search result

The role of proxies and protocols in malware investigations

What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?

European Parliament switches off Wi-Fi after hacker breaks into politicians’ emails

The European Parliament has switched off its public Wi-Fi system after an anonymous hacker broke into the personal emails of several Members of the European Parliament (MEPs) from outside the building, using only a laptop.

Thirty Meter Telescope website falls over in hacktivist DDoS attack

Hacktivists have launched a distributed denial-of-service attack against the website of TMT (Thirty Meter Telescope), which is planned to be the Northern hemisphere’s largest, most advanced optical telescope.

Cybercrime Corner Revisited

You may be aware that Cameron Camp and I regularly write articles for SC Magazine's Cybercrime Corner: here here's a catch-up list of the most recent, in the hope that you might find them of use and interest. At any rate, it'll give some idea of the range of content covered. Ten years later, still the same

How to keep your webcam safe from hackers

Last year webcam security became a high priority after an anonymous website began posting live streams of the world’s unprotected webcams. Here are 5 top tips to keep yours safe from the hackers.

Facebook welcomes private browsers with dedicated Tor link

Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren’t mistaken for botnets, Gizmodo reports.

‘Drug market’ Silk Road 2.0 launches on Tor – with new security in place

Only weeks after the closure of Silk Road, a “drug market” which authorities claim shipped $1.2 billion of drugs including heroin around the world, a site styling itself Silk Road 2.0 has appeared. Like the original, it is only accessible via the “anonymous” browser Tor.

Stop using Windows, Tor Project advises users after malware outbreak

The Tor Project has advised users of the anonymous browser to stop using Windows, in the wake of a malware attack which exploited a Firefox vulnerability in the Tor Browser Bundle.

Identity-exposing malware on Tor “could be work of FBI”

A malware outbreak which reveals the IP addresses of computer users has struck sites on the anonymous Tor network, including some said to host child pornography – with forum users suggesting that the outbreak might be the work of the FBI.

Holiday shopping? We know where you are

Well, not you exactly you, but malls are rolling out technology that tracks customers’ patterns throughout the mall using cell signals. They say they aren’t collecting personal information, but say they want to be able to track customer traffic patterns, for example, how many customers visit Starbucks after visiting Nordstroms. The technology, called FootPath, is

Why the IMF breach?

In the absence of any detailed information from the IMF itself, it’s not surprising that most of the surmise around the attack is based on internal IMF memos quoted by Bloomberg, and much of it is rather tenuous.

Hacker could serve longer jail sentence than the rapists he exposed

A 26-year-old hacker who helped expose the rape of a teenage girl could spend five times longer in jail than the perpetrators he outed.

Secret app takes mere minutes to hack, revealing anyone’s secret via simple vulnerability

Do you trust the internet with your secrets? Perhaps you shouldn’t, even if you’re using an app which professes to “deliver anonymously” secrets to your friends, and their circles, without identifying you as the originator…

One in five internet users have had emails or social networks hijacked, Pew study finds

Internet users are becoming more savvy about keeping their private data safe – but many have already fallen victim to crime and scams, a study by the Pew Research Institute’s Internet Project has found. One in five (21%) of internet users have had an email or social networking account compromised or taken over without their permission.

The 10 biggest security incidents of 2016

In 2016, companies have had their security solutions tested by increasingly sophisticated cybercriminals. We look at the year’s biggest security incidents.

Jail for British DDoS attacker, who said too much on Twitter

Although it’s far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty of people who have been put behind bars because of this modern-day crime.

The most frequent threats on email

As part of World Post Day (October 9th), we take a closer look at the many security risks associated with email, the electronic cousin of regular mail.

Russia seeks VPN and Tor ban in anonymity clamp down

Russian authorities have indicated that VPNs and online anonymising software Tor could soon be banned for the country’s 143.5 million residents.

‘Heartbleed thingumajig’ man suffers heartbleed hackers revenge

Man challenges hackers to break into accounts after complaining Heartbleed was “overhyped” – and has online life destroyed in minutes.

Silk Road 2.0 drug market hit, millions stolen from bitcoin reserve

A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves – estimated to be worth $2 million or even more. The site relied on bitcoin to help anonymize transactions.

Copyright © 2017 ESET, All Rights Reserved.