❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayTape-News

Man arrested in France for laundering money of drug trafficker

By: seo_spec
11 February 2023 at 16:04

A 29-year-old man suspected of laundering the proceeds of drug trafficking was arrested in Neufs (France).

According to the information provided, the defendant created a cryptocurrency mixer at the request of a drug dealer β€œDrugsource” who made a profit by selling drugs through the β€œdark web”. It is known that Drugsource has fulfilled more than 3000 orders worth more than USD 1.5 million during its operation.

The investigation into the drug trafficker’s activities began in early September 2020. Law enforcement agencies made a control purchase and were able to obtain the address of the trafficker’s wallet. After analyzing the blockchain, the police came across a 29-year-old man whose account had been used for 14 transactions by the drug dealer. The police were able to find and arrest the accused in September 2022.

The hearing in the case of the 29-year-old defendant was scheduled for January 2023. The defendant claimed responsibility for creating the bitcoin tumbler for Drugsource, but he denied any involvement in drug sales. The court nevertheless acquitted him of drug trafficking charges, but he was facing imprisonment for money laundering on a large scale.

USD 500,000 was confiscated from the offender’s cryptocurrency and bank accounts, and his apartment in Dubai was also seized. The defendant is awaiting sentencing in February 2023 on charges of money laundering obtained from the sale of drugs.

A group of people who sold drugs through the β€œDarkWeb” was detained in Russia

By: seo_spec
11 February 2023 at 15:56

Police in the city of Ryazan (a city in Russia) have taken 4 suspected drug traffickers into custody.

According to the information provided by law enforcement agencies, the group worked according to a carefully planned scheme. There are four suspects in total: three men and one woman. As it turned out later, their leader was a 24-year-old man. Responsibilities for processing orders, packaging and delivery of drugs were distributed among the group members. While the group leader was responsible for the operation of the store in the β€œdark web”, the second member was engaged in the purchase of apartments to use them as a platform for storing and packaging drugs. A third man and a girl were responsible for packaging and order processing, and they packaged drugs in packages according to orders received from the β€œdark web”.

They quietly conducted their business until January 13, 2023, when they were detained by the police. During the investigation, the apartment they used as a packaging center was searched, and the police also searched the suspects’ apartments. As a result, a large amount of drugs such as hashish, ecstasy, and others were found.

Currently, the criminals have been arrested and are to be tried under the article on drug trafficking in particularly large amounts.

The Italian police have detained criminals who were supplying counterfeit money across Europe

By: seo_spec
11 February 2023 at 15:47

Italian law enforcement agencies have detained a group of people who sold counterfeit money through a β€œDarkWeb”.

With the assistance of the Italian Public Prosecutor’s Office, eight criminals were detained in Naples who manufactured and distributed counterfeit euros across Europe. To sell their goods, the criminals used β€œDarkWeb” shops and sent counterfeit money by mail. In July 2018, an investigation was launched against a group of people accused of manufacturing and selling counterfeit banknotes worth more than 120 thousand euros. The counterfeiters had accomplices in many countries of the European Union, which greatly simplified their work.

The criminals acted according to a fairly simple scheme: they placed ads for the sale of counterfeit euros of various denominations on β€œDarkWeb” resources, and after receiving the order, they sent their invoice to pay for the goods in bitcoins. To deliver the parcels, they chose international mail, through which they sent toys and various vintage items with banknotes of different denominations hidden in them. During the investigation, European border guards intercepted about 50 packages in total. The total amount of money earned by the criminals in the period from 2012 to 2023 is almost 150 thousand euros. In addition to the counterfeiters, the police detained more than 30 buyers and identified fifty accomplices.

The investigation resulted in the arrest of a group of counterfeiters and the liquidation of their printing plant in Naples.

The cryptocurrency exchange that helped to β€œlaunder” dirty money from the Hydra marketplace has been closed

By: seo_spec
11 February 2023 at 15:40

U.S. law enforcement agencies, with the help of international colleagues, have shut down the Chinese exchange Bitzlato Limited and arrested its entire top management.

Bitzlato Limited was established in 2016, and its founder is Anatoly Legkodymov, who is a citizen of the Russian Federation. From the first day of its operation, the exchange attracted a large number of people who were not entirely legitimate business, and this was facilitated by the company’s policy and lack of control over β€œdirty” money. First of all, the exchange attracted the attention of various criminals, and most of all it attracted the attention of users of β€œdark” Internet markets.

