Update 11/10/14 : Hacker news reporting Operation Onymous has led to take-down of more than “410 hidden services” that sell illegal goods and services from drugs to murder-for-hire assassins by masking their identities using the Tor encryption network. The article also goes on to report this is the largest operation in history of Law Enforcement against the DarkNet. Full Article can be found here.
Update at 4:00 p.m. ET: At least two more sites were also seized. Read the full accounting of what we know about the operation so far.
A year after the Silk Road 2 came online promising to revive the Dark Web drug trade following its predecessor’s seizure by the FBI, the sequel has suffered the same fate.
Trend Micro Incorporated, has released its annual security predictions report, “Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible,” and the company’s threat defense experts are highlighting the report’s forecast that targeted attacks will become rampant from more countries as hackers from the usual suspects have found success targeting victims around the world. Additionally, the report breaks downs seven other cybersecurity threat predictions for 2015 including banks and payment systems.
Attackers were quick to capitalized on the Shellshock Bash command interpreter bug disclosed yesterday. Constructing a botnet that is rapidly try to infect other servers, according to a security researcher. (more…)
The Supreme Court struck a dramatic blow against Aereo today in a ruling that puts the TV streaming service as it currently exists on its deathbed. In a 6–3 ruling, the court found that Aereo’s service violates the Copyright Act by playing back recordings of broadcasters’ TV shows — even though it legally captures those shows over the air and obtains individual copies for each viewer. Aereo had argued that it was merely providing technology that its subscribers were renting in order to watch TV, posing that the viewers were responsible for playing back those recordings. (more…)
What happens when a computer is infected with the malicious software, and what should you do to protect your files?
Cryptolocker is back in the headlines, thanks to a coordinated effort to take down the computers and criminals that run the notorious “ransomware”. But what is it? And how can you fight it? (more…)
The Justice Department is charging members of the Chinese military with conducting economic cyber-espionage against American companies, U.S. officials familiar with the case said Monday, marking the first time that the United States is leveling such criminal charges against a foreign country. (more…)
IsoHunt, a popular website offering BitTorrents of mostly pirated material, is to shut down following a court settlement. (more…)
There’s a lot of talk around biometric authentication since Apple introduced its newest iPhone, which will let users unlock their device with a fingerprint. Given Apple’s industry-leading position, it’s probably not a far stretch to expect this kind of authentication to take off. Some even argue that Apple’s move is a death knell for authenticators based on what a user knows (like passwords and PIN numbers).
The ACLU collected data on plate scanning through Freedom of Information requests in 38 states. There is no supervision or control over collecting and storing data on drivers not deemed suspicious. (more…)