ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Meet 'Tox': Ransomware for the Rest of Us | ICT | CyberSecurity | eSkills

Meet 'Tox': Ransomware for the Rest of Us | ICT | CyberSecurity | eSkills | ICT Security-Sécurité PC et Internet | Scoop.it
Similar to other threats, ransomware has now appeared in an easy-to-deploy cybercrime kit. The malware is called Tox, and it's free.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Similar to other threats, ransomware has now appeared in an easy-to-deploy cybercrime kit. The malware is called Tox, and it's free.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Onion.city - a search engine bringing the Dark Web into the light

Onion.city - a search engine bringing the Dark Web into the light | ICT Security-Sécurité PC et Internet | Scoop.it
Last week, user Virgil Griffith went onto the Tor-talk mailing list and announced Onion City, a Dark Web search engine that allows regular web users to delve into the Dark Web.


The search engine delves into the anonymous Tor network, finds .onion sites and makes them available to regular users on the ordinary World Wide Web.


Up to now the best way to search for .onion sites has been to get on the Tor network using something like the Tor browser, but Onion City effectively does that bit for you so you can search from the comfort of your favourite, insecure web browser.


Gust MEES's insight:
Last week, user Virgil Griffith went onto the Tor-talk mailing list and announced Onion City, a Dark Web search engine that allows regular web users to delve into the Dark Web.


The search engine delves into the anonymous Tor network, finds .onion sites and makes them available to regular users on the ordinary World Wide Web.


Up to now the best way to search for .onion sites has been to get on the Tor network using something like the Tor browser, but Onion City effectively does that bit for you so you can search from the comfort of your favourite, insecure web browser.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks | ICT Security-Sécurité PC et Internet | Scoop.it
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers Who Shut Down PSN and Xbox Live Now Attacking Tor | CyberSecurity | CyberAttacks

Hackers Who Shut Down PSN and Xbox Live Now Attacking Tor | CyberSecurity | CyberAttacks | ICT Security-Sécurité PC et Internet | Scoop.it
The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.

So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:

The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.

So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR





No comment yet.
Scooped by Gust MEES
Scoop.it!

Law Enforcement Agencies in Tor: Impact Over the Dark Web

Law Enforcement Agencies in Tor: Impact Over the Dark Web | ICT Security-Sécurité PC et Internet | Scoop.it
The recent shutdown of SilkRoad 2.0 was just a small part of the events affecting the Tor network that unfolded last week.


Cybercrime, just like any other illegal activity, is hard to eradicate completely. Whenever illegal services are taken down, the gap created will always be filled by other criminals willing to profit from the opportunity. The reality we have to accept is that there will always be demand for such services.



Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:
The recent shutdown of SilkRoad 2.0 was just a small part of the events affecting the Tor network that unfolded last week.


Cybercrime, just like any other illegal activity, is hard to eradicate completely. Whenever illegal services are taken down, the gap created will always be filled by other criminals willing to profit from the opportunity. The reality we have to accept is that there will always be demand for such services.



Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

OnionDuke: APT Attacks Via the Tor Network | Cyber Security

OnionDuke: APT Attacks Via the Tor Network | Cyber Security | ICT Security-Sécurité PC et Internet | Scoop.it

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

How Did The FBI Break Tor?

How Did The FBI Break Tor? | ICT Security-Sécurité PC et Internet | Scoop.it
If you control enough of the Tor network, it’s possible to get a kind of bird’s eye view of the traffic being routed through it. It was clear that Tor thought the Carnegie Mellon researchers were responsible. The researchers refused to talk to the press, but a conference spokesperson told Reuters the talk was canceled because the researchers hadn’t cleared the release of their work through their department, the Software Engineering Institute, which is funded by the Defense Department.