The investigation showed that most of the Bitzlato exchange users were also active users of Hydra Market. Customers and sellers from the Hydra resource immediately fell in love with the Chinese exchange because they did not have any questions about the legality of their finances when making illegal transactions through it. The blockchain analysis showed that in the period from May 2018 to April 2022, about $300 million was credited to Bitzlato accounts from Hydra users. Also, more than $200 million was sent to Hydra accounts from the exchange. Also, thanks to the analysis, it became known that almost $20 million was transferred to the exchange’s accounts from accounts that were used for ransomware crimes.

If you think that Bitzlato employees somehow fought against illegal transactions, you are mistaken. Exchange employees sometimes blocked users who were suspected of illegal activity, but in most cases they themselves deliberately helped to transfer money to Hydra accounts. The analysis of exchange users’ correspondence with the support service showed that the employees directly answered that funds from the exchange could be transferred to any address, regardless of the purpose of the transactions. The employees of the exchange were well aware that most of their customers used accounts registered under other names to make purchases on Hydra Market, and even knowing all the schemes of transferring funds, they did not react in any way.

The marketing director of the exchange prepared a report titled β€œCompetitor Analysis” in which he pointed out that the rejection of illegal money transfers would hit the company’s finances, and he also highlighted the disadvantages of the exchange, which he attributed to β€œa large number of fraudsters among the users of the resource” and β€œa large amount of dirty money on the company’s accounts”.

Despite the fact that the exchange was not officially registered in the United States, it advertised its services among clients of the American market. As it later became known, about 1.5 thousand US clients transferred more than USD 2 million to Bitzlato’s account.

The founder of the exchange did not even worry about being held accountable for his activities. As of October 2022, he was living in Miami, from where he had unimpeded access to the exchange’s servers. It all ended on January 17, 2023, when US law enforcement agencies in partnership with several European countries arrested Legkodymov and confiscated all of his company’s cryptocurrency assets.

MadHatterPharma – a drug trafficker’s failure?

By: seo_spec
11 February 2023 at 15:30

Colby John Kopp, a 23-year-old man living in Connecticut, imagined that he could get away with selling fake oxycodone pills on the dark web.

It all started in August 2020. FBI agents investigating the work of dark marketplaces came across a seller under the nickname β€œMadHatterPharma” who was conducting his β€œpharmaceutical activities” on the Empire Marketplace. Having started his work on May 4, 2020, the β€œentrepreneur” already had 554 successful orders on his account. The only and at the same time quite popular product of this seller was oxycodone pills (as the seller stated, they were made by pressing a mixture of morphine and fentanyl). In order to find the person behind it all, the FBI agent placed an order with MadHatterPharma (10 pills worth $100). After placing the order, the seller provided a bitcoin address to pay for the β€œgoods”. The order was not long in coming, and less than a week later, a package with the USPS Priority Mail logo arrived at the address provided by the agents to receive the order, in which the agents found exactly what they had ordered through the β€œdark web”. After the successful order, the agents went to the bitcoin address provided by the seller. After analyzing the blockchain, the FBI went to the Coinbace exchange, and from there to a 23-year-old guy named Colby John Kopp.

Then an unexpected situation occurred. At the end of August 2020, Empire Market ceased to exist. This did not hurt the drug dealer’s business; after the old store was closed, he announced on Dread (an analogue of Redit only in the dark web) that he would be making deals on Wickr, and his future customers would be able to find him under the nickname β€œhatmatter”. The FBI agents did not sit idle, so they placed another order, but this time several times more (100 pills worth $910).

You’re probably wondering how Kopp laundered the money. It’s very simple, he worked with an accomplice (her name is Adriana Beatrice Sutton) who helped him cash out BTC. The scheme went something like this: Kopp sold all the BTC he earned through the exchange and transferred the proceeds to his PayPal account, spent some of the money from his account, and sent some of the money to Adriana’s account, and she, in turn, withdrew cash within a few hours of the transfer (using Coin Cloud ATMs). Continuing the investigation, FBI agents learned that over the past year, the β€œpharmacist” had purchased various equipment and substances for the manual manufacture of pills several times.

After he was detained on January 11 this year, he managed to share all the details of his β€œsmall business”. He is due to be sentenced on April 18, and according to preliminary estimates, he will face 5 years in prison.

Doctor arrested for trying to hire a killer

By: seo_spec
11 February 2023 at 15:22

A former doctor will be imprisoned for 8 years for trying to hire a killer from the β€œdark web”.

