Please turn on your JavaScript for this page to function normally.
storm
Attacks within the Dark Web

For six months, Trend Micro researchers operated a honeypot setup simulating several underground services on the Dark Web. The goal of their research was to see if those …

unmask mask digital persona
Uncloaking Tor Browser users with DRM-protected files

Digital Rights Management (DRM)-protected media files can be used to reveal Tor Browser users’ actual IP address and therefore possibly reveal their identity, …

Tor Project
Actively exploited Firefox, Tor Browser 0-day patched, update now!

Mozilla and the Tor Project have released security updates that fix the Firefox 0-day flaw that was spotted being exploited to de-anonymize Tor Browser users. It is still …

mask
Firefox 0-day exploited in the wild to unmask Tor users

An anonymous user of the SIGAINT darknet email service has revealed the existence of a JavaScript exploit that is apparently being actively used to de-anonymize Tor Browser …

Abstract
Dutch police takes over darknet market, posts warning

As law enforcement agencies around the world continue taking down online markets on the Dark Web, the Dutch National Police and the nation’s Public Prosecution Service …

mask
DefecTor: DNS-enhanced correlation attacks against Tor users

A group of researchers from Princeton University, Karlstad University and KTH Royal Institute of Technology have devised two new correlation attacks that can be leveraged to …

tor
Researchers discover 110 snooping Tor nodes

In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services …

Riffle: A new anonymity system to rival Tor

A group of researchers from MIT and the Swiss Federal Institute of Technology in Lausanne have come up with a new anonymity system that is both bandwidth and computation …

hands
Tor Project gets whole new board of directors

Tor Project’s entire board of directors has stepped down and announced their successors. Among them are the noted “security guru” Bruce Schneier and Cindy …

Apple
New Mac OS X backdoor disguised as document converter app

Bitdefender researchers have discovered and analyzed a new, highly dangerous piece of malware targeting Mac systems and users. The malware, dubbed “Eleanor,” opens …

USA flag
FBI doesn’t need a warrant to hack a suspect’s computer, US judge rules

A senior US district judge has decided that the warrant authorizing the search of a suspect’s home computer by the FBI was issued based of probable cause, but even if it …

anonymous
Tor Project tests new tool for foiling deanonymization attacks

Upcoming hardened releases of the Tor Browser will use a new technique aimed at preventing deanonymization efforts by anyone who might want to mount them. Created by a group …

Don't miss

Cybersecurity news