At the time, many assumed that the university pulled the plug on the talk because of the gray legal zone it was in, with the researchers casually intercepting Web traffic. But maybe it got pulled because the researchers were revealing a law enforcement technique that the government did not want publicized. If nothing else, it’s highly likely the information the researchers collected about “drug dealers and child pornographers” made its way into law enforcement hands. McCord said he was “unable to comment on the matter.” Carnegie Mellon’s SEI declined comment about the canceled talk and about whether it had provided information from the research to law enforcement.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
If you control enough of the Tor network, it’s possible to get a kind of bird’s eye view of the traffic being routed through it. It was clear that Tor thought the Carnegie Mellon researchers were responsible. The researchers refused to talk to the press, but a conference spokesperson told Reuters the talk was canceled because the researchers hadn’t cleared the release of their work through their department, the Software Engineering Institute, which is funded by the Defense Department.


At the time, many assumed that the university pulled the plug on the talk because of the gray legal zone it was in, with the researchers casually intercepting Web traffic. But maybe it got pulled because the researchers were revealing a law enforcement technique that the government did not want publicized. If nothing else, it’s highly likely the information the researchers collected about “drug dealers and child pornographers” made its way into law enforcement hands. McCord said he was “unable to comment on the matter.” Carnegie Mellon’s SEI declined comment about the canceled talk and about whether it had provided information from the research to law enforcement.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Tor-Netzwerk: Aktivisten trotzen der NSA

Tor-Netzwerk: Aktivisten trotzen der NSA | ICT Security-Sécurité PC et Internet | Scoop.it
Im Visier der mächtigen NSA: Weil der Student Sebastian Hahn bei einem Dienst zur anonymen Internetnutzung hilft, landete einer seiner Server im Raster des Geheimdienstes. Das schreckt ihn nicht ab.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


Gust MEES's insight:

Im Visier der mächtigen NSA: Weil der Student Sebastian Hahn bei einem Dienst zur anonymen Internetnutzung hilft, landete einer seiner Server im Raster des Geheimdienstes. Das schreckt ihn nicht ab.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


No comment yet.
Scooped by Gust MEES
Scoop.it!

Android Botnets Hop on the TOR Train

Android Botnets Hop on the TOR Train | ICT Security-Sécurité PC et Internet | Scoop.it
Cyber criminals can infiltrate your mobile devices with the just discovered first "TOR Trojan for Android".
No comment yet.
Scooped by Gust MEES
Scoop.it!

FBI Seizes Deep Web Black Market Silk Road, Arrests Owner

FBI Seizes Deep Web Black Market Silk Road, Arrests Owner | ICT Security-Sécurité PC et Internet | Scoop.it
The feds have caught up to the Silk Road. The underground website long known for drug trafficking was seized by the FBI who also arrested the owner on three criminal counts.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?q=cybercrime

 

http://www.scoop.it/t/securite-pc-et-internet?q=prison

 

http://www.scoop.it/t/securite-pc-et-internet?q=jail

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Advice on Tor use in wake of Freedom Hosting compromise

Advice on Tor use in wake of Freedom Hosting compromise | ICT Security-Sécurité PC et Internet | Scoop.it
In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript ai...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Using Tor and other means to hide your location piques NSA's interest in you

Using Tor and other means to hide your location piques NSA's interest in you | ICT Security-Sécurité PC et Internet | Scoop.it
Those who use online anonymizing technologies to obscure their location are assumed to be non-US persons and should thus continue to be targeted by surveillance. That's one of many revelations comi...
Gust MEES's insight:

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Privacy

 

Gust MEES's curator insight, June 24, 2013 12:09 PM

 

Looks like George ORWELL was right...

 

https://en.wikipedia.org/wiki/Big_Brother_(Nineteen_Eighty-Four)

 

Forget PRISM, the recent NSA leaks are plain: Digital privacy doesn’t exist...

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=NSA

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Privacy

 

malek's curator insight, June 24, 2013 3:07 PM

Out of scope, but security is always near to everyone heart and mind.

- I'm not a US citizen, so I'm fully qualified for snooping.

