ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

MIT researchers figure out how to break Tor anonymity without cracking encryption | CyberSecurity | Privacy

MIT researchers figure out how to break Tor anonymity without cracking encryption | CyberSecurity | Privacy | ICT Security-Sécurité PC et Internet | Scoop.it



Researchers can identify which hidden service you're connecting to with 88% accuracy.




Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:

Researchers can identify which hidden service you're connecting to with 88% accuracy.



Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers Who Shut Down PSN and Xbox Live Now Attacking Tor | CyberSecurity | CyberAttacks

Hackers Who Shut Down PSN and Xbox Live Now Attacking Tor | CyberSecurity | CyberAttacks | ICT Security-Sécurité PC et Internet | Scoop.it
The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.

So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:

The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.

So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR





No comment yet.
Scooped by Gust MEES
Scoop.it!

81% of Tor users can be de-anonymised by analysing router information, research indicates

81% of Tor users can be de-anonymised by analysing router information, research indicates | ICT Security-Sécurité PC et Internet | Scoop.it
Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.


Learn more:


- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Thoughts and Concerns about Operation Onymous | The Tor Blog

Thoughts and Concerns about Operation Onymous | The Tor Blog | ICT Security-Sécurité PC et Internet | Scoop.it

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Malicious Security joins the Anonymous cause

Malicious Security joins the Anonymous cause | ICT Security-Sécurité PC et Internet | Scoop.it
Ups the game some...

 

A NEW BREED OF HACKTIVIST has arrived calling itself Malicious Security or Malsec.


The group has bubbled along on Twitter for a while but made its first release today with a leak out of the Philippines. It says it has watched Anonymous over the last year and is ready to join its campaigns, though with a different flavour.


Source: The Inquirer (http://s.tt/19aH8)

No comment yet.
Scooped by Gust MEES
Scoop.it!

Online-Dienst erstellt maßgeschneiderte Krypto-Trojaner | TOR | CyberSecurity | eSkills

Online-Dienst erstellt maßgeschneiderte Krypto-Trojaner | TOR | CyberSecurity | eSkills | ICT Security-Sécurité PC et Internet | Scoop.it
Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Die Einstiegshürde für angehende Online-Erpresser ist erneut gesunken: Ein Dienst im Tor-Netz erstellt nach wenigen Klicks den individuellen Erpressungs-Trojaner. Falls ein Opfer das geforderte Lösegeld zahlt, verdienen die Betreiber mit.


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Analysis casts doubt on FBI claims over Tor website seizures | Cybercrime

Analysis casts doubt on FBI claims over Tor website seizures | Cybercrime | ICT Security-Sécurité PC et Internet | Scoop.it

Just how many hidden Tor services seized by law enforcement were genuine websites, and how many were clones and copies?


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Just how many hidden Tor services seized by law enforcement were genuine websites, and how many were clones and copies?


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

OnionDuke: APT Attacks Via the Tor Network | Cyber Security

OnionDuke: APT Attacks Via the Tor Network | Cyber Security | ICT Security-Sécurité PC et Internet | Scoop.it

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

TOR : vous êtes sur Windows ? Switchez !

TOR : vous êtes sur Windows ? Switchez ! | ICT Security-Sécurité PC et Internet | Scoop.it
Tous les accès corrompus au réseau maillé TOR l'ont été grâce à une faille du TOR Bundle exploitée sur Windows. Une solution : switchez, affirme l'équipe derrière TOR.

Via Frederic GOUTH
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR

 

No comment yet.