Posts

Showing posts from May, 2017

THE MOST ADDICTIVE BITCOIN GAME TO EARN FREE SATHOSHI

Black Hat Briefings

Image
European Dark Web Drug Ring Busted By Authorities Some of the bags of ecstasy tablets seized in the raid. According to a report that appeared in Yle Uutiset, a Finnish publication, police has busted and closed down a multi-million dollar European dark web drug racket  in Finland. Officials said that three Finns who had exceptionally good IT skills were running a smuggling operation valued at 2 million euros or $2.26 million. The three Finns have been detained by the officials, and they believe the culprits are part of a dark web marketplace that is operating in the country. The three Finns were instrumental in bringing in as much as 30,000 LSD tablets, 40,000 ecstasy tablets and as much as 40 kilograms of several other drugs, including heroin, methamphetamines, and cocaine into Finland. It is alleged that they have been carrying out the drug smuggling operation for two years now after starting their activities on the now defunct dark web marketplace Silk Roa...

Black Hat Briefings

Image
14 Interesting Facts About Bitcoin The word “Facts” written in white tiles against a dark vintage grunge background. With the rise of this form of cryptocurrency, one ought to know the underlying facts about bitcoin. Below is a comprehensive list of such material. 1. It is the leading form of cryptocurrency in the world. With more users than any other digital currency, bitcoin is the most common form of cryptocurrency in the world. It is also accepted by a multitude of platforms in many different countries. Despite this, some governments consider it illegal because they cannot protect coin holders in the event of the disappearance of bitcoins. This can also be attributed to the reason that all governments want to have control over monetary platforms in their respective countries. 2. The founder’s identity hasn’t been completely confirmed. Someone named Satoshi Nakamoto is supposedly the founder of bitcoin. However, there is speculation about the true ident...

Black Hat Briefings

Black Hat Briefings

Image
b Dems Unveils Plan to Legalize Cannabis if Elected The Liberal Democratic Party reveals plans to legitimize the production and sale of cannabis if they win the election. The Liberal Democrats’ plan to fully legalize cannabis if elected is nothing if not unprecedented. According to the political party, the pledged cannabis legislation will be directed towards creating a legal market for what is currently considered a Class B drug with a five-year prison sentence for possession and a 14-year prison sentence for supplying. As expected, the opposition views the Lib Dems’ proposals as a drowning man’s attempt to grasp at straws—in light of their evidently weakened position after losing 28 seats in recent local elections. Tory candidate Julian Knight spoke to The Telegraph on the matter , expressing uneasiness over what he sees as a desperate attempt by the Lib Dems to grab a vote or two after their stance over Brexit proved to be a total vote-loser. Knight is of the ...

Black Hat Briefings

Image
VPN – The Must Have Anonymity Tool What is a VPN? In countries where anonymity toolsgovernments are blocking access to certain websites, people use a VPN to get around these walls of censorship. Virtual Private Network, or VPN for short, is a secure network connection through which you can safely connect your device to public networks. It is widely used by large corporations, educational institutions and government agencies. It is also used by individuals who care about staying anonymous on the internet for various reasons. In countries where governments are blocking access to certain websites, people use a VPN to get around these walls of censorship. Another reason people use VPN’s is to gain access to web content restricted to certain countries; this is particularly the case with some YouTube channels, like Vevo and similar. In countries where downloading torrents is heavily monitored, like the USA for example, people use VPN to hide their internet activi...

Black Hat Briefings

Image
10 Deep Web Research Tools You Can’t Live Without This is by no means a complete list of deep web search tools, but it’s a great start for anyone who has been stuck using just plain old Google. Searching the internet can be tougher than you might think sometimes, especially if the only tools you have at hand are Google and Bing. You will find yourself coming up with the same search results over and over. Depending on your topic, these two just may not do it. Do you know where to look when your search is about a specific person? Where would you search to find information about legal matters or a specific law? Is the answer to your question buried in a hidden blog post in some obscure blog? Researching information this way requires a certain amount of tenacity, as well as a certain set of tools. The tenacity you will have to find on your own but I can help you with the tools. This is by no means a complete list of internet archives, but the following roundup of res...

Black Hat Briefings

Image
Teen Arrested for Making Anonymous Bomb Threats An Israeli teenager is under arrest on suspicion that he used various anonymity tools to make hoax bomb threats to Jewish institutions. A 19-year-old Israeli-American is in police custody on suspicion of being behind multiple bomb threats to various Jewish organizations and an airline. The teenager, who was recently revealed to be Michael Kaydar, is a resident of Ashkelon, Israel. His detainment was authorized by the FBI under suspicions that he may be behind the wave of anti-Semitic threats against various Jewish community centers in the United States, Australia, and New Zealand. During the months-long buildup to his arrest, a special cybercrime unit of the Israeli Police Force was deployed to track down the teenager despite his use of Bitcoin, SpoofCard, and Google Voice to retain his anonymity. Suspect Used Bitcoin, Google Voice, to Facilitate Anonymity The FBI’s initial attempt to trace his number resulted i...