- Encryped communication is your short way to NSA files

- PRISM will change our life for ever

Yeah Gust, George ORWELL was right all the way

Scooped by Gust MEES
Scoop.it!

Security issue discovered in TOR client

Security issue discovered in TOR client | ICT Security-Sécurité PC et Internet | Scoop.it
The traffic anonymisation tool TOR can leave confidential data like passwords in the system memory due to usage of a function that is not always used by all compilers...

 

Read more:

http://www.h-online.com/security/news/item/Security-issue-discovered-in-TOR-client-Update-1746884.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Online-Dienst erstellt maßgeschneiderte Krypto-Trojaner | TOR | CyberSecurity | eSkills

Online-Dienst erstellt maßgeschneiderte Krypto-Trojaner | TOR | CyberSecurity | eSkills | ICT Security-Sécurité PC et Internet | Scoop.it
Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hidden Services: Die Deanonymisierung des Tor-Netzwerks | Privacy

Hidden Services: Die Deanonymisierung des Tor-Netzwerks | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it
Das Tor-Netzwerk: Dort tummeln sich Whistleblower, Aktivisten, politisch Verfolgte, aber auch Drogenhändler oder Pädophile. Alle wollen dort aus unterschiedlichen Motiven ihre Anonymität bewahren. Es gibt aber Zweifel an der Effektivität der Anonymisierung.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:
Das Tor-Netzwerk: Dort tummeln sich Whistleblower, Aktivisten, politisch Verfolgte, aber auch Drogenhändler oder Pädophile. Alle wollen dort aus unterschiedlichen Motiven ihre Anonymität bewahren. Es gibt aber Zweifel an der Effektivität der Anonymisierung.



Learn more:




http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Who hacked a cluster of Tor servers in the Netherlands?

Who hacked a cluster of Tor servers in the Netherlands? | ICT Security-Sécurité PC et Internet | Scoop.it
A cluster of Tor servers suffered an unexplained outage just after the warning of the Tor project. Only certainty is someone physically accessed servers.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
A cluster of Tor servers suffered an unexplained outage just after the warning of the Tor project. Only certainty is someone physically accessed servers.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users

The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | ICT Security-Sécurité PC et Internet | Scoop.it
For more than a decade, a powerful app called Metasploit has been the most important tool in the hacking world: An open-source Swiss Army knife of hacks that puts the latest exploits in the hands of anyone who’s interested, from random criminals to the thousands of security professionals who rely on the app to scour client networks for holes.

Now Metasploit has a new and surprising fan: the FBI. WIRED has learned that FBI agents relied on Flash code from an abandoned Metasploit side project called the “Decloaking Engine” to stage its first known effort to successfully identify a multitude of  suspects hiding behind the Tor anonymity network.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
For more than a decade, a powerful app called Metasploit has been the most important tool in the hacking world: An open-source Swiss Army knife of hacks that puts the latest exploits in the hands of anyone who’s interested, from random criminals to the thousands of security professionals who rely on the app to scour client networks for holes.

Now Metasploit has a new and surprising fan: the FBI. WIRED has learned that FBI agents relied on Flash code from an abandoned Metasploit side project called the “Decloaking Engine” to stage its first known effort to successfully identify a multitude of  suspects hiding behind the Tor anonymity network.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

81% of Tor users can be de-anonymised by analysing router information, research indicates

81% of Tor users can be de-anonymised by analysing router information, research indicates | ICT Security-Sécurité PC et Internet | Scoop.it
Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.


Learn more:


- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Thoughts and Concerns about Operation Onymous | The Tor Blog

Thoughts and Concerns about Operation Onymous | The Tor Blog | ICT Security-Sécurité PC et Internet | Scoop.it

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Piratage de TOR confirmé par… TOR

Piratage de TOR confirmé par… TOR | ICT Security-Sécurité PC et Internet | Scoop.it

C’est dans un message diffusé sur le blog du système d’anonymisation TOR que l’on apprend, du moins que nous avons la confirmation, du piratage du système TOR.

