What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?
The European Parliament has switched off its public Wi-Fi system after an anonymous hacker broke into the personal emails of several Members of the European Parliament (MEPs) from outside the building, using only a laptop.
Hacktivists have launched a distributed denial-of-service attack against the website of TMT (Thirty Meter Telescope), which is planned to be the Northern hemisphere’s largest, most advanced optical telescope.
You may be aware that Cameron Camp and I regularly write articles for SC Magazine's Cybercrime Corner: here here's a catch-up list of the most recent, in the hope that you might find them of use and interest. At any rate, it'll give some idea of the range of content covered. Ten years later, still the same
Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren’t mistaken for botnets, Gizmodo reports.
Only weeks after the closure of Silk Road, a “drug market” which authorities claim shipped $1.2 billion of drugs including heroin around the world, a site styling itself Silk Road 2.0 has appeared. Like the original, it is only accessible via the “anonymous” browser Tor.
The Tor Project has advised users of the anonymous browser to stop using Windows, in the wake of a malware attack which exploited a Firefox vulnerability in the Tor Browser Bundle.
A malware outbreak which reveals the IP addresses of computer users has struck sites on the anonymous Tor network, including some said to host child pornography – with forum users suggesting that the outbreak might be the work of the FBI.
Well, not you exactly you, but malls are rolling out technology that tracks customers’ patterns throughout the mall using cell signals. They say they aren’t collecting personal information, but say they want to be able to track customer traffic patterns, for example, how many customers visit Starbucks after visiting Nordstroms. The technology, called FootPath, is
A 26-year-old hacker who helped expose the rape of a teenage girl could spend five times longer in jail than the perpetrators he outed.
Do you trust the internet with your secrets? Perhaps you shouldn’t, even if you’re using an app which professes to “deliver anonymously” secrets to your friends, and their circles, without identifying you as the originator…
Internet users are becoming more savvy about keeping their private data safe – but many have already fallen victim to crime and scams, a study by the Pew Research Institute’s Internet Project has found. One in five (21%) of internet users have had an email or social networking account compromised or taken over without their permission.
Although it’s far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty of people who have been put behind bars because of this modern-day crime.
Russian authorities have indicated that VPNs and online anonymising software Tor could soon be banned for the country’s 143.5 million residents.
Man challenges hackers to break into accounts after complaining Heartbleed was “overhyped” – and has online life destroyed in minutes.
A large scale cyber-theft has drained the relaunched ‘online drug bazaar’ Silk Road 2.0 of nearly all of its Bitcoin reserves – estimated to be worth $2 million or even more. The site relied on bitcoin to help anonymize transactions.