Home » Tag Archives: attacks

Tag Archives: attacks

An Overview of Modern Tor Deanonymization Attacks

Tor was designed to provide a decentralized, censorship resistant network that can offer internet users, websites and various web services anonymity via easy-to-implement means. Nevertheless, since the advent of Tor, some users have failed to maintain their anonymity. Throughout this article, we will discuss Tor’s deanonymization techniques that are available today. We will go through traffic and timing correlation attacks, ... Read More »

Report: Cyber Attacks At An All-time High

The San Jose headquartered cyber security company ThreatMetrix released its report for the second quarter of 2017. The study showed that cyber attacks reached their highest-ever levels. According to ThreatMetrix’s study, the cyber security detected 144 million attacks in the last 90 days, which is an all-time high. The level and the rate of attacks are rising globally with the ... Read More »

rsz_20444222428_f367c34dd1_b.jpg

Researchers Discover Sneaky Phishing Attacks on Credentials, Sold on Dark Web

A new type of PDF phishing attack has emerged, with analysts claiming that the attack originated from Western Africa based on the IP addresses evaluated during previous investigations. The attack embeds phishing URLs to the attached PDF that redirect users to a phishing platform that steal user credentials. According to Silicon, dark web security specialists Flashpoint first discovered and investigated ... Read More »

port_scan_monitor_sc.gif

Examining Port Scan Attacks Via Data From Darknets

Port scanning is a preliminary approach that is most commonly used by hackers in order to determine vulnerable hosts that they can attack successfully. Scanning is a fully automated process that is utilized by hackers to detect machines, servers and peripherals that exist on a given network. A successful scan can yield details of machines discovered on the scanned network ... Read More »

Targeting Adversaries & Deanonymization Attacks Against Tor Users

  Tor is a P2P network for promoting traffic security of various forms of internet communications for millions of users worldwide. In most cases, Tor users are very unlikely to become the target of an adversary, as they are namely shielded via Tor against opportunistic local hackers, local censorship authorities and hostile destinations. Deanonymizing adversaries act through attempting to attack ... Read More »

Research Claims: The Dark Net Is Less Vulnerable To Hacking Attacks

The dark web is a part of the internet, which provides and maintains anonymity to its users. People can use this privacy to either illegal and legal ways. For example, in countries where freedom of speech is oppressed, or the media is censored, the citizens can use the Tor browser to connect to the dark web and anonymously browse the ... Read More »

double spend.PNG

Two New Models For Double Spending Attacks On Bitcoin’s Blockchain

Counterfeiting a digital signature on bitcoin’s blockchain is a significantly hard task to execute successfully in terms of processing power. Accordingly, it is almost impossible to change a bitcoin transaction that has been already been signed. Nevertheless, it is still possible to alter the state of a valid transaction via a technique known as “double spend attack” that requires enormous ... Read More »

hack phish.gif

Phishing Attacks on Bitcoin Wallets Surge as Bitcoin Price Skyrockets

During the past 24 hours, bitcoin price exceeded the $900 mark for the first time during the past 3 years. The reason behind this recent price surge is not completely clear, especially that the value of bitcoin has increased by more than 100% in less than 6 months. Whenever the price of bitcoin surges, cybercriminals’ interest in cryptocurrencies in general ... Read More »

34 Teenagers Arrested For DDoS Attacks, Europol Wants to Send a Message

34 teenagers, mainly under the age of 20, were arrested by the European Union’s law enforcement agency Europol on December 12 for deploying DDoS-for-hire attacks on various websites. Europol Head of European Cybercrime Center (EC3) Steve Wilson stated a strong case will be made against young adults attempting to pursue a criminal path with technologies. Wilson, who led the successful ... Read More »

Analysis: Record DDoS Attacks by Mirai – IoT Botnet

Number of Internet of Things (IoT) devices is growing exponentially over time. Internet connected cameras, thermostats, refrigerators and others were recently part of biggest Distributed Denial of Service Attack (DDoS) in the history. This article contains explanation of botnets, DDoS and analysis of recent record breaking DDoS attack by Mirai Botnet and brief analysis of the C++ source code! DDoS ... Read More »

Man In The Middle Attacks

In this article I’m going to explain theory, prevention, some practical attacks and forensics related to the Man in the Middle (MitM) attacks to help you understand the risk to your privacy. Those are attacks used to eavesdrop your communication by having access to at least one part of the communication protocol. Example, Alice sends a letter to Bob and ... Read More »

Researchers Reveal DDoS Attacks Rewards

A Cryptocurrency known as a DDoSCoin has been developed by two researchers. Report by  Cryptocoins News, indicate that the DDoSCoin will be rewarding users that participate in a DDoS attack (distributed denial of service). Which only function when a website that is TLS-enabled (Transport Layer Security) is targeted by a user’s computer. TLS is a Cryptologic protocol in-charge of secure ... Read More »

88% Of All Ransomware Attacks Target Hospitals

Since patient data is worth big money on dark net markets and hacking forums, hospitals have more to lose than other organizations regarding cyber attacks. According to a threat report by Solutionary’s Security Engineering Research Team in Q2 2016, 88% of all ransomware attacks were targeting hospitals. The security firm claims that 94% of the attacks in the healthcare system ... Read More »

DdoS Attacks Causing Panic for IT Pro’s

A new survey has IT pro’s scared to death, if it’s results are correct about the threat of DdoS extortions. IT security professionals are in an uproar over a DdoS-extortion attack sometime in the next year. A new report show that about 80 percent of them fear they’ll be targeted in such attacks within the next 12 months. Corero Network ... Read More »

Google is Preparing Chrome for future wave of quantum attacks

On the 7th, Wired reported that Google pushed a Chrome update to a very small number of users that included a new form of encryption alongside the current elliptic curve factorization. Even though only a small users are going to be able to test out this encryption, it points to a new wave of cybersecurity. Wired calls it “preparations to ... Read More »