The Agora Dark Web market cited Tor Hidden Services security vulnerabilities that could allow de-anonymization attacks and temporarily shut down operations after discovering suspicious activity on its servers.
Stories by Darlene Storm
MIT researchers created the first file system that is 'mathematically guaranteed' not to lose data even when a computer crashes.
At the Chaos Computer Club's Chaos Communication Camp, one brave soul explained how to jump paywalls, obtain academic research and freely share that research without being arrested.
126 types of cars have been hackable for years and can be stolen thanks to a keyless security flaw; Volkswagen spent two years suing the researchers and trying to keep the vulnerabilities a secret.
After the Office of Personnel Management breach, medical data was labeled as the "<a href="http://www.reuters.com/article/2015/06/05/cybersecurity-usa-targets-idUSL3N0YR30R20150605">holy grail</a>" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card number," reported Reuters. And now to steal such information, hospital networks are getting pwned by malware-infected medical devices.
You wouldn't likely know if you are under cell phone surveillance, but you would if you were about to make a call and your phone displayed an unencrypted connection warning that states, "Caution: The mobile network's standard encryption has been turned off, possibly by a rogue base station (IMSI Catcher'). Unencrypted calls not recommended."
If you are good at research by using Google searches, does that make you a malicious cyber actor? Of course not, but DHS, FBI and NCTC (National Counterterrorism Center) have issued a bulletin warning about malicious "Google dorking" cyber actors. If using <a href="https://sites.google.com/site/gwebsearcheducation/advanced-operators">advanced search techniques</a> on Google or Bing is considered suspicious, what does that make <a href="http://www.shodanhq.com/">Shodan</a> users who specifically target SCADA, ICS, VoIP, routers, switches, webcams and printers to name but a few?
- Junior-Mid level .Net/Front-End Developer NSW
- Enterprise Architect VIC
- Office Administration - Telco VIC
- Learning Design Specialist / Technical Writer NSW
- Iteration Lead - Telco - Melbourne CBD VIC
- Data Architect - CRM VIC
- Office 365 Exchange Engineer NSW
- Wintel Engineer - Brisbane VIC
- Senior Developer - C#, .NET VIC
- Front End Developer NSW