Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
Tagtor
Featured

Darknet

Dutch Police Warns Dark Web Marketplace Users: “You Have Our Attention”

Posted on November 11th, 2016.

As part of Operation Hyperion, an operation conducted by law enforcement agencies all over the world, Dutch authorities have taken down a Dark Web marketplace and posted a warning on it. The marketplace’s frontpage lists active and arrested vendors, as well as identified buyers At the top, you can read “You have our attention”. If a...

Featured

Cybersecurity

In Child Porn Bust, FBI May Have Used Malware on Innocent Users

Posted on November 8th, 2016.

In 2013, the FBI confiscated Freedom Hosting, a service that hosted websites on the dark web, including several child pornography websites and private email service TorMail. When it happened, it was seen as a massive victory, but recently unsealed documents show the FBI may have used malware on innocent users. Three years ago, the FBI...

Featured

Communication

Carnegie Mellon Denies FBI Quid Pro Quo

Posted on November 19th, 2015.

Hacked reported last week that Tor director Roger Dingledine made the bold claim that the FBI had directly paid Carnegie Mellon University researchers at their Software Engineering Institute to help uncloak Tor nodes and aid law enforcement in prosecuting Dark Web criminals. Carnegie Mellon was not consulted in most of the media...

Featured

Communication

ISIS’ Digital Caliphate Going Dark – Darknet, That Is

Posted on November 18th, 2015.

The digital propaganda machine of ISIS has run into trouble staying afloat on the clear net, and so like most other banned information, they’re heading to the deep web. While this may severely limit the ability of the group to dutifully indoctrinate new members who aren’t skilled in the arts of Tor, the group hopes the sites...

Featured

Communication

FBI and Carnegie Mellon Possibly Colluded in Tor Uncloaking Scheme

Posted on November 12th, 2015.

Reports have come out recently that paint an interesting picture of the Federal Bureau of Investigation and Carnegie Mellon University. For starters, a court document acquired by Vice showed that the FBI was crediting an unnamed academic institution with helping it in locating a child pornography suspect as well as the people behind Silk...

Featured

Breaches

Report: Publicly Disclosed Data Breaches are Increasing, Dramatically

Posted on October 3rd, 2015.

The 2015 Internet Organized Crime Threat Assessment (IOCTA) has revealed that the number of “publically disclosed” data breaches this year has increased significantly, leading to secondary crimes wherein the breached data is used for extortion, identity theft, fraud and other similar offences. The 2015 law enforcement-centric IOCTA...

Featured

Tutorials

5 Ways to Be Completely Anonymous Online

Posted on September 21st, 2015.

Anonymity while surfing on the internet is not easy to maintain. Attackers and government agencies alike keep a track of your web activity and identity, with the former trying to infiltrate your system and violate your privacy. A lot has been going on recently to ring people’s minds with the fact that nobody is safe on the internet these...

Featured

Communication

DOJ Convicts ex-Cybersecurity Chief for Child Porn

Posted on January 12th, 2015.

The security community has experienced shockwaves in recent months as it becomes clearer that Tor may not be the panacea of anonymity and security it was dreamed to be, with the network being compromised on more than one occasion, and a top developer warning that some nodes, central to the operation of the network, would be going...

Featured

Communication

Skype Compromised: NSA Documents Show Spying Agency Has Access to All Skype Messages

Posted on January 1st, 2015.

According to new documents leaked by Der Spiegel, the National Security Agency (NSA) has access to Skype voice, text messaging, file sharing and video calls. Primarily used for targeted individuals, the NSA gained access over Microsoft’s Skype service through the NSA’s PRISM program.

Featured

Communication

How You Can Still Avoid and Thwart the NSA

Posted on December 30th, 2014.

The presentation given by Jacob Applebaum and Laura Poitras at the 31st Chaos Communication Congress has touched off a wave of articles about the places where the NSA either can or can’t surveil you. Concurrent with this talk Der Spiegel released over forty documents from the Snowden leak that support the technical points Applebaum...

Featured

Communication

Japanese GlobaLeaks Site Protects Whistleblowers and Freedom of Information

Posted on December 22nd, 2014.

A new law in Japan sets prison terms of up to 10 years for public servants or others leaking state secrets, while journalists and others who encourage such leaks could be imprisoned for five years. An Internet activist and academic is challenging the new law by setting up a website aimed at making it easier for government officials to...

Featured

Hacking

Tor Network May Face Disabling Attack

Posted on December 20th, 2014.

The Tor Project has learned that there may be an attempt to incapacitate our network in the next few days through the seizure of specialized servers in the network called directory authorities. These words were the introduction to Possible upcoming attempts to disable the Tor network, an announcement made early Friday evening,...

Featured

Decentralization

In the Wake of The Pirate Bay Shutdown, Tribler Makes BitTorrent Completely Anonymous and Impossible to Compromise

Posted on December 19th, 2014.

Recently, The Pirate Bay succumbed to a shutdown due to a police raid on their main servers. While The Pirate Bay was able to be torrented itself and brought back to life elsewhere, the effects of the shutdown sent a shockwave through the torrent community. Now, a group of researchers from the Delft University of Technology are about to...

Featured

Communication

Debunking (Mostly) Torgate – Operation Onymous

Posted on December 13th, 2014.

The recent Operation Onymous raids, in which European law enforcement claimed to have taken down 400 darknet market sites, have turned a floodlight on Tor, the shorthand name for The Onion Router Project. The seeds of a conflict that were planted last summer have blossomed into all out war, with Pando writer Yasha Levine & friends on...