Home » Articles

Articles

DDoS Attack Explained

DDoS means Distributed Denial of Service and it occurs when an attacker overwhelms a target, that is generally a server, with a load of traffic that the target cannot manage. DDoS is a special kind of DoS, Denial of Service attack, and it is important to notice the difference between them. A Dos, in fact, involves a single machine trying ... Read More »

Malware Analysis Tools Explained

When it comes to malware infections, you can never get comfortable with your own system and paranoia is your best friend, as we can observe in the second episode of the third season of Mr Robot, when Elliot uses rkhunter to control if a malware has been installed on his computer. In this article we’ll see that is possible to ... Read More »

C:\Users\Vitáris\Desktop\twerk\img\hack-wi-fi-selecting-good-wi-fi-hacking-strategy.1280x600.jpg

Dispatch from Academia: Exit scams, hacking, violence, predation and fraud

Rasmus is a PhD student at the School of Criminology at University of Montréal. He has studied DNM’s since early 2014 and has, among other things, researched the politics of DNM’s, the demand DNM’s satisfy, how DNM’s affect global drug trafficking and much more. Currently his PHD research centers around trust and transactions on DNM’s, and he works with leading ... Read More »

Starting Your Black-Market Business in The Digital Era

In this day and age, businesses have leveraged the power of the internet to expand their businesses significantly. With corporate giants such as Amazon and eBay, there is no question to whether it works – it’s 2017, and nearly everybody owns at least a smartphone and a computer. But it’s not only your conventional businesses that have leveraged the insane ... Read More »

Tor Fingerprinting – Is the Tor Browser Immune Against Browser Fingerprinting?

On October 4, 2013, the Guardian published a report which stated that Edward Snowden, a former CIA employee and whistleblower, sent the British newspaper classified documents that proved that the National Security Agency (NSA) had been repeatedly making attempts to formulate successful attacks against Tor, or the onion router. However, the report claimed that all of NSA’s attempts failed to ... Read More »

TorPolice – A Novel Framework For Enforcing Access Control Policies Across the Tor Network

The Tor network represents the most popular anonymity network, which is currently used by millions of users all over the world. Nevertheless, access control doesn’t exist for users of the Tor network, which renders the network susceptible to malicious attacks and botnet abuse. For instance, adversaries often exploit exit relay nodes utilizing them as stepping stones for various forms of ... Read More »

Basic guide to PGP on Tails

Part 0 – Introduction Experienced readers already know that PGP is just as essential to survive in the DNM scene as a secure Operating System (OS) setup. However it is not enough to have them, you also need to know how to use them properly. While there are already guides for using PGP on Windows, OS X and Linux, this ... Read More »

Cyber-security: A Rising Threat in the Middle East

According to the Middle Eastern Global Economic Crime Survey Report (2016), cybercrime is one of the highest economic crimes reported in the Middle East, affecting 30% of organisations in 2016. This surge in cybercrime is ultimately the result of the Cooperation Council for the Arab States of the Gulf (GCC) pursuing unique structural reform initiatives, aimed at reducing reliance on ... Read More »

Some countries are opening doors to adopt cryptocurrencies in a larger scale

Different countries around the world are facilitating the use of cryptocurrencies for monetary operations. Estonia Estonia, known already for being a technologically leading country, deeply analyzed and proposed, is set to issue a new legal cryptocurrency, named Estocoin, that would be recognized as a legal currency. Kaspar Korjus, Managing Director at e-Residency, posted in a Blog that the country would ... Read More »

Loopix: New Anonymization Service?

We are living in times where governments and corporations are spying on internet users, and some countries are banning or threatening to weaken privacy enhancing technologies such as Virtual Private Networks (VPNs) and encryption, and calling for more surveillance and data retention. Now more than ever internet users need technology which preserves their digital privacy rights. Currently there are only ... Read More »

Risks Of The Double Spending Attack

You may not know that Bitcoin is not the first digital coin project in history. Before it, other ideas were developed in order to create a digital currency but they all failed due to a very serious security issue that developers were not able to solve. Just to use simple words, when you spend your banknotes, you have to physically ... Read More »

Testing Modern Antivirus Software part 1

This is an introduction to this vast topic in which we will focus on evading AV signature detection attempts to run Metasploit’s windows/shell/reverse_tcp payload under the nose of Kaspersky, Avira, Avast and 58 other (on their VirusTotal edition). Let’s start with information gathering – what AV actually does in order to stop malware. Static countermeasures, aka scan-time analysis Static signature ... Read More »