-
How to Police Hackers: Dark Web’s Justice System
Just like in any other community, there are chronic. Disagreements among cybercriminals Since money is involved, the disputes are usually debatable and consequential.Cybersecurity researchers at Analyst1 released a late 2021 report claiming what they call the dark web's very own justice system.As it is like in the real world, a dispute is brought to the courts when at least two people encounter an unsolvable issue and ask the authorities for mediation or an intervention of some kind. For example, if a group of hackers purchases compromised network access from another and then realizes it was...
-
DuckDuckGo's Search Queries Grew 46% in 2021
The developers of privacy-focused search engine DuckDuckGo report that their brainchild continues to grow rapidly: the company now handles more than 100 million search queries per day, and the total number of queries in 2021 increased by almost 47%.Although Google will remain the dominant search platform, DuckDuckGo is showing impressive growth. In 2020, for example, DuckDuckGo processed more than 23.6 billion searches and reached 79 million searches per day at the end of December. Now, in 2021, DuckDuckGo has processed 34.6 billion searches so far and is now averaging about 100 million searches per day....
-
Difference between Deep Web and Dark Web
Here are some important applications of the Dark Web: • It is largely used by the internal sites of major companies, associations, and trading organizations • The school, college, and university internet systems use this to access digital databases • Password-protected secure websites including strict members-only access • You can access certain individual accounts for social media, email, banking, and more. • It is also used for social media, blogging, text, and voice chat. • It can also be used to find hidden Yahoo Answers. • Provide public records, certificates, and library system indexes. •...
-
How to disguise the use of Tor to bypass blocking: research
Every year censorship on the Internet is becoming more and more of a problem, which is why more and more users are choosing Tor instead of the usual browsers. In just a few clicks you can download this confidential browser, for this you need to go to the official website and get tor downloader for your operating system. In some countries where the use of the onion network has been subjected to blockades, visiting darknet requires additional measures to circumvent the bans. In this article, you will learn what blocking circumvention schemes other than bridges...
-
Iranian APT MuddyWater attacked telecom operators in the Middle East
Cymantec has announced a cyber espionage campaign by Iranian APT group MuddyWater targeting carriers, IT companies and utilities in the Middle East and other parts of Asia.The MuddyWater organization (also known as Seedworm, MERCURY and Static Kitten) was discovered in 2017 and is known for its attacks on targets in the Middle East.In a new campaign, which Symantec researchers have tracked over the past six months, attackers have targeted numerous organizations in Israel, Jordan, Kuwait, Laos, Pakistan, Saudi Arabia, Thailand and the United Arab Emirates. The attacks used legitimate tools, living-off-the-land tactics and publicly available...
-
Vulnerabilities in Wi-Fi devices allow to steal passwords and data
Cybersecurity researchers from the Darmstadt Technical University , the University of Brescia and the Secure Mobile Networking Lab have reported an issue affecting billions of Wi-Fi devices. According to experts, using the Bluetooth component of the device, you can steal passwords and control traffic on the Wi-Fi chip.Modern consumer electronic devices such as smartphones are equipped with a system-on-chip with separate Bluetooth, Wi-Fi and LTE components, each with its own security implementation. However, these components often share the same resources such as antenna or wireless spectrum. Resource sharing is intended to make the system-on-chip more...
-
Axie Infinity, NFT and labour economy
Play to Earn games (P2E) are cryptocurrency-based games which enable players to monetize their time spent in-game by operating, leasing, and selling in-game objects. These objects are typically NFTs (Non-fungible tokens – unique pieces of digital content) and the buying, selling, and lending of these assets make it possible to earn an income from playing the broader game. Players can become owners of in-game assets represented by NFTs or digital currencies which turns gamers into investors through gameplay. NFTs are able to deliver digital rights to participants in blockchain games and virtual worlds. In other...
-
Fifty personal data Traders were arrested by the UCP
The Cyber Police Department of the National Police of Ukraine has arrested 51 suspects in the theft of personal data belonging to hundreds of millions of people around the world.As a result of the operation, code-named "DATA", law enforcement officers seized 100 databases relevant for 2020-2021. The database contained information from more than 300 million citizens of Ukraine, the United States and European countries. The cost of the bases ranged from $ 20 to 20000 - depending on its content and commercial value. Attackers sold information on closed hacker forums, as well as on social...
-
Open source software distribution must follow the rules of GPL, the court says
An interesting precedent occurred in the law court of Venice, Italy.Ovation, Italy-based LLC, filed a lawsuit on its two former employees who had redistributed Ovation’s software under the GPL without any mention of the original work. The plaintiff stated that the defendants acted unlawfully and ignored the formal termination notice, which is the first protection tool implemented to safeguard the developers who decide to share their code in a free form. Also, defendants behavior was contrary to the essence of open source software: open source developers put a lot of efforts and experience to create...
-
The number of phishing tools to bypass 2FA has increased to 1.2 thousand.
A group of researchers from Stony Brook University and information security firm Palo Alto Networks have discovered more than 1.2 thousand sets of phishing tools that allow cybercriminals to bypass security codes with two-factor authentication (2FA).MitM (Man-in-the-Middle) phishing tools have become immensely popular in the cybercriminal world in recent years after major tech companies started making 2FA a must-have security feature for their users. Attackers who tricked a user into entering credentials on a phishing site found that the stolen credentials became useless because they could not bypass the 2FA procedure.To counter the new trend,...