Home » Articles

Articles

Brutal Kangaroo and Drifting Deadline – hacking air-gapped computers

Brutal Kangaroo and Drifting Deadline – hacking air-gapped computers There’s a saying that goes around: “nothing is safe if hackers are motivated” and todays topic definitely supports it. Air-gapped computers definitely make the job hard for hackers, but let’s see what can we do after learning on Stuxnet and CIA’s Brutal Kangaroo. My previous article was about using USB attack ... Read More »

HOW HACKERS HIDE MALICIOUS SITES

  Since 2006, security researchers have been watching a new technique used in cybercrime to hide malicious traffic behind an intricate network of proxies. This technique called fast-flux, was initially used by few people but lead to thousands of personal computers infected and criminal content like phishing sites and malwares successfully delivered to innocent users. Fast-flux networks are today the ... Read More »

The Deep Web, Novel Psychoactive Substances (NPS) and Psychonauts

Generally speaking, the internet and social media are growing in popularity at considerably rapid rates and presently play a pivotal role in the sale, distribution and marketing of “quasi” legal drugs. The quasi-anarchic nature of online marketplaces is gradually imposing a myriad of changes in illegal drug scenarios, changing the drug market to a virtual rather than a street perspective, ... Read More »

Geographical Analysis of Drug Trafficking On a Popular Darknet Marketplace

  Cryptomarkets are novel forms of online marketplaces, hosted on darknets, that simplify the trading of a myriad of illegal and illicit merchandize, namely drugs. Even though most relevant academic research studies focus on illegal drugs, a wide variety of other products and goods that are related to identity, or financial fraud, counterfeit goods or replicas, in addition to doping ... Read More »

UnitecDEAMP -A Novel Darknet Traffic Decomposition Approach

Malware is increasingly becoming major threats that almost always finds a way to penetrate through a network, undermining the integrity, confidentiality and availability of data. Network forensics represent the utilization of scientifically proven strategies to identify, obtain, fuse, examine and analyze digital evidence of pre planned intent, or monitored success of malicious activities meant to corrupt, disrupt and/or compromise various ... Read More »

(Some Of) The Best Ways To Store Your Passwords

  Storing a password has always been a problem that involved other problems. Today everyone has a digital life made by different accounts for each activity, from online banking to email, from different forums to social networks, so it’s crucial to find a way to remember all the credentials, possibly avoiding password stealing. If you search on the web you’ll ... Read More »

A New Blockchain Market Engineering Approach – A Research Paper

Market engineering refers to the process of prudently restructuring a market aiming at transforming it into efficient and effective means for execution of exchange transactions. Via presenting a holistic, interdisciplinary set of tools to systematically analyze, design, structure and build the elements of various market platforms, to determine fields of application and also to formulate theoretical design and develop evaluation ... Read More »

Restricting Illegal Cryptocurrency Transactions Via An Ethereum Token

The trend of cryptocurrencies is flaring up like never before these days, as more individuals are tempted to use blockchain based, decentralized cryptocurrencies. Due to their decentralized peer-to-peer (P2P) nature, cryptocurrencies have won the hearts of decentralization advocates, crypto-anarchists and libertarians. Nevertheless, given the fact that cryptocurrencies cannot be controlled by any form of intermediary, or third party, they can ... Read More »

UVCoin – A New Cryptocurrency With Improved Scalability and Control Over Monetary Supply

Apart from their booming success, presently available cryptocurrencies suffer from multiple limitations. By far, the most demanding of these limitations is their poor scalability. The most used cryptocurrency network right now is bitcoin, which can handle no more than 7 transactions per second; this is significantly low when compared to Paypal which can handle over 100 transaction per second, and ... Read More »

Analyzing Bitcoin Mining Botnets (Minerbots) – How Can We Shield Our Systems Against Minerbots?

Botnets have recently become one of the most serious forms of malicious tools used by cybercriminals to launch a myriad of attacks not only on individuals, but also on servers belonging to large organizations. Botnets can be used to perform a variety of malicious attacks including DDoS attacks, email spamming, phishing of private data, identity theft, bitcoin mining and others. ... Read More »

Tor anonymizers.jpg

ROUTING ALL TRAFFIC THROUGH TOR: PRO AND CONS

Every reader of DeepDotWeb knows the importance of surfing the web protected by the Tor network and therefore uses a Tor Browser Bundle. The TBB not only helps us connecting through the Tor network while surfing the internet allowing us to visit onion sites and hiding our ip, but it also uses many security built-in plugins to increase our anonymity ... Read More »

A New Patent – System for Autonomous Device Transacting Using Cryptocurrency

Across a great proportion of centralized systems, many transacting devices, whether separated by short or long distances, can achieve high levels of interaction and connectivity without having to be connected physically with each other and as such, are able to communicate wirelessly with one another. Nevertheless, such centralized systems that connect these devices are associated with multiple disadvantages that limit ... Read More »

The Distribution of Opioids on a Darknet Markets – A Research Study

Crypto-marketplaces are marketplaces that are hosted on anonymous networks, such as the Tor network, or other Darknets, and are mainly focused on the sale of illegal substances and illicit drugs. These online marketplaces utilize various tools to ensure the anonymity of their users and confidentiality of the delivered products by mail. Throughout the past few years, illicit drug trafficking on ... Read More »

VOIP (IN)SECURITY: ALTERNATIVES TO SKYPE AND WHATSAPP

  Skype was released on August 29, 2003 and was quite a revolution. With Skype the voice and video information was packetized and transmitted over internet protocol networks; people could call for free, using only an internet connection. Skype was then acquired by Microsoft that started to work with NSA in the PRISM surveillance program in order to access private ... Read More »

Comparing the Security of Bitcoin to That of Common Online Payment Systems

Today’s technology offers us numerous online payment systems which enable us to easily execute financial transactions from almost any spot on the globe, in real time, using any device with internet access. Nevertheless, on the world wide web, there are multiple threat agents, malicious activities, and vulnerabilities, as well as the existence of security exploits; all of which are revealed ... Read More »