• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • From iPhone to NT AUTHORITY\SYSTEM - exploit 'Printconfig' dll with a real-world example
  • Iran announced to have foiled a second cyber-attack in a week
  • Largest hospital system in New Jersey was hit by ransomware attack
  • Security Affairs newsletter Round 244
  • A malvertising campaign targets iPhone users with Krampus-3PC
  • Rooster Teeth Productions suffered a payment card breach
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Deep Web (Page 19)

Deep Web

Journalists get scammed trying to buy an AK47 in the Dark Web

Producers from the German broadcaster ARD have conducted an interesting experiment to demonstrate how to buy a weapon on the dark web. When journalists write about the black markets hosted on the dark web always describe these places as crucial aggregators...

May 22, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web 

The blackmarket Silk Road 3.0 emerged from the Dark Web

The administrator of Crypto Market launched Silk Road 3.0, the fourth iteration of the popular black market (Silk Road, Silk Road 2.0, Silk Road Reloaded). We all know that Silk Road was one of the greatest black marketplaces in the criminal underground,...

May 17, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web 

The Former Tor developer is the author of Torsploit used by the Feds

Matt Edman is the security expert and former employee of the Tor Project that helped the FBI to hack and de-anonymize Tor users developing the Torsploit. Matt Edman is the cyber security expert and former employee of the Tor Project that helped the FBI to...

April 28, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web  Laws and regulations  Malware 

Ran$umBin a dark web service dedicated to ransomware

A group cyber criminals created Ran$umBin, A Dark web service which operates the one-stop shop for monetizing ransomware. These days Ransomware are quite common and it is widespread and heavily used by cyber criminals as common tools to steal data as well...

April 28, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web  Malware 

Mapping the Dark Web searching for illegal content

Recently the intelligence firms Intelliagg and Darksum have issued an interesting report on the Dark Web and related mapping. We have discussed several times about Deep Web and Dark Web, discussing the reason why the hidden part of the web is even more...

April 11, 2016  By Pierluigi Paganini   Posted In  Breaking News  Deep Web  Reports 

CloudFlare considers 94 percent of the Tor traffic as “per se malicious”

Experts at CloudFlare revealed that 94 percent of the Tor traffic they see is “per se malicious,” but Tor Project opposes it. The experts from the Content delivery network (CDN) CloudFlare revealed that 94 percent of the Tor traffic they ordinary see...

April 3, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web  Security 

Feds request Judge to review the order to reveal TOR Exploit Code

FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting the review of the ruling. A few weeks ago, a judge has ordered the FBI to reveal the complete source code for the TOR exploit to...

March 30, 2016  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Deep Web  Hacking  Laws and regulations 

Terrorists and dark web, what is their relationship?

A new study reveals that terrorist organizations are largely uninterested in using resources and services hosted on the dark web. Every day I receive a lot of requests about terrorist activities in the Dark Web, and contrary to what you might think anonymizing...

March 29, 2016  By Pierluigi Paganini   Posted In  Breaking News  Deep Web  Intelligence  Reports  Terrorism 

Tor Project and the new anti-tampering measures for its software

Tor Project revealed how the organization has conducted a three-year long work to improve its ability to detect fraudulent software. The experts at the Tor Project are working to improve the resilience of the anonymizing network to cyber attacks,...

March 22, 2016  By Pierluigi Paganini   Posted In  Breaking News  Deep Web  Hacking  Security 

A deep look into the Brazilian underground cyber-market

Trend Micro has published a new study on black cyber-markets focusing on product and services offered on the Brazilian underground. Trend Micro has published a new interesting report on the underground cyber-markets, this is a third study focused on the Brazilian...

November 20, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Deep Web 


« First‹ Previous151617181920Next ›
Page 19 of 20




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled