Home » Featured (page 10)


Steroid Trafficker Sentenced for Online Distribution Ring

According to Acting United States Attorney Tom Larson of the Western District of Missouri, the second defendant of a four person online steroid smuggling ring received a sentence in a federal court. The defendant, Aaron Vincent Schweidler, a 32-year-old from Smithfield, NC, ran a $2.25 million anabolic steroid “over the internet” conspiracy. U.S. Chief District Judge Greg Kays sentenced him ... Read More »

onion routing with identity.png

Identity Based Onion Routing – A Secure and Efficient New Scheme for Tor

The onion routing internet protocol promotes anonymous networking on various forms of public networks. Today, the are several onion routing schemes, such as Tor, to deploy the anonymous networking protocol across public networks. Despite the fact that the multi-pass schemes for the construction of the cryptographic circuit are somehow satisfactory, their circuit construction algorithms exhibit some drawbacks when it comes ... Read More »

Malware Bricking Insecure IoT Devices Could Be a Vigilante Tool Against Botnets

According to a researcher, a newly found malware could be an anti-botnet vigilante tool by bricking the IoT devices that are considered as insecure. A researcher, Pascal Geenens, who discovered the BrickerBot malware told Cyberscoop that the newly found malicious software could be a creation of a vigilante hacker. The new malware is capable of attacking and destroying insecure connected ... Read More »

The bitcoin blockchain and truly trusted computing

The idea of “Trusted Computing” is neither new nor complicated and involves code being electronically signed so that it cannot damage your computer. The idea is to “certify” software to avoid it causing the computer to crash or any other negative effects. The practical problems of such technology become obvious if you use either open-source or free software – the ... Read More »

Australian Border Force to Increase Darknet Presence

The US fought designer drugs, commonly referred to as analogues, ever since their inception. Clandestine laboratories kept creating new “designer drugs” that mimicked the effects of another drug, usually a pharmaceutical compound. US authorities found themselves unable to maintain a pace with new chemicals. Now, Australia announced that they stood in a similar position. These analogue “cat-and-mouse games,” so to ... Read More »

BTC india.jpg

Indian Drug Enforcement Officer Caught Stealing Bitcoins

Satyendra Kumar Singh an investigator with the Ahmedabad division of India’s Narcotics Control Bureau has been accused of unfreezing bitcoin accounts that were frozen during a drug investigation in 2015. That 2015 investigation involved five men in their twenties who were operating a company called Provizer Pharma. Provizer sold drugs online to people all over the world. The State of ... Read More »

A Novel System for Secure Offline Bitcoin Payments

Bitcoin is inarguably the most successful cryptocurrency so far, when market capital and growing popularization are considered. Users have to have online access to be able to initiate transactions to spend their bitcoins. A certain amount of time is required for the transaction to be successfully confirmed and validated (20-30 minutes in most cases). However, a large number of real ... Read More »

Pakistan Sees Increased DNM Credit Card Sales

On March 20, two Two Chinese citizens fell into Pakistani Federal Investigation Agency custody after being caught on camera while stealing from ATMs. The FIA announced that the ATM fraud hit their radar on March 10; they received complaints from the branch manager of Bank alHabib, Chartered Accountant Avenue Branch. After an investigation ensued, authorities captured both “hackers.” According to ... Read More »

Rule 41 Warrant Used in Kelihos Botnet TAKEDOWN

A joint announcement from the FBI, the Department of Justice Criminal Division, and the FBI Anchorage Criminal Division released information on an extensive operation to disrupt the Kelihos botnet. Additionally, they announced that the US government will continue to share samples of the Kelihos botnet with the internet security community. The target in doing so is to keep antivirus software ... Read More »

Outlaw Market Prepares Scam-Deterring Revamp

Outlaw is one of the few darknet marketplaces that predated Alphabay—almost difficult to imagine. However, other than a small number of devoted users, the market sees fewer new customers than Alphabay or Dream, the other darknet marketplace veterans. Why this is the case, only few know. However, the administration outlined plans that may not only revolutionize Outlaw but also attract ... Read More »

Netherlands Identity Fraud Doubled Between 2015-2016

Increased levels of fraud, in general, should come as no surprise. And even less of one after glancing at the DeepDotWeb frontpage where no mistake regarding fraud, cybercrime, or hacking could possibly be made; on almost a daily basis, a new indecent occurs. A major company takes a hit, the United States indicts another hacker, or researchers find a new ... Read More »

Classification of Illegal Activities On the Tor Network

If we envision the internet as an ocean, the Surface Web represents no more than the superficial waves flowing on top. The deep web, on the other hand, represents information that is deeply sunken and cannot be accessed by conventional search engines. The Deep Web contains a number of Darknets, that cannot also be indexed by conventional search engines, and ... Read More »

Examining the Bitcoin Address Graph

Bitcoin is by far the most popular unregulated, decentralized cryptocurrency. Since the genesis block was mined, the number of bitcoin users has been rising at a rather exponential rate. While bitcoin’s public ledger offers high levels of transparency, it does not directly reveal the real-world identity of either the senders or receivers of bitcoin transactions. A single bitcoin transaction is ... Read More »