Browsing tag

Tor

REvil Ransomware Gang Goes Underground After Tor Sites Were Compromised

REvil, the notorious ransomware gang behind a string of cyberattacks in recent years, appears to have gone off the radar once again, a little over a month after the cybercrime group staged a surprise return following a two-month-long hiatus. The development, first spotted by Recorded Future’s Dmitry Smilyanets, comes after a member affiliated with the […]

TOR Project Removes 13.5% Of Its Network Servers: Here’s Why

The Tor Project has removed more than 800 servers that were running outdated and end-of-life (EOL) versions of the Tor software. These blacklisted servers account for nearly 13.5% of the 6,000+ in the Tor network that helps internet users anonymize traffic. About 750 of them belonged to Tor middle relays, whereas the other 62 are […]

4 browsers for safe anonymous surfing

Internet comes with full of productivity & entertainment solutions. Being anonymous is very difficult now days. Because of increasing cyber crimes & frauds online. According to ethical hacking researcher of international institute of cyber security users cannot get complete anonymity online but can take some precautions for hiding true their identity. Epic Browser Epic is […]

Hackers Can Reduce Tor Network Performance For Just $17,000/mo: Research

Amongst privacy enthusiasts, the Tor network is a popular means to browse the internet anonymously. However, time and again, vulnerabilities have been found in the Tor network that allow hackers to exploit it. A new study has revealed that a hacker or a nation-sponsored bad actor can degrade the performance of the Tor network for […]

Employees Actively Seeking Ways to Bypass Corporate Security Protocols in 95 % of Enterprises

Nowadays cyber incidents activities such as data theft, insider threat, malware attack most are significant security risks and some it caused by the employees of the company both intentionally or unknowingly, also around 95% of threat and Activities with access to corporate endpoints, data, and applications. Many of the security testings among the most alarming discoveries […]

Stable Version Of Tor Browser For Android Now Available On Play Store

After eight months of testing, a stable release for the Tor browser has arrived on the Play Store. The new Android browser now brings Tor features directly into a standalone browser, replacing the Orbot/Orfox as the main way to connect to the Tor network via Android devices. The stable version (v8.5) of Tor for Android […]

Mozilla digital signature verification flaw causes browser extensions fails

Cyber forensics course experts reported a security flaw related to digital signatures in Mozilla that is mainly affecting users of the Tor browser; so far, the company has only mentioned problems with intermediate certificates that have expired. In recent days, Tor users encountered a popup window in the browser mentioning that one of the extensions […]

TOP 11 Deep Web Search Engine Alternative for Google and Bing 2019

Deep Web Search Engine is an alternative search engine when we need to search something, then Google or Bing will the first choice hit in mind suddenly. But unlike the Deep Web Search Engine, Google and Bing will not give all the Hidden information which is served under the Dark web. Google has the ability […]

OnionShare: Share files over the Tor network

A tool available to any user OnionShare appeared in 2017 and, according to network security specialists from the International Institute of Cyber Security, allowed any user to share files in an easy way using the Tor network. Recently, OnionShare 2, the most important update the tool has received has been released. OnionShare 2 has been […]

TOR and VPN Anonymous Enough for Dark Web

Dark web is the World Wide Web content that exists on darknets, overlay systems which use public Internet yet we must particular software, configuration or approval to use. Let’s see TOR and VPN Anonymous enough for Dark Web. You can also take the Secrets of Dark Web – How to Access Dark Web Safely Online course […]

Hosting your own .onion domain

As per ethical hacking investigators, Tor is the very much popular for being anonymous over the internet. Tor allows to user to protect user privacy. TOR name origin from The Onion Router. Tor protects the privacy of the user as it does not save any log files. Most of the Government agencies or enforcement law […]

Share Your Files Anonymously Using TOR and Onion Share

There is a bunch of reasons why people may look to share records anonymously, with the principal that rings a bell being the situation of informants or political activists attempting to keep up a strategic distance from abuse.(TOR) As we know there are various ways which you can share documents on the web. Google Drive, Dropbox, […]

TOR EXIT RELAY SCANNER USING EXITMAP

TOR EXIT RELAY SCANNER:- As we all know tor is used for anonymous communication in anonymity network. Exitmap modules implement tasks that are run over of subset of all exit relays. It’s fast and modular python-based scanner for tor exit relays. Exitmap is useful to monitor the accuracy of all exit relays. As per ethical hacking […]

Now use Internet anonymously through Tor-enabled SIM card Onion3G

Privacy concerns are rising with the advancement of technology. Today, we need to be a lot more careful about online browsing than we needed to a few years back despite that we have come far ahead with technology. Tor browser and VPNs are generally believed to protect our privacy online, but what if they are also […]

This Tor-Enabled SIM Card Will Keep You Anonymous On Mobile Networks

In this world of online tracking and surveillance, maintaining online privacy can be quite a challenge. Your ISP or VPN provider can technically keep a log of everything that you do online — so what do we do? Tor is an answer that solves this problem and helps in securing online privacy and evading surveillance. However, […]

The Dark Web is Coming to Your Mobile Phone

Deep web and privacy enthusiasts have a lot to rejoice for as the Tor Project has announced that their popular Tor Browser is now available for Android. Members of the Tor Project claim the browser is now in Alpha and can be installed by using Orbot first. What users can do to start browsing the […]

Migrate to Tor Browser 8.0, Version 7.x Has Zero-Day Exploit

TOR, also known as the Onion router has been the go-to method for the privacy-savvy people to browse the web with confidence, as TOR traffic hides people’s identity. However, browsing through TOR requires a web browser, specially designed to use the TOR network and not just a mainstream browser. Just like any software, TOR Browser […]

Security firm uses Twitter to disclose critical zero-day flaw in Tor Browser

Zerodium, an infosec and premium zero-day acquisition platform tweeted about the flaw in Tor browser on Monday. The infamous exploit vendor and buyer/seller of popular software vulnerabilities, Zerodium has revealed a critical flaw in Tor browser software. According to a tweet posted by Zerodium, the zero-day vulnerability is present in the NoScript browser plugin and can […]