Home » Articles (page 2)

Articles

Introduction to Bitcoin Transaction Accelerators

As we watch Bitcoin blockchain scaling issues popup, their weight can be felt by users. The waiting list for BTC transaction sometime grows beyond control, causing users either to pay a large fee or to content with delayed transactions. Some Bitcoin service providers, however, offer Bitcoin transaction accelerator services intended to help clear the pending Bitcoin transactions and make them ... Read More »

port_scan_monitor_sc.gif

Examining Port Scan Attacks Via Data From Darknets

Port scanning is a preliminary approach that is most commonly used by hackers in order to determine vulnerable hosts that they can attack successfully. Scanning is a fully automated process that is utilized by hackers to detect machines, servers and peripherals that exist on a given network. A successful scan can yield details of machines discovered on the scanned network ... Read More »

How To Setup Your Own Honeypot?

A honeypot is a system designed to appear vulnerable to attackers. The goal of a honeypot is to log all the attackers’ activities to study their behaviour, log their Ips, track their location, collect zero-days. The idea of “honeypot” is nothing but a server that offers any kind of services to the attacker, from SSH to telnet, showing several well ... Read More »

A Novel Hybrid Web Crawler For Searching Both The Surface and Deep Web

  The spread of terrorism over the globe has led to an increase in the efforts of law enforcement agencies (LEAs) along the rough path of discovering information related to terrorist activities via taking advantage of the most recent innovations in the web search sector. Their efforts have been centered upon the “surface web” which represents parts of the internet ... Read More »

Targeting Adversaries & Deanonymization Attacks Against Tor Users

  Tor is a P2P network for promoting traffic security of various forms of internet communications for millions of users worldwide. In most cases, Tor users are very unlikely to become the target of an adversary, as they are namely shielded via Tor against opportunistic local hackers, local censorship authorities and hostile destinations. Deanonymizing adversaries act through attempting to attack ... Read More »

The Ghost Telephonist Allows Hackers to Make Calls and Texts from Your Phone Number

Chinese researchers unveiled a new mobile phone hacking technique they have created during a talk at this year’s Black Hat hacker conference in Las Vegas, Nevada. The researchers are from Qihoo 360’s Unicorn Team. The Unicorn Team specializes in hacking radio and cellular technology. On Thursday, July 27th, the Unicorn Team delivered a presentation at Black Hat on their new ... Read More »

Top Exploits and Hacks Debuted at Black Hat and DEFCON This Year

Every July hackers from around the globe descend on Las Vegas, Nevada for a week of hacker conferences which includes Black Hat USA, DEFCON, and BSides Las Vegas. The annual week of hacker conferences brings security researchers who present their latest findings on computer vulnerabilities and exploits. 2017 marked the 25th DEFCON, which has been held in Las Vegas every ... Read More »

Malicious Websites Explained

Surfing the web you will have heard about the existence of malicious websites. Virustotal is a well known website that helps you to discover which site is malicious and which is not before actually requesting the suspected URL in your browser. But what does it mean that a website is classified as “malicious”? What actions do these sites perform and ... Read More »

Phishing: Tactics And Tools Explained

Phishing (password harvesting fishing) is one of the most effective technique that hackers use to steal your credentials. Phishing is a mix of social engineering and computer skills that consists of pretending to be a reputable organization asking you to do a certain security procedure; this procedure involves changing your password or revealing your bank credentials. The innocent user is ... Read More »

Brutal Kangaroo and Drifting Deadline – hacking air-gapped computers

Brutal Kangaroo and Drifting Deadline – hacking air-gapped computers There’s a saying that goes around: “nothing is safe if hackers are motivated” and todays topic definitely supports it. Air-gapped computers definitely make the job hard for hackers, but let’s see what can we do after learning on Stuxnet and CIA’s Brutal Kangaroo. My previous article was about using USB attack ... Read More »

HOW HACKERS HIDE MALICIOUS SITES

  Since 2006, security researchers have been watching a new technique used in cybercrime to hide malicious traffic behind an intricate network of proxies. This technique called fast-flux, was initially used by few people but lead to thousands of personal computers infected and criminal content like phishing sites and malwares successfully delivered to innocent users. Fast-flux networks are today the ... Read More »

The Deep Web, Novel Psychoactive Substances (NPS) and Psychonauts

Generally speaking, the internet and social media are growing in popularity at considerably rapid rates and presently play a pivotal role in the sale, distribution and marketing of “quasi” legal drugs. The quasi-anarchic nature of online marketplaces is gradually imposing a myriad of changes in illegal drug scenarios, changing the drug market to a virtual rather than a street perspective, ... Read More »

Geographical Analysis of Drug Trafficking On a Popular Darknet Marketplace

  Cryptomarkets are novel forms of online marketplaces, hosted on darknets, that simplify the trading of a myriad of illegal and illicit merchandize, namely drugs. Even though most relevant academic research studies focus on illegal drugs, a wide variety of other products and goods that are related to identity, or financial fraud, counterfeit goods or replicas, in addition to doping ... Read More »

UnitecDEAMP -A Novel Darknet Traffic Decomposition Approach

Malware is increasingly becoming major threats that almost always finds a way to penetrate through a network, undermining the integrity, confidentiality and availability of data. Network forensics represent the utilization of scientifically proven strategies to identify, obtain, fuse, examine and analyze digital evidence of pre planned intent, or monitored success of malicious activities meant to corrupt, disrupt and/or compromise various ... Read More »

(Some Of) The Best Ways To Store Your Passwords

  Storing a password has always been a problem that involved other problems. Today everyone has a digital life made by different accounts for each activity, from online banking to email, from different forums to social networks, so it’s crucial to find a way to remember all the credentials, possibly avoiding password stealing. If you search on the web you’ll ... Read More »