Home » Tag Archives: attacks

Tag Archives: attacks

Plans to reform IT Act to curb dark web attacks in India

The level of cybercrimes castigated by dark web and cryptocurrencies in India has experienced a sharp rise in recent years. There is no doubt that the government is doing all in its capacity to fight the cybercrimes at all cost. The Indian government is working with the Intelligence Bureau to amend the Information Technology Act, in order to deal more ... Read More »

ddos.jpg

Prevention against DDoS attacks

DDoS attacks lead to the most devastating effects within a network. DDoS attacks are forms of congestion-control problems, and because most forms of such congestion are secondary to the effects of malicious hosts not following conventional end-to-end congestion control, the problem must be solved by routers. Designing a mechanism to counteract unidentified attacks targeting the application and transport layer represents ... Read More »

Tor (the myth and reality.PNG

DeepCorr – A novel efficient system for flow correlation attacks on Tor

Flow correlation represents one of the essential techniques utilized in a myriad of deanonymization attacks launched against Tor. Even though flow correlation attacks are highly important , current flow correlation techniques are ineffective in linking Tor traffic flows when implemented at a large scale, i.e. they require long flow observation rates that are highly impractical, or are associated with high ... Read More »

Edward Snowden Helps Create App to Fight Evil Maid Attacks

The man who helped expose the NSA’s warrantless global mass surveillance programs is now helping users protect their hardware from physical tampering by attackers. NSA whistleblower Edward Snowden has helped create a new Android app which helps secure hardware from “Evil Maid” attacks. An Evil Maid attack is when a device is physically tampered with, without the device owner’s knowledge. ... Read More »

Tor (the myth and reality.PNG

An Overview of Sniper Attacks Against the Tor Network & Current Defenses

Wide scale internet censorship attempts by governments have catalyzed the creation of newer techniques to enhance the privacy of internet users and resist various censorship attempts. Tor represents the most widely used system for counteracting censorship and promoting the privacy of internet users. Currently, Tor serves hundreds of thousands of internet users all over the world and transfers approximately 3 ... Read More »

phisherdarkweb

Google Study Says Phishing Attacks Are the Biggest Threats to Web Users

A study by Google discovered that phishing attacks through fake emails were as effective as compared to data breaches that exposed usernames and passwords. Cyber criminals or cyber groups manage to steal over 25,000 valid sets of web credentials for Gmail accounts every week, painting a picture of the extent this problem has reached. Hackers are constantly searching for, and ... Read More »

FBI Asks Businesses to Report DDoS Attacks

In an October public service announcement, the FBI explained “DDoS-for-hire” services and requested that victims of DDoS attacks file a complaint with the FBI’s Internet Crime Complaint Center (IC3). They explained that malicious actors sell DDoS-for-hire services (aka booters) on criminal marketplaces with effectively one goal: preventing access to a “U.S. company or government website.” In an earlier press release, ... Read More »

The SSH Public Key Authentication Protocol Over Tor – How Vulnerable It Is to Timing Attacks?

The Secure Shell (SSH) public key authentication protocol represents one of the most popularly used authentication methods that rely on public key cryptography. Apart from its massive popularity, the SSH protocol hasn’t been massively studied and even the most advanced users often misconceive its functionality. Version 2 of the SSH protocol is presently being used by millions of internet connected ... Read More »

New UK Code Seeks Tighter Security on Ships against Cyber Attacks

A new code of practice has been launched by the UK government aimed at helping ship owners improve and tighten security. This decision came as a result of the growing threat that cybercrime poses as it continues to spread and this time around to a much more bewildering place, the shipping sector. The term ‘cybercrime’ to most people, just gives ... Read More »

An Overview of Modern Tor Deanonymization Attacks

Tor was designed to provide a decentralized, censorship resistant network that can offer internet users, websites and various web services anonymity via easy-to-implement means. Nevertheless, since the advent of Tor, some users have failed to maintain their anonymity. Throughout this article, we will discuss Tor’s deanonymization techniques that are available today. We will go through traffic and timing correlation attacks, ... Read More »

Report: Cyber Attacks At An All-time High

The San Jose headquartered cyber security company ThreatMetrix released its report for the second quarter of 2017. The study showed that cyber attacks reached their highest-ever levels. According to ThreatMetrix’s study, the cyber security detected 144 million attacks in the last 90 days, which is an all-time high. The level and the rate of attacks are rising globally with the ... Read More »

rsz_20444222428_f367c34dd1_b.jpg

Researchers Discover Sneaky Phishing Attacks on Credentials, Sold on Dark Web

A new type of PDF phishing attack has emerged, with analysts claiming that the attack originated from Western Africa based on the IP addresses evaluated during previous investigations. The attack embeds phishing URLs to the attached PDF that redirect users to a phishing platform that steal user credentials. According to Silicon, dark web security specialists Flashpoint first discovered and investigated ... Read More »

port_scan_monitor_sc.gif

Examining Port Scan Attacks Via Data From Darknets

Port scanning is a preliminary approach that is most commonly used by hackers in order to determine vulnerable hosts that they can attack successfully. Scanning is a fully automated process that is utilized by hackers to detect machines, servers and peripherals that exist on a given network. A successful scan can yield details of machines discovered on the scanned network ... Read More »

Targeting Adversaries & Deanonymization Attacks Against Tor Users

  Tor is a P2P network for promoting traffic security of various forms of internet communications for millions of users worldwide. In most cases, Tor users are very unlikely to become the target of an adversary, as they are namely shielded via Tor against opportunistic local hackers, local censorship authorities and hostile destinations. Deanonymizing adversaries act through attempting to attack ... Read More »