hacking Laws and regulatio

Here’s how Tor Project and Mozilla will make harder de-anonymizing Tor users

Tor Project and Mozilla are working together to improve the security of Tor users and make harder for attackers to unmask them. Intelligence and law enforcement agencies continue to invest in order to de-anonymize Tor users. In the past, we received news about several techniques devised by various agencies to track Tor users, from the correlation attacks to
Publish At:2016-10-14 23:25 | Read:688 | Comments:0 | Tags:Deep Web Digital ID Hacking Security anonymity Mozilla Tor T

DefecTor – Deanonymizing Tor users with the analysis of DNS traffic from Tor exit relays

Researchers devised two correlation attacks, dubbed DefecTor, to deanonymize Tor users using also data from observation of DNS traffic from Tor exit relays. Law enforcement and intelligence agencies dedicate an important commitment in the fight of illegal activities in the Dark Web where threat actors operate in a condition of pseudo-anonymity. A group of se
Publish At:2016-10-02 18:50 | Read:564 | Comments:0 | Tags:Breaking News Deep Web Hacking anonymity anonymizing Darknet

Operation Pacifier, the FBI massive hacking campaign to de-anonymize Tor users

Operation Pacifier is the massive hacking campaign against computers worldwide launched by the FBI in early 2015 to track criminals on the dark web. We are now aware that the FBI launched a massive hacking campaign against computers worldwide in early 2015 in the attempt to de-anonymize criminals visiting dark web child porn website The use of the NIT was co
Publish At:2016-08-02 20:35 | Read:698 | Comments:0 | Tags:Breaking News Hacking Laws and regulations anonymity Europol

Tor and Linux Users Are Extremists? The NSA Thinks So

The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen interest in these users’ online activities. The NSA has gone as far as calling users of products such as The Amnesic Incognito Live System (Tails) and Tor as extremists. Readers of Linux Journal were also designated as extreme. Users of the
Publish At:2016-07-14 00:50 | Read:847 | Comments:0 | Tags:Breaking News Intelligence anonymity LINUX NSA surveillance

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud