Home » Featured (page 20)

Featured

Two Englishmen Sentenced for Downloading Child Pornography from the Darknet

On January 5, both Exeter Crown Court and York Crown Court in England saw two separate cases of defendants who used the darknet to access child pornography. In one case, a 40-year-old from Birchy Barton Hill, Exeter, pleaded guilty to three counts of downloading or viewing child pornography. In the other case, Martin Richard Shepherd, a 45-year-old hospital IT employee, ... Read More »

http://www.aerotelegraph.com/wp-content/uploads/2016/12/hacker.jpg

Aviation Industry Under Attack By Chinese Hackers

A recent study by a security company shows that Chinese hackers are conducting successful cyberattacks on the aviation industry. Long since, security experts have been warning firms and governments against Chinese hacker attacks aiming at sensitive information and business secrets. Fire Eye, a security software company, released a report showing that the cybercriminals from the Asian country are attacking the ... Read More »

Dutch Public Prosecutor Fights Against Bitcoin Money Laundering

According to a survey conducted by the media outlet fd.nl, the Dutch Public Prosecutor (OM) is waging a war against criminal traders and exchanges of bitcoin. The Dutch OM is looking forward to at least three BTC money laundering criminal cases in 2017. Bitcoin trading has always been legal. The cryptocurrency had seen a 28 percent increase from 2015 to ... Read More »

iamsatoshi.jpg

Bitcoin Price Analysis January 16, 2016

Beijing Now Controls the Price of Bitcoin Bitcoin kicked off the new year at lofty levels of $1139, inches away from gold parity – depending on which exchange you looked at. The digital currency surprised critics last year, scooping pole position for best performing currency and commodity class of 2016. Bitcoin investors took home 125% returns at close of December ... Read More »

West Virginian Sentenced for Trafficking 400KG Marijuana, Most Via Postal Carriers

On January 3, 2017, 27-year-old Parker Wyatt Mays received a prison sentence of one year and one day for his admitted participation in an intranational drug trafficking ring. The 27-year-old from Huntington, West Virginia, pleaded guilty to marijuana distribution in late August 2016. The Drug Enforcement Administration pursued Mays and a large list of co-conspirators in an ongoing, long-term investigation. ... Read More »

CASPER – Proof of Stake (PoS) Consensus Protocol For Implementation On Ethereum

CASPER represents a security deposit protocol that relies on an economic consensus approach. Accordingly, nodes across the network, which are called “bonded validators”, must pay a security deposit, along an action named “bonding”, in order to be part of the consensus via means of block production. Casper determines the amount of rewards received by the validators mainly through the protocol’s ... Read More »

Patent – A System For Exchanging Value Across Various Cryptocurrency Blockchains

Cryptocurrencies can be exchanged within a peer-to-peer environment, without relying on 3rd intermediary parties. Although exchange of value is possible using a single cryptocurrency, exchange of values across various coins’ blockchains is currently not possible without utilization of some sort of an intermediary party, such as cryptocurrency exchanges. To overcome this problem, a patent was introduced proposing an innovative system ... Read More »

Bitcoin news roundup January 15, 2017

This week’s summary of various cryptocurrency news and developments: New developments: New court filing shows Coinbase is ready to fight the IRS The IRS’ attempt to obtain Coinbase’s user records was contested by Jeffrey Berns Esq. The IRS and DOJ wanted to stop Mr. Berns from interfering in the summons, arguing he had no legal basis as reported by Deep ... Read More »

An Overview Of Smart Contract Scripting For Cryptocurrency Blockchains

The blockchain technology offers secure means for recording information in a distributed, decentralized manner, which opened the door for using it to transfer value via cryptocurrecies. The blockchain technology utilized the concept of “smart contracts” which was coined by Nick Szabo in 1994, aiming at revolutionizing contract law and formal business practices via innovation of electronic commerce protocols between trustless ... Read More »

Tutorial: How To Buy From the Valhalla Market?

Today we want to show you how to use the Valhalla Market, also known as Silkkitie. It is one of the oldest markets on the deepweb and has been active since 2013 . Valhalla supports multisig payments, escrow and Finalize Early. Although multisignature payments are supported, the funds in your balance are still held by the market , therefore exit ... Read More »

Petya ransomware

GoldenEye ransomware is sending companies fake job applications

Cybercriminals keep on finding new ways to boost their conversion rates and make a bigger profit at the end of the month. Now, cybersecurity researchers at Check Point tell us about GoldenEye ransomware, a variant of the Petya ransomware that is being used to target companies’ HR departments, as people in these departments regularly need to open files in emails ... Read More »

Ex-UKIP Member Faces Upto 20 Years in Prison For Wire Fraud

In August of 2016, DeepDotWeb reported the UK Independence Party (UKIP) and the European Parliament member Nigel Farage’s aide’s arrest in the midst of boarding a flight to Britain. During that time, former UKIP aide George Cottrell was charged with 21 offences, including money laundering and blackmail. This week, Cottrell plead guilty to wire fraud, settling an agreement with the ... Read More »

signal-header-3928749d381ba96d54fc66a0673114c2.jpg

Signal for Android Updated to Bypass Censorship in Cuba and Oman

Open Whisper Systems (OWS), the group behind the Signal, encrypted messaging app endorsed by Edward Snowden, updated their Android app to circumvent censorship in Cuba and Oman. The circumvention of such Internet blocking is not a new concept—engineers built Tor for the same reasons. Likewise, this is nothing new for OWS either. In Mid-December, they executed a similar method of ... Read More »

Firefox 52 Adds a Tor-Like Font Whitelist to Prevent Fingerprinting through OS Fonts

Researchers from Mozilla scheduled a release for a stable build of Firefox 52—this build’s significance came from a Tor-esque privacy implementation. In the user-submitted bug report, Bug 1121643 from 2015, a user posted that a system’s fonts exposed information about that user. Then, Tor developers, as another user commented, issued a patch to “Bug #13313: Pref ‘font.system.whitelist.’” Tor’s patch to ... Read More »

A new technique utilizing sub-chains to improve bitcoin’s scalability

The scalability of bitcoin is one of the main issues hurdling its mass adoption. Moreover, oephan risk related to the blockchain’s large blocks limits the transactional capacity of bitcoin. A paper published on Ledger Journal has proposed a new technique that utilizes the concept of weak blocks, or functional difficulty blocks, to construct subchains that extend between adjacent real block ... Read More »