"[The advice in this article can be adapted to suit the needs of other hidden services, including ones which are legal in your jurisdiction. The threat model in mind is that of a drug market. The tone is that of a grandfather who is always annoyingly right, who can't help but give a stream-of-consciousness schooling … Continue reading How-to: Be a Darknet Drug Lord
Tag: security
Try This One Weird Trick Russian Hackers Hate – Krebs on Security
"In a Twitter discussion last week on ransomware attacks, KrebsOnSecurity noted that virtually all ransomware strains have a built-in failsafe designed to cover the backsides of the malware purveyors: They simply will not install on a Microsoft Windows computer that already has one of many types of virtual keyboards installed — such as Russian or … Continue reading Try This One Weird Trick Russian Hackers Hate – Krebs on Security
Election Security 2020
The Cyber Policy Center's report, "Securing American Elections: Prescriptions for Enhancing the Integrity and Independence of the 2020 U.S. Presidential Elections and Beyond" makes for some discouraging reading. In short, our election are as secure as most everything else these days, i.e., not very secure.
I’ll Let Myself In: Tactics of Physical Pen Testers
Protecting Yourself From Identity Theft
"The reality is that your sensitive data has likely already been stolen, multiple times. Cybercriminals have your credit card information. They have your social security number and your mother's maiden name. They have your address and phone number. They obtained the data by hacking any one of the hundreds of companies you entrust with the … Continue reading Protecting Yourself From Identity Theft
Above Us Only Stars
"GPS and other Global Navigation Satellite Systems (GNSS) are used in everything from cellular communication networks, to basic consumer goods, high-end military systems, and stock trading inputs. But these systems are vulnerable: by attacking positioning, navigational, and timing (PNT) data through electronic warfare (EW) capabilities, state and non-state actors can cause significant damage to modern … Continue reading Above Us Only Stars
How to Boost Your Data Privacy With a Virtual Private Network
"Data privacy matters, and we all deserve respect and consideration from those we visit on the internet. As shown by the numerous data breaches that have affected companies and individual users around the world, individuals and governments, however, we must also look out for our own personal data and privacy. Using a VPN to obfuscate … Continue reading How to Boost Your Data Privacy With a Virtual Private Network
Click Here to Kill Everybody – Bruce Schneider
"There is simply no way to secure US networks while at the same time leaving foreign networks open to eavesdropping and attack. There's no way to secure our phones and computers from criminals and terrorists without also securing the phones and computers of those criminals and terrorists. On the generalized worldwide network that is the … Continue reading Click Here to Kill Everybody – Bruce Schneider
OverTheWire: Wargames
"The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games." http://overthewire.org/wargames/ Beyond security, the first game, "Bandit," is a useful introduction to the command line, common tools, e.g, ssh, man, grep, etc., and basic operating system concepts, such as permissions.
Net Alert | Secure Accounts
Secure Accounts is comprised of five different modules, each designed to function as a standalone resource on a specific aspect of account security, or as a series, with each module building on one another. The five modules include: Secure Your Accounts: A comic that explains why people should take their account security seriously Account Phishing … Continue reading Net Alert | Secure Accounts
Troy Hunt: Password reuse, credential stuffing and another billion records in Have I Been Pwned
Troy Hunt provides a detailed explanation why you should be using a password manager.
Five Easy Steps to Better Security
tl;dr: The five easy steps are: (1) start using a password manager, (2) set a password for your computer and devices, (3) install HTTPS Everywhere, (4) setup two-factor authentication for your important accounts, and (5) install Signal Private Messenger. If you do nothing else, start using a password manager, like LastPass. (2,127 words) The What … Continue reading Five Easy Steps to Better Security
