Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Posts Tagged ‘tor’
Most Recent
Read More
November 19, 2015

Carnegie Mellon Denies FBI Quid Pro Quo

Hacked reported last week that Tor director Roger Dingledine made the bold claim that the FBI had directly paid Carnegie Mellon University researchers at their Software Engineering Institute to help uncloak Tor nodes and aid law enforcement in prosecuting Dark Web criminals. Carnegie Mellon was not consulted in most of the media coverage, but had declined comment to those who inquired. The story was more to do with Dingledine’s allegations and their potential validity than anything.

Now Carnegie Mellon has come out to take issue with a particular part of the narrative, the part that says the government compensated the university for its efforts. In a very short [...]

Read More
November 18, 2015

ISIS’ Digital Caliphate Going Dark – Darknet, That Is

The digital propaganda machine of ISIS has run into trouble staying afloat on the clear net, and so like most other banned information, they’re heading to the deep web. While this may severely limit the ability of the group to dutifully indoctrinate new members who aren’t skilled in the arts of Tor, the group hopes the sites will at least stay online.

Researcher Scot Terban discovered the latest effort via a post on the popular Jihadi forum, Shamikh. The translated message (by Google) reads:

The name of Allah the Merciful given the very narrow on the site # Asaddarat_klavh so that it is deleting any new domain after its publication announce the launch of the [...]

Read More
November 12, 2015

FBI and Carnegie Mellon Possibly Colluded in Tor Uncloaking Scheme

Reports have come out recently that paint an interesting picture of the Federal Bureau of Investigation and Carnegie Mellon University. For starters, a court document acquired by Vice showed that the FBI was crediting an unnamed academic institution with helping it in locating a child pornography suspect as well as the people behind Silk Road 2.

Researchers from the school canceled a talk they were scheduled to give at July’s Black Hat conference on exactly the subject of unmasking a Tor IP address. The talk promised to show the conference of hackers how this could be done with a mere $3,000 equipment investment cost. The attack that was successful last year cost around [...]

Read More
October 3, 2015

Report: Publicly Disclosed Data Breaches are Increasing, Dramatically

The 2015 Internet Organized Crime Threat Assessment (IOCTA) has revealed that the number of “publically disclosed” data breaches this year has increased significantly, leading to secondary crimes wherein the breached data is used for extortion, identity theft, fraud and other similar offences.

The 2015 law enforcement-centric IOCTA report, put together from views and experiences of EU law enforcement agencies shows a trend that’s common among cybercrime all over the world.

The annual report is a presentation by Europol’s European Cybercrime Centre (EC3), focusing on the cybercrime threat landscape in EU member states.

The complete IOCTA report is available for [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University