Comme nous vous l’indiquions sur zataz, voilà une dizaine de jours, nous nous étonnions de la disparition d’une conférence dédiée à la surveillance de TOR lors du Black Hat 2014 de Las Vegas. La conférence de d’Alexander Volynkin et Michael McCord devait revenir sur les moyens de rendre beaucoup moins anonymes les utilisateurs du système.

TOR, donc, via son blog explique que ce “4 juillet, nous avons trouvé un groupe de relais dont le but supposé était de contourner l’anonymat des utilisateurs. Il semble qu’ils ciblaient les internautes qui utilisent Tor pour accéder ou exploiter des services cachés. Les attaques entraînaient la modification des en-tête de Tor pour s’effectuer.” Bref, nous revoilà avec le coup de 2007 et la lecture des données passant par les ordinateurs permettant à TOR de fournir l’anonymat tant recherché. Une technique d’espionnage démontrée par Dan Egerstad qui avait permis de révéler des centaines de données sensibles d’ambassades ou encore du Dalaïlama.




Article original appartenant à zataz.com : ZATAZ Magazine » Piratage de TOR confirmé par… TOR http://www.zataz.com/piratage-de-tor-confirme-par-tor/#ixzz38zXP7urA 
Follow us: @zataz on Twitter

Gust MEES's insight:

A MUST READ!!!


No comment yet.
Scooped by Gust MEES
Scoop.it!

900 kriminelle Dienste im TOR-Netz

900 kriminelle Dienste im TOR-Netz | ICT Security-Sécurité PC et Internet | Scoop.it
Das Anonymisierungsnetzwerk TOR wird inzwischen auch durch Online-Kriminelle gern genutzt. Kaspersky Lab kennt mittlerweile etwa 900 Dienste der Online-Kriminalität, die sich im so genannten Darknet verstecken. Dazu zählen etwa Kommando-Server für Bot-Netze.
Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

FBI nimmt Silk-Road-Gründer fest

FBI nimmt Silk-Road-Gründer fest | ICT Security-Sécurité PC et Internet | Scoop.it
Das Federal Bureau of Investigation (FBI) hat den Untergrund-Online-Marktplatz für Drogen Silk Road geschlossen. Über die Plattform konnten unter anderem Heroin, Kokain und Crystal Meth gegen die virtuelle Währung Bitcoin erworben werden.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?q=cybercrime

 

http://www.scoop.it/t/securite-pc-et-internet?q=prison

 

http://www.scoop.it/t/securite-pc-et-internet?q=jail

 

No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

TOR : vous êtes sur Windows ? Switchez !

TOR : vous êtes sur Windows ? Switchez ! | ICT Security-Sécurité PC et Internet | Scoop.it
Tous les accès corrompus au réseau maillé TOR l'ont été grâce à une faille du TOR Bundle exploitée sur Windows. Une solution : switchez, affirme l'équipe derrière TOR.

Via Frederic GOUTH
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

TOR-based botnets on the rise

TOR-based botnets on the rise | ICT Security-Sécurité PC et Internet | Scoop.it
Keeping their botnet's C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified...
Gust MEES's insight:

 

A MUST read!!!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Researchers uncover Tor-powered Skynet botnet

Researchers uncover Tor-powered Skynet botnet | ICT Security-Sécurité PC et Internet | Scoop.it
The Trojan in question has DDoS and Bitcoin-mining capabilities, but it's main function is to steal banking credentials.

The botnet operator spreads the malware via the Usenet discussion forum, which is also a popular platform for distributing pirated content. In order to hide its malicious nature, the file "weighs" 15MB, a great part of which is junk data.

The rest consists of a ZeuS bot, a Tor client for Windows, the CGMiner bitcoin mining tool, and a copy of a DLL file used by CGMiner for CPU and GPU hash cracking.

Read more, a MUST:
http://www.net-security.org/malware_news.php?id=2357
No comment yet.