Home » Tag Archives: network

Tag Archives: network

Amazon Demands Signal Stop Using Anti-Censorship Technique on Their Content Delivery Network

For over a year and a half countries such as China, Cuba, Egypt, Guyana, Kuwait, Malaysia, Oman, Paraguay, Qatar, Syria, Turkey, and the United Arab Emirates have blocked people from using Signal, a mobile communications app for sending encrypted texts and making encrypted phone calls. This encrypted communications app is available on the mobile operating systems Google Android and Apple ... Read More »

Inmates Ran a Child Porn Network in Prison, FBI Says

At the Federal Correctional Institution-Fort Dix in New Jersey, authorities arrested three inmates for distributing SD cards loaded with child abuse pictures and videos downloaded from the darknet. The men, 52-year-old William H. Noble, 38-year-old Charles Wesley Bush, and a 31-year-old Jacob S. Good had already been serving prison sentences for previous child pornography distribution, child pornography transportation, and child ... Read More »

Tor (the myth and reality.PNG

An Overview of Sniper Attacks Against the Tor Network & Current Defenses

Wide scale internet censorship attempts by governments have catalyzed the creation of newer techniques to enhance the privacy of internet users and resist various censorship attempts. Tor represents the most widely used system for counteracting censorship and promoting the privacy of internet users. Currently, Tor serves hundreds of thousands of internet users all over the world and transfers approximately 3 ... Read More »

Authorities arrest a 24 Year Old Darknet Drug Buyer in Rottenburg as Darknet Drug Network Becomes Stronger in Europe.

A 24-year-old man from the Rottenburg has been arrested by the police for ordering drugs through the Darknet. This the tip of the iceberg in consideration of the massive crackdown they intend to make. According to the prosecutor and the drug detection team, the young man whose name was not revealed ordered the drugs on a large scale through the ... Read More »

TorPolice – A Novel Framework For Enforcing Access Control Policies Across the Tor Network

The Tor network represents the most popular anonymity network, which is currently used by millions of users all over the world. Nevertheless, access control doesn’t exist for users of the Tor network, which renders the network susceptible to malicious attacks and botnet abuse. For instance, adversaries often exploit exit relay nodes utilizing them as stepping stones for various forms of ... Read More »

Screenshot from 2017-07-30 14-44-43.png

Report Calls the SEC Out for Vulnerable Computer Network Systems

According to the Government Accountability Office (GAO), frequently referred to as the Congressional Watchdog Office, the SEC has failed to implement a number of protective measures for their computer networks. The Securities and Exchange Commission (SEC) exists primarily to secure and regulate investments—basically everything the Federal Trade Commission (FTC) had formerly managed. Since 1997, the GAO warned that the cybersecurity ... Read More »

Screenshot_2017-07-20_10-15-041.png

Russian Police Raid Two Dealers and an Online Drug Network

  Several days ago, we published a piece on darknet—and clearnet—drug trafficking in Russia. That week, Russian law enforcement had busted suppliers, vendors, and drug resellers. Not even a full week had passed before Russian police started catching more drug criminals with connections to the internet. Cannabinoid & a-PVP Dealer In the Udmurt Republic, Russian law enforcement intercepted a 22-year-old ... Read More »

ZombieCoin – Using Bitcoin’s Network To Create Next Generation Botnets

A botnet represents a network of a large number of compromised machines, which are distinctively referred to as bots or zombies, and are remotely controlled by the “botmaster”. Botnets were originally coded to act as means for vandalism and to “show off” hacking skills, yet they have presently evolved into sophisticated tools that are continuously being leveraged for online financial ... Read More »

Two Members of a Spain-based Mobile Phone Fraud Network Arrested

Two persons were arrested in Jumilla, Spain for being part of a network that fraudulently purchased smartphones from service providers. The Civil Guard of the Region of Murcia carried out a law enforcement action, called “Operation Darkweb” in Jumilla, to clarify a series of scams in the acquisition of mobile phones. The operation resulted in the arrest of two people ... Read More »

How Dark Web Evolved Into a Well-Structured Global Criminal Network

Earlier this week, award-winning business journalist Anthony Hilton explained that the dark web and its anonymous marketplaces operate as well-structured businesses. According to Hilton, the dark web itself portrays the structure and characteristics of a well-structured global criminal network. Over the past few months, law enforcement agencies internationally have started to focus on the crackdown of dark web criminals, drug ... Read More »

What CIA does on target’s Local Area Network

Based on Wikileaks Vault 7 leak of CIA tools and documents, we can imagine what a data exfiltration attack to a corporate network by CIA looks like. I’m going to focus on the Local Network activity so let’s say there is already a compromised computer in the LAN that will be used as a pivot to further exploit the target ... Read More »

Deadmann : A New Dead Man Switch’s Network That Utilizes The Tor Network

Deadmann is a newly proposed anonymous network protocol which is comprised of multiple dead man’s switches that can share data even when a user across the network becomes incapacitated. Previously proposed models of dead man’s switches failed at achieving the following: Preserve users’ anonymity Enable users to efficiently manage their own data Encrypt users’ data in a manner that can ... Read More »

Classification of Illegal Activities On the Tor Network

If we envision the internet as an ocean, the Surface Web represents no more than the superficial waves flowing on top. The deep web, on the other hand, represents information that is deeply sunken and cannot be accessed by conventional search engines. The Deep Web contains a number of Darknets, that cannot also be indexed by conventional search engines, and ... Read More »

Islamic State Network Focusing On The Recruitment Of Women Detected In Catalonia

Catalonian authorities detected a network of the Islamic State focusing on the recruitment of women to their cause. According to the report, the terrorist group uses the dark net and social media platforms to find women for their cause. The Reporting Commissioner of the Mossos d’Esquadra (Catalonia’s police force – “Troopers” in English) detected a network of the ISIS that ... Read More »