TechDay India - India's technology news network
India
Search

Dark web stories - Page 9

A good part of the Internet is invisible to regular browsers and known as the deep web; a component of the deep web is the dark web, content which relies on the internet but isn’t available to regular browsers. While the dark web is used for legitimate purposes by businesses and other private networks, it is also commonly associated with the less salubrious aspects of the internet including criminal activity. Accessing the dark web is generally accomplished with specific software and configurations including ‘onion’ browsers the best known of which is probably Tor (The Onion Router).
Story image
Interview: Sophos reveals the criminal underbelly of the dark web
Tue, 29th Aug 2017
#
malware
#
firewalls
#
network infrastructure
The dark web may be a place that most of us have heard of as a murky underworld for cybercriminals, but also where most internet users daren't tread.
Story image
Meet Joshua, the dark web trawler developed in Australia
Thu, 24th Aug 2017
#
dark web
#
identity
#
matrix international exchange
JOSHUA is able to track state sponsored, activist and insider threats, stolen data markets for privacy goods, credit cards and identity theft.
Story image
Two dark web markets shut down but expert says ‘one door closes, a window opens’
Tue, 22nd Aug 2017
#
cybersecurity
#
market
#
dark web
The recent shutdown of AlphaBay and Hansa has left dark web marketplaces on shaky ground, says Digital Shadows CEO Alastair Paterson.
Story image
The Dark Web: Is your company at risk?
Thu, 27th Jul 2017
#
risk & compliance
#
cybersecurity
#
dark web
Not only is information on a company’s assets available, but information about new techniques to compromise targets is for sale on the dark web.
Story image
Menlo Security selects Edvance as Hong Kong & Macau distributor
Wed, 26th Jul 2017
#
cybersecurity
#
browsers
#
menlo security
Menlo Security has signed a distribution agreement with Hong Kong-based Edvance to distribute its browser isolation platform across both Hong.
Story image
ESET uncovers stealthy Stantinko malware's click fraud prowess
Tue, 25th Jul 2017
#
malware
#
cybersecurity
#
browsers
ESET has spotted a malware strain that tricks users into downloading pirated software from dummy torrent sites.
Story image
Lights out for the Dark Web: Authorities take down AlphaBay and Hansa marketplaces
Fri, 21st Jul 2017
#
bitdefender
#
cyber criminal
#
dark web
Online criminal marketplaces AlphaBay and Hansa have been taken offline, thanks to a major cooperation effort between Dutch and US authorities.
Story image
Threat actors embrace metadata as the underrated weapon in cyber war
Tue, 18th Jul 2017
#
data analytics
#
martech
#
planning
Metadata – the data that describes other data – is a security threat that goes underreported but is also a powerful threat to national security.
Story image
Alphabay disappears: Three scenarios to look for next
Mon, 17th Jul 2017
#
hackers
#
dark web
#
digital shadows
As AlphaBay vanishes, the dark web braces for upheaval, with markets jostling for supremacy or a radical shift to P2P trading.
Story image
Major Dark Web Player goes offline: Could it be an exit scam?
Fri, 7th Jul 2017
#
ddos
#
dark web
#
digital shadows
One of the Dark Web's biggest marketplaces for illegal online trades was taken offline this week, with reports circulating that it was an 'exit scam'.
Story image
Ingram Micro signs on as distie for Menlo Security's browser isolation platform
Mon, 3rd Jul 2017
#
endpoint protection
#
edr
#
browsers
Ingram Micro has scored distribution rights for Menlo Security's browser isolation platform across Singapore and Thailand.
Story image
Fortune 500 companies in Japan, China & South Korea most vulnerable to attacks
Wed, 17th May 2017
#
uc
#
healthtech
#
telco
Fortune 500 firms in Japan, China, and South Korea are highly susceptible to cyber attacks, according to KomodoSec's Peta.AI Cybersecurity Exposure Site.
Story image
Visiting cybercrime expert says the deep web can benefit NZ businesses
Wed, 3rd May 2017
#
fintech
#
financial systems
#
cloud services
Believe it or not, the deep web can actually benefit New Zealand businesses, according to visiting cybercrime expert Dr Stephen Hill.
Story image
Bye bye, NPAPI: Mozilla issues critical update to Firefox, disables plugins
Fri, 10th Mar 2017
#
microsoft
#
mozilla
#
browsers
Firefox has disabled all NPAPI plugin capability except Flash. Common plugins such as Adobe Acrobat, Java and Microsoft Silverlight no longer load.
Story image
Exploring the cybercrime underground: Darknet markets - where cyber criminals trade
Fri, 17th Feb 2017
#
firewalls
#
network infrastructure
#
network security
This blog focuses on explaining what darknet markets are, common payment model used, the type of digital data being bought and sold, and their costs.
Story image
Have you met Delilah? The first Insider Threat Trojan
Fri, 15th Jul 2016
#
ueba
#
cybersecurity
#
trojan
New Trojan, Delilah, recruits insiders through social engineering and extortion, using ransomware techniques. Insider threats set to increase.
Story image
Insider threats escalate and thrive in the Dark Web
Wed, 22nd Jun 2016
#
cybersecurity
#
dark web
#
cyber attacks
Disgruntled employees are gladly selling their services to the bad guys in order to inflict harm on their employers.
Story image
Should the Dark Net be shut down?
Wed, 30th Mar 2016
#
cybersecurity
#
dark net
#
ipsos
If this realm truly embodies the seedy underbelly of the Internet, then why do 29% of respondents think it should not be taken down?.
Story image
Attacks against IoT, Dark Web indexing, and other tales from Ground Zero
Tue, 9th Feb 2016
#
cybersecurity
#
threat intelligence
#
dark web
I've uncovered Israeli innovation countering soaring IoT attacks and Dark Web's underworld market indexing—key battlegrounds in cyber warfare.
Story image
Polycom predicts the future of the NZ workplace in 2015
Fri, 9th Jan 2015
#
uc
#
hybrid & remote work
#
healthtech
Polycom reveals key tech trends for NZ's 2015 workplace, predicting a shift to more collaborative, efficient environments driven by advanced mobile tech.