ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Who hacked a cluster of Tor servers in the Netherlands?

Who hacked a cluster of Tor servers in the Netherlands? | ICT Security-Sécurité PC et Internet | Scoop.it
A cluster of Tor servers suffered an unexplained outage just after the warning of the Tor project. Only certainty is someone physically accessed servers.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
A cluster of Tor servers suffered an unexplained outage just after the warning of the Tor project. Only certainty is someone physically accessed servers.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

81% of Tor users can be de-anonymised by analysing router information, research indicates

81% of Tor users can be de-anonymised by analysing router information, research indicates | ICT Security-Sécurité PC et Internet | Scoop.it
Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.


Learn more:


- http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:
Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Thoughts and Concerns about Operation Onymous | The Tor Blog

Thoughts and Concerns about Operation Onymous | The Tor Blog | ICT Security-Sécurité PC et Internet | Scoop.it

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers Who Shut Down PSN and Xbox Live Now Attacking Tor | CyberSecurity | CyberAttacks

Hackers Who Shut Down PSN and Xbox Live Now Attacking Tor | CyberSecurity | CyberAttacks | ICT Security-Sécurité PC et Internet | Scoop.it
The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.

So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:

The hacker group appears to be attempting to dominate Tor's relays to the point where it can comprise anonymity. Tor keeps you anonymous by bouncing your communications around a network of volunteer nodes. But if one group is controlling the majority of the nodes, it could be able to eavesdrop on a substantial number of vulnerable users. Which means Lizard Squad could gain the power to track Tor users if it infiltrates enough of the network.

So far, they have already established over 3000 relays, nearly half of the total number. That's very not good.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR





No comment yet.
Scooped by Gust MEES
Scoop.it!

OnionDuke: APT Attacks Via the Tor Network | Cyber Security

OnionDuke: APT Attacks Via the Tor Network | Cyber Security | ICT Security-Sécurité PC et Internet | Scoop.it

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Gust MEES's insight:

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


No comment yet.