Home » Tag Archives: security

Tag Archives: security

SETTING UP A BULLET-PROOF SECURITY SMARTPHONE

When you have to deal with smartphones, every speech about privacy seems pointless, since the forces which attempt to do your anonymity seem too strong to be defeated. To improve your privacy, there are things you can do in the same way as on laptops and smartphones, but I will firstly cover the most important differences between the two systems. ... Read More »

Fundamental security flaws in USB

USB or Universal Serial Bus was not designed with security in mind. Windows, Linux and OS X basically trust anything plugged in USB port. If a hacker has a very short, but private session with your laptop, this attack vector becomes very feasible. Before actual security threats, let’s analyze how USB works in general. Every USB device has a controller ... Read More »

Utilizing the Blockchain Technology To Maximize the Security of Certificate Authorities

Throughout the past few years, many studies have experimented implementation of the blockchain technology in various aspects on internet security. A recently published study analyzed the influence of the blockchain technology on the development of services offered by various cybersecurity companies across a myriad of industries and sectors with emphasis on certificate authorities and the context of critical infrastructure. Furthermore, ... Read More »

Homeland Security May Study Bitcoin’s Link to Terrorism

In a situation similar to one DeepDotWeb has routinely covered, a US congresswoman proposed a bill that added Bitcoin threat assessment to the Department of Homeland Security’s list of duties. Like Europol and Interpol, congresswoman Kathleen Rice requested that the DHS “investigate whether terrorists use virtual currencies, or receive funding with them.” Rice, a ranking Democrat in the House Counterterrorism ... Read More »

Barclays to Renovate Security, Hopes to Cut Fraud by 75%

Barclays called financial fraud a “national resilience issue” in a recent anti-fraud announcement wherein they spoke of the prevalence of the so-called “invisible” crime. The bank revealed plans for a $12 million advertising campaign as a step towards fraud prevention. Younger account holders between the ages of 25 and 34 were at twice the risk for financial fraud than “older ... Read More »

CiantiMF – An Android OS Security Framework For Protection Against Tor Botnet Malware

The number of individuals using online payment systems via mobile devices is increasing steadily, which attracts hackers who utilize sophisticated pieces of malware to increase the impact of their malicious attacks. By far, the android OS is the most popular mobile device OS in the whole world. Accordingly, security of android devices is increasingly becoming a hot topic. The Security ... Read More »

Investment on Security Firms Rise as Dark Web and Bitcoin Ransomware Cases Increase

Early-stage and state-led investments on cybersecurity firms are increasing exponentially. According to reports from the Big Four accounting firms which include EY, PwC, Deloitte and KPMG, the surge in cybersecurity investments is a direct result of rising cases of ransomware attacks, phishing scams and data thefts. Ransomware attacks and phishing scams are correlated in a sense that they both are ... Read More »

Romanian Police Join Forces With Domestic Internet Security Company To Fight Cybercrime

The Romanian police collaborate with internet security company BitDefender to fight cybercrime on a global scale. According to a press release published by the General Inspectorate of the Romanian Police (IGPR – Romania’s police force), they are joining forces with domestic internet security company BitDefender to fight cybercrime globally. Bitdefender is an internet security software company based in Romania, represented ... Read More »

C:\Users\dzsuvax\Desktop\twerk\deepdotweb\img\10.jpg

Hacker Who Tried To Frame Security Researcher in 2013 – Sentenced To Prison

A 31-year-old hacker from Ukraine, was sentenced to 41 months in prison for serious crimes, including ordering heroin from a narcotics vendor on the Silk Road Marketplace to security researcher Brian Krebs’ home. The cybercriminal is known by various names (both in the “real world” and on the dark net), including Sergey Vovnenko, Sergey Vovnencko, Tomas Rimkis, Flycracker, Flyck, Fly, ... Read More »

Security Researchers Found a “One-Stop-Shop” for Hacking Tools on Command and Control Server

Security researchers from Kaspersky Lab’s Secure List described the accidental discovery of a “one-stop-shop” for hacking tools. The Kaspersky Lab team intercepted traffic from machines infected with the Hawkeye RAT and “stumbled upon an interesting domain.” They found a command and control server that saved the keylog data provided by the HawEye RAT. The server additionally sold hacking software, tools, ... Read More »

PGP.jpg

Maximizing Security of Cloud Storage Providers Using PGP and Bitcoin’s Blockchain Technology

Despite the fact that cloud computing is currently adopted on a wide scale, the security and maintenance of privacy of accounts in various cloud computing environments are still questionable. Securing data in a cloud setting utilizes the same methods employed to secure data on a conventional data centre. Many methods are now used to secure cloud storage accounts including identity ... Read More »

internet of things.jpg

How Can The Blockchain Technology Take The Security of IoT (Internet of Things) To A Whole New Level?

Since Bitcoin’s first block;”genesis block”, was first mined, the blockchain technology has been undervalued. However, indicators derived from the current market status denote that the future of this innovative technology is quite promising. There are tens of financial uses of the blockchain, yet the most appealing non-financial use of this technology is its application to maximize the security of the ... Read More »

Feds Give Security Researchers Two Years to Hack Almost Anything

The U.S. Copyright Office recently removed restrictions that hindered IoT security researchers. Digital Millennium Copyright Act (DMCA) restrictions prevented researchers from reverse engineering copyrighted software. The same was true for cars, voting machines, “IoT” devices, and similar devices. Government opinions on the topic were scattered across the playing field. But the Army recently allowed hackers to hack the Pentagon and ... Read More »

Komodoheader.png

The Komodo Platform: Security and Privacy

The Komodo Platform is a cryptocurrency project that uses zero knowledge proofs to provide true anonymity for its users, allowing them to choose between transparent and private transactions according to the circumstances. The Komodo blockchain is protected by the delayed Proof of Work mechanism, a consensus protocol built by the SuperNET team. It allows Komodo to notarize its blocks on ... Read More »