Posts

Dark Web Enables Easier Access to WMDs

Image
Dark Web Enables Easier Access to WMDs The UN’s Head of Disarmament Affairs raises concerns over the dark web, specifically how it has made it easy for terrorists to access WMDs. The head of the UN’s Disarmament Affairs, Izumi Nakamitsu, has expressed concerns over the potential availability of weapons of mass destruction (WMDs) on the dark web. According to Nakamitsu, the deluge of weapons and technology that is available for purchase or hire on various dark web markets makes it a lot easier for terrorists and other non-state actors to get their hands on dangerous WMDs. A well-visited criminal hotspot, the dark web is known for its underground marketplaces where illegal goods—both digital and physical—are bought and sold using cryptocurrency. While the majority of dark web markets, sites and forums generally have low entry barriers, a few require a more exclusive, invite-only membership to gain access to. Nakamitsu’s chief concern is the threat terrorists c...

Are You Being Tracked? Use these Codes to Find Out!

Image
Are You Being Tracked? Use these Codes to Find Out! Here’s how to detect if your phone conversations and messages are being tracked, and how to remove the privacy threats immediately. There are times when you may just have a gut feeling you’re being tracked, in the sense that someone is listening to your phone conversations or that the private messages you send and receive on your phone are being read by someone they aren’t intended to reach. This situation is real and can happen to anyone. The purpose of such tracking can be as innocent as a parent wanting to keep tabs on his/her child’s activities or as suspicious as a spouse keen to know what his/her partner is up to. There are many other reasons why smartphone tracking can take place. But mere gut feeling cannot confirm whether or not you’re being tracked, nor will it do anything to stop the process. Instead, you will need to understand how technology permits such tracking and how you can protect your ...

Tor Project Joined HackerOne to Launch Bug Bounty Program

Image
Tor Project Joined HackerOne to Launch Bug Bounty Program The Tor Project announces a bug bounty program with HackerOne, which has run similar programs to handsomely reward users who identify bugs in software. Within the world of technology, those who create new programs and software solutions put their products through rigorous tests before releasing them to the public. But times have changed. Now, technology companies have improved their capabilities to such an extent that they challenge users to detect bugs in their programs and they pay them for it. And there are many instances of companies doling out millions of dollars under such schemes, which are popularly called “bug bounty programs.” The latest to join this trend is the Tor Project, which has roped in HackerOne as its partner in this endeavor. Together, they’re prepared to reward the users of Tor (The Onion Router), if they can find out deficiencies in the browser. A Little About Tor & Hacke...

Bupa Employee Found Selling Medical Records on the Dark Web

Image
Bupa Employee Found Selling Medical Records on the Dark Web An employee at international health insurer Bupa stole thousands of customers’ data and posted it for sale on the dark web. Current advancements to the internet and all of its capacities bring about a sense of urgency when it comes to safeguarding online security, especially in situations where crucial information can be stolen and exploited. A testament to this lesson is evident in the repercussions of a recent data breach in the international health insurance company, Bupa. A Bupa employee managed to copy and steal data regarding more than 108,000 customers, then exposing a majority of that information on the dark web. The breach was spotted by DataBreaches.net after some of the stolen data were found posted on the site of a vendor going by the name of MoZeal. The dark web listing included a number of customers’ insurance details, such as registration IDs, contact information, names and even b...

Fake Tor Browser Used to Target Dark Web Users

Image
Fake Tor Browser Used to Target Dark Web Users A fake Tor browser is circulating the dark web, luring visitors into placing orders on a supposed darknet marketplace only to have their money stolen. In what can only be termed as a scam to dupe those already involved in clandestine transactions, a fake browser disguised as Tor is leading unsuspecting dark web users into buying goods on a darknet marketplace called “Rodeo.” There is fear that none of the ordered contents will ever reach the buyers. Experts at the technical support site  Bleeping Computer  first uncovered the fraud scheme, and are actively investigating the situation. It is common knowledge that Tor is the default program used by dark net dwellers. This includes users who deal in all things illegal—from drugs to guns to stolen goods to even fake currencies. Dealers and buyers would access their respective .onion sites and enter into these transactions, making payments in Bitcoin or other cryptoc...

EU Report: Cryptocurrency Use Rare Among Organized Crime Groups

Image
EU Report: Cryptocurrency Use Rare Among Organized Crime Groups A new report released by the European Union reveals that the use of digital currencies is beyond typical criminal operations. Organized crime has always thrived on illegitimately obtained wealth for illegal activities across the boundaries of nations. This has been the norm since time immemorial. In today’s technologically advanced world, virtual money has replaced physical cash for almost all exchanges and transactions. And accordingly, it has been rumored darkly by observers that cryptocurrency was being stolen by organized criminals and used for all their illegal activities. However, a recent report published by the European Union shows that organized crime groups have been stumbling in cryptocurrency stolen from the internet. This sounds like an intriguing new development for law enforcement in the region. The report states that members of the organized crime group have been inclined to use ...

How to Buy Bitcoin with Cash [11 easy steps]

Image
How to Buy Bitcoin with Cash [11 easy steps] When it comes to both media and academia, one would think that publishing a paper in a sea of overflowing papers cannot make a difference, right? However, the paper entitled Bitcoin: A Peer-to-Peer Electronic Cash System , supposedly published by a Japanese person named Satoshi Nakamoto in 2008, did change the course of history. What exactly are Bitcoins? How do users buy them with cash and, moreover, stay safe in doing so? These are topics that will be delved into within the following posts. All that glitters isn’t gold: The Bitcoin Coins A few months after the paper was published, in January 2009, Bitcoin became defined as a cryptocurrency, a digital payment system. Bitcoin is basically electronic impulses complexly coded to have monetary value. As such, Bitcoin overturned the traditional federal banking system, evaded law enforcements and became a highly desired currency for general public. As they are d...