Home » Tag Archives: security

Tag Archives: security

Security Firms are Struggling to Crack New iPhones

In early 2016, the FBI struggled against Apple in court; the FBI claimed they were unable to access the files on the San Bernardino shooter’s iPhone and that Apple needed a backdoor to the phone. Apple could not technically access the encrypted contents through any hard-coded backdoor, but they could create a custom update for the phone that would remove ... Read More »

TradeRoute Went Down Following a Major Security Leak

Weeks before the darknet market DDoS attacks began, TradeRoute Market arranged weekly payments with an infamous darknet marketplace phisher known as “Phishkingz.” In a conversation with DeepDotWeb about two days before Traderoute went down, Phishkingz revealed that he had found a way to access code from the marketplace’s admin backend. Shortly after Phishkingz revealed his findings, TradeRoute exit scammed. The ... Read More »

Advanced ATM Skimming Tools Circulate Dark Web, Severe Security Issues

Advanced ATM skimming tools are circulating the dark web and banks are struggling to implement necessary security measures to prevent loss of funds and theft of debit card information. Over the past decade, ATM skimming has remained a popular method of data theft internationally. In most cases, hackers replace ATM card scanners with their customized hardware that has identical physical ... Read More »

New UK Code Seeks Tighter Security on Ships against Cyber Attacks

A new code of practice has been launched by the UK government aimed at helping ship owners improve and tighten security. This decision came as a result of the growing threat that cybercrime poses as it continues to spread and this time around to a much more bewildering place, the shipping sector. The term ‘cybercrime’ to most people, just gives ... Read More »

TradeRoute Market Issues Security Fix After $100k Theft

On August 8, a user created a thread on the TradeRoute marketplace forums. The user requested that the TradeRoute administration examine a “strange” listing. The listing was for a “small house for children.” It was strange for several reasons. The first was the number of vendor accounts that someone had created in order to do something “sketchy.” One user noticed ... Read More »

Fake Press Cards Sold On The Dark Web Force Danish Police To Increase Security In Parliament

Counterfeit press cards sold on the dark web present a threat to the Danish police. Law enforcement in the country take the fake press cards, which are advertised for nearly $160, seriously. The Danish Parliament emphasized that the journalists’ bags and jackets should be screened no matter if they own a press card. According to the Danish media outlet Journalisten, ... Read More »

Interpol Teams up with cyber security firm to combat cyber threats

The International Police Organization more commonly known as Interpol announced on August 7th that it had signed an agreement with cyber security company Palo Alto Networks for data exchange as they look to boost ways to combat online crime. Palo Alto Networks happens to be the first cyber security company to sign a Data Exchange Agreement (DEA) with INTERPOL according ... Read More »

Comparing the Security of Bitcoin to That of Common Online Payment Systems

Today’s technology offers us numerous online payment systems which enable us to easily execute financial transactions from almost any spot on the globe, in real time, using any device with internet access. Nevertheless, on the world wide web, there are multiple threat agents, malicious activities, and vulnerabilities, as well as the existence of security exploits; all of which are revealed ... Read More »

SETTING UP A BULLET-PROOF SECURITY SMARTPHONE

When you have to deal with smartphones, every speech about privacy seems pointless, since the forces which attempt to do your anonymity seem too strong to be defeated. To improve your privacy, there are things you can do in the same way as on laptops and smartphones, but I will firstly cover the most important differences between the two systems. ... Read More »

Fundamental security flaws in USB

USB or Universal Serial Bus was not designed with security in mind. Windows, Linux and OS X basically trust anything plugged in USB port. If a hacker has a very short, but private session with your laptop, this attack vector becomes very feasible. Before actual security threats, let’s analyze how USB works in general. Every USB device has a controller ... Read More »

Utilizing the Blockchain Technology To Maximize the Security of Certificate Authorities

Throughout the past few years, many studies have experimented implementation of the blockchain technology in various aspects on internet security. A recently published study analyzed the influence of the blockchain technology on the development of services offered by various cybersecurity companies across a myriad of industries and sectors with emphasis on certificate authorities and the context of critical infrastructure. Furthermore, ... Read More »

Homeland Security May Study Bitcoin’s Link to Terrorism

In a situation similar to one DeepDotWeb has routinely covered, a US congresswoman proposed a bill that added Bitcoin threat assessment to the Department of Homeland Security’s list of duties. Like Europol and Interpol, congresswoman Kathleen Rice requested that the DHS “investigate whether terrorists use virtual currencies, or receive funding with them.” Rice, a ranking Democrat in the House Counterterrorism ... Read More »

Barclays to Renovate Security, Hopes to Cut Fraud by 75%

Barclays called financial fraud a “national resilience issue” in a recent anti-fraud announcement wherein they spoke of the prevalence of the so-called “invisible” crime. The bank revealed plans for a $12 million advertising campaign as a step towards fraud prevention. Younger account holders between the ages of 25 and 34 were at twice the risk for financial fraud than “older ... Read More »

CiantiMF – An Android OS Security Framework For Protection Against Tor Botnet Malware

The number of individuals using online payment systems via mobile devices is increasing steadily, which attracts hackers who utilize sophisticated pieces of malware to increase the impact of their malicious attacks. By far, the android OS is the most popular mobile device OS in the whole world. Accordingly, security of android devices is increasingly becoming a hot topic. The Security ... Read More »