Black Hat Briefings

Image
New App Threatens Online Users’ Privacy A new app developed by computer scientists from the Worcester Polytechnic Institute threatens online anonymity by monitoring computer web usage. A threat to the anonymity of whistleblowers, dissidents and other privacy-reliant web users has surfaced in the form of a new app. Created by computer scientists from the U.S.-based Worcester Polytechnic Institute , the application renders all forms of network encryption useless by using computer hardware readings to detect the websites visited by users’ browsers. According to a publication  that outlines the specifics of the new development, this app can be a threat to the online anonymity of everyone—regardless of how well-encrypted their network is. It does so by monitoring computer hardware usage, particularly within the device’s processor, then using this information to speculate with alarming accuracy the sites visited on that computer. The potential comprise of online...

Black Hat Briefings

Image
Litecoin In A Nutshell That same month of November, Litecoin reached an impressive one-billion-dollar market capacity. For the uninitiated, Litecoin is a cryptocurrency. If you’re thinking why Litecoin sounds familiar to Bitcoin, it’s not just a coincidence. Litecoin is the little brother of Bitcoin. I explained this in another article on Dark Web News about the future of Bitcoin. But, to avoid any confusion, Bitcoin and Litecoin were not made by the same people. Bitcoin was created by Satoshi Nakamoto ; nobody really knows who he really is and people even think that his name is fake. The creator of Litecoin was made by a former Google engineer named Charles Lee . He has a Twitter account and posts updates and prices of Litecoin. The original reason why Lee created Litecoin is because he was inspired by Bitcoin. Bitcoin and Litecoin are both open source, so no one can have the authority to control it. Another main reason it was created is because transactions ...

Black Hat Briefings

Image
Hong Kong Denied Asylum to Families Who Helped Snowden The families that helped hide Edward Snowden following the infamous NSA surveillance data leak in 2013 have been denied asylum by the Hong Kong government. Four years have passed since Edward Snowden orchestrated one of the largest data breaches in recent history, but cases related to the 2013 U.S. National Security Agency (NSA) breach are still developing. Seven refugees who helped hide Edward Snowden have recently been denied asylum by Hong Kong. Ajith Pushpakumara, Supun Thilina Kellapatha, Nadeeka Dilrukshi Nonis and a family of four from Sri Lanka had their applications rejected by the government. Vanessa Mae Rodel from the Philippines also faces deportation alongside the Sri Lankans. The refugees hid Edward Snowden for two weeks when he fled the U.S. having leaked thousands of documents exposing the NSA’s global surveillance program. Their Canadian lawyer, Robert Tibbo, told CNN the government’s...

Black Hat Briefings

Image
Playpen Admin Sentenced to 30 Years in Jail The creator and admin of Playpen, a child pornography site on the dark web, is sentenced to 30 years in prison after the FBI arrested him two years ago. The FBI stated in a press release that a man from Florida who was running Playpen, the biggest child porn site on the dark web, has been sentenced to prison for 30 years. The creator and the admin of Playpen was arrested in February of 2015. His home in Naples, Florida, contained thousands of pictures that depicted sexually abused children. He was found guilty of involvement in a child exploitation business and for possessing, advertising and transporting child porn on the dark web. Darknet Child Pornography Site The other two co-defendants in the case pleaded guilty and they received a sentence of 20 years earlier this year for being involved in Playpen. According to David Browning, one of the defendants, Playpen contained 215,000 user accounts and had distribu...

Black Hat Brifings

Image
Global Ransomware Cyber Attack Hits More Than 100 Countries The largest cyber attack in recent history was carried out in May, involving the WannaCry ransomware. Total impact counts thousands of parties in 150 countries. In recent years, the cyber world witnessed an increase in the number and sophistication of cyber attacks. However, all these attacks pale in comparison to the ongoing ransomware campaign by malware called WannaCry that has taken the entire world by surprise. This cyber attack is being observed worldwide since May 12, and is unprecedented in scale. Europol reported 150 countries had been affected just two days after the ransomware was first observed. Currently, over 200,000 parties worldwide using Microsoft Windows operating systems have been directly impacted by the WannaCry ransomware. The discovery of an effective kill switch by an internet security researcher slowed the virus significantly, but it seems that the ransomware attack may be an e...

Black Hat Briefings

Image
Dark Web Device Increases Car Hacking Cases A new hacking device is being sold on the dark web that allows anyone to unlock and steal parked cars. The term “hacking” carries a different connotation among different groups of people. Most think of a hacker as someone who has unauthorized access to electronics, steals files, breaks into military systems or dispatches rockets solely for purposes of their own entertainment. But nowadays, the perception of hacking is shifting away from the image of college student breaking into banks and government systems. Hacking can now be done by anybody, even a kid on their computer nearby. With a conventional portable workstation, anybody can download basic programming of the internet to see everything that goes into and out of a PC on a similar system. But the populations that do this don’t always have the best goals. The practice of hacking is increasingly broadening its scope, most recently extending to hacking automobiles....

Black Hat Briefings

Image
Millions of Stolen Edmodo User Details for Sale on the Dark Web More than 77 million stolen Edmodo accounts have been listed for sale on the dark web for just over $1,000. The world’s most popular education platform, an organization with an estimated 78 million members consisting of teachers and students from all over the world, suffered a massive data breach after being hacked by an unknown cyber-assailant. Shortly after the breach, a large cache of stolen data was listed for sale on dark web marketplace Hansa Market, by a vendor under the alias “nclay.” Motherboard was the first to catch word of the data breach , and the first to verify a sample from the data dump listed for sale on dark web. Premier K-12 Social Learning Network Globally Edmodo is a world renowned K-12 teaching resource company created to provide coaching tools for teachers and students globally. The website is frequented by professionals and learners looking to share educational content, such a...