The Russians Are Coming! Or Are They?

The United States recently accused the Russian government of trying to influence US elections last November, and has expelled 35 Russian diplomatic officials and closed two Russian diplomatic facilities, one in New York City, and the other in Maryland, near Washington DC.

The Russians are denying any direct involvement, of course, and are laying the blame on Russian cyber-criminal groups.    But we have discussed ...

Continue Reading →
0

What is The Dark Web?

dark-web-1When I am doing a cybersecurity presentation, someone is bound to ask about the Dark Web.  What is it, exactly, and how does someone get there?  The how part we discussed on Friday.  Linux Tails is a great tool for accessing and browsing the Dark Web, should you be so inclined.  Before we delve into the Dark Web, let’s talk about the different parts of the web.

  • The Clear Web – This ...
Continue Reading →
0

Use Linux Tails for Privacy

Linux-TailsYou don’t need to be a journalist, freedom fighter, or living under an oppressive political regime to have the desire for some online privacy.  Maybe you are trying to put the contents of your life back into the Pandora’s box you opened when you signed up on Facebook.  Maybe you would like a little privacy in your online life.

Linux Tails is an ...

Continue Reading →
0

Now The FBI Can Legally Hack Your Computer

image_thumbA recent rule by the Supreme Court has given the FBI authority to hack your computer if it is inadvertently part of a criminal botnet.  Recent changes to a procedural rule known as Rule 41 allows the FBI to obtain a search warrant to use “network investigative techniques” or NIT (or more commonly called hacking) to search computers engaged in criminal activity anywhere in the world.  This includes innocent computer users ...

Continue Reading →
0

If Only We Could Block Traffic From the Dark Web…

penetration_testTry to imagine how much bad stuff we could keep off our computers and networks if we could figure out a way to filter incoming traffic from the Dark Web.  Well maybe we can.

First, my apology in advance to my non-technical followers, this article may be a bit high level for the average user.

A post in Spiceworks from “Born2Frag”  goes ...

Continue Reading →
0

New Tor Messenger App Offers Encrypted Communications

TORlogoThe Tor Project released the beta of their new Messenger app.  This messenging client is based on Mozilla’s Instantbird, and works with several popular messaging platforms, including Facebook Chat, Twitter, Google Talk, and Jabber.

The encryption piece is handled using Tor’s OTR Protocol (for Off-The Record), and requires that users exchange a secret key.  This is available in Windows, Linus, and OSX versions from the Tor website.

For more information:

Continue Reading →
0

Dark Web Becomes Twilight Web

dark-webThe Dark Web is that part of the Internet where cyber-criminals run message boards and sell everything from malware exploit kits, rainbow tables of cracked passwords, and botnets for rent, to child pornography, pharmaceuticals, illegal drugs, and weapons.  Time was it was a hard place to find, many sites available by invitation only and reached via the TOR network.

Recently, international law enforcement ...

Continue Reading →
0

Tor Story 2

This is the second of a three-part series of articles about TOR.  On Monday we took a look at the surprising origins of the TOR network.  Today we will be taking a look at how TOR works.

HOW TOR WORKS

To use TOR, a person just needs to go to The TOR Project , and download an install the TOR web browser. Then it makes sense to read the TOR warning document. The rules include:

  • Use the TOR browser
  • Don’t torrent ...
Continue Reading →
0
Page 1 of 2 12