Blog Posts Tagged with "TOR"

B0b557cb2e5eb9c6304d00a8a61a9d34

Cloudflare vs Tor: Is IP Blocking Causing More Harm than Good?

May 10, 2016 Added by:Peter Zavlaris

To some, the Tor network is believed to be a haven for threat actors, as well as a platform for launching web based attacks.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Black Hat Conference Talk on How to Break Tor Cancelled

July 22, 2014 Added by:Eduard Kovacs

Organizers of the Black Hat security conference that's scheduled to take place next month in Las Vegas announced that a presentation detailing how the Tor network's users can be de-anonymized has been cancelled.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Skynet, the potential use of Tor as a bulletproof botnet

December 10, 2012 Added by:Pierluigi Paganini

In September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

The Deep Web vs. Network Security Monitoring

August 31, 2012 Added by:Dan Dieterle

The “Deep Web”, Dark Web or hidden internet, is a massive collection of sites and databases that don’t show up in standard search engines. So, is this a place that you want ANYONE on your corporate network to visit? NO WAY. Though many use Tor for legitimate purposes, the deep web just isn’t that kind of place...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Traveling the Silk Road: A Study of the Online Black Market

August 10, 2012 Added by:Pierluigi Paganini

I've found some interesting research conducted by Carnegie Mellon computer security professor Nicolas Christin on the earnings of one of the most famous black markets in the Deep Web, the Silk Road. It seems to be able to realize $22 Million in annual revenues related to the drug market...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyberoam DPI Vulnerability Alarms Tor Project

July 10, 2012 Added by:Pierluigi Paganini

Tor Project found a vulnerability in Cyberoam DPI where all share the same digital certificate and the private key is the same for every device. The implications are serious, as it could be possible to catch traffic from any user by extracting the key and importing it into other DPI devices for interception...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Exploring Hacktivism and the Deep Web

July 03, 2012 Added by:Pierluigi Paganini

When we think of hacktivism, immediately we connect it to anonymity. In fact, those who wish to express their dissent through hacktivism most often prefer the use of anonymity. It's clear that the ultimate context in which these people can freely exchange ideas and information is through the Deep Web...

Comments  (2)

48062676f7b2fc521b0b32a3c6494469

Anonymity and E-Commerce in the Black Market with Tor

July 02, 2012 Added by:gaToMaLo r. amores

A skilled attacker may be able to determine you are using a VPN to connect to Tor by fingerprinting traffic streams. Tor traffic is padded to 512 byte size packets, normal VPN traffic is not. By filtering for 512 byte streams, an attacker can determine who all is using Tor in a given area...

Comments  (1)

48062676f7b2fc521b0b32a3c6494469

What Are ToR Hidden Services?

June 15, 2012 Added by:gaToMaLo r. amores

In the ToR-.onion network, the client asks to use a website's services, then starts a handshake at a rendezvous point (onion relay) - not at the server/IP. They're never on the site/server when in OnionLand, can’t do a WhoIs and get an IP and cannot find a geo-location. If they can’t find you, they can't hack you...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

What is the Deep Web? A Trip into the Abyss...

May 25, 2012 Added by:Pierluigi Paganini

The Deep Web is considered the place where everything is possible, you can find every kind of good and service for sale, but most of them are illegal. The hidden web offers cybercrime great business opportunities, hacking services, malware, stolen credit cards, weapons, etc...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Online Narcotics Marketplace Utilized TOR

April 23, 2012 Added by:Headlines

“The drug trafficking organization... was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology...”

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

HTTPS and Tor: Working to Protect Your Security Online

March 09, 2012 Added by:Electronic Frontier Foundation

EFF frequently recommends that Internet users who are concerned about protecting their anonymity and security online use HTTPS Everywhere, which encrypts your communications with many websites, in conjunction with Tor, which helps to protect your anonymity online...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Hidden Wiki: Layers of The Onion Router Networks

September 04, 2011 Added by:Infosec Island Admin

Someone recently asked if I had ever heard of “The Hidden Wiki” They said they had just perused an ad that purported to offer “hired killer” services. This person immediately thought it was just a joke, but it turns out that hired killers are just the tip of the iceberg within TOR...

Comments  (5)