It all started in February 2021, when a visitor to a website for ordering killer services under the nickname Scar215 addressed the administrator of the site in a personal letter with a desire to order an attack on his colleague. The customer sent full information about the victim (name, address and photo) and an amount of about USD 2,000 (approximately the same amount of money was used to buy the assassination of the colleague).

This was not the last order from the anonymous person. In early April 2021, Scar215 sent letters to three administrators of similar sites with a detailed description of his order. He wanted to order the kidnapping of his wife because she had started the process of divorce from him. The text of the task stated that she had to be kidnapped and held for one week, the victim had to be injected with heroin twice a day to induce addiction, and the task was accompanied by a list of goals for which the mercenary would receive a β€œnice bonus”. If we count all the β€œbonuses” and the initial amount specified in the text of the task, we will get the amount of USD 60,000, which is the amount for which the customer planned to organize the β€œre-education” of his wife. During the discussion of the details, the customer allowed the mercenary to use any methods to achieve the goal, and the goal was to return the wife to the customer and complete the divorce procedure. Scar215 paid for his two orders with bitcoin, probably to remain completely anonymous.

All the illegal actions could not go unnoticed. While analyzing the blockchain, the FBI noticed some strange transactions, and they contacted the exchange (Coinbase, because it was from an account registered on this exchange that strange transactions for a rather large amount were made) to obtain information on these transactions, which led them to a man named Ronald Craig Ilg, who lived in Spokane, Washington. Ronald was then detained. In the morning, on April 11, 2021, he was interrogated, during which Ronald confessed that he intended to hire killers to kill himself, but investigators did not believe him, so a search was conducted at the suspect’s home. The police were interested in a safe in the man’s bedroom. Access to it was provided by the owner of the house. Inside the safe, investigators found a lot of records and notes. On April 13, 2021, using the found records, law enforcement agencies gained access to the Scar215 user account on the dark web, as well as to correspondence with administrators of sites providing β€œspecific” services.

Ronald Craig Ilg confessed to ordering the attacks on his colleague and ex-wife and was sentenced on August 10, 2022: 8 years in prison in a general regime colony. If you think that’s all, you’re wrong, on January 24, 2023, the court ordered the prisoner to pay the victims compensation in the amount of $125,000.

Austrian resident resells drugs he ordered through β€œDarkWeb”

By: seo_spec
11 February 2023 at 15:15

Austrian law enforcement agencies detained a 39-year-old man who resold drugs ordered from β€œDarkWeb”. According to the information provided, the man lived in the city of Linz.

According to the information provided by the police, the accused resold drugs ordered from the β€œdark web” for 10 years. He sold such drugs as cocaine, ecstasy, marijuana, LSD and others. After his arrest, police were able to identify two more drug dealers, aged 31 and 22. They are known to have sold drugs worth more than 130 thousand euros. The police are also investigating 40 other people accused of buying drugs.

During interrogation, the 22-year-old man admitted that all the drugs he sold were bought from a 39-year-old resident of Linz. After the confession, the police obtained a search warrant for the Linz resident’s house, where they found a large amount of drugs and an undisclosed amount of money. During the interrogation of the drug dealer, the police learned that all the drugs he used, resold and imported were bought through a store on the Dark Web. Despite all the evidence, the dealer was not arrested. The investigation did not end there, and later the police found out that the man had not abandoned his β€œdark” business. On January 23, 2023, the police received another warrant, this time to search the accused’s residence. The search revealed several times more drugs than the last time, namely: almost 4 kilograms of cocaine, more than 3000 doses of LSD, almost 1000 ecstasy pills, up to 20 kilograms of marijuana and other drugs whose names are not disclosed.

After 10 years of running a drug trafficking business, the 39-year-old resident of Linz was arrested and is now awaiting trial.

A guide to cryptocurrency self-control

By: seo_spec
11 February 2023 at 15:02

Keeping your finances in the form of cryptocurrency gives you a great deal of independence from external factors. Do not forget that owning cryptocurrency requires maximum responsibility.

First, you need to understand what it means to own cryptocurrency and how it works. To enjoy all the benefits of cryptocurrencies, you are provided with keys to receive and confirm transactions.

To get money transferred, you have to share your cryptocurrency wallet address. With your private key, you authorize the transfer of funds from your wallet.

A cryptocurrency wallet stores your finances. There are several types of wallets: β€œhot” and β€œcold”

β€œCold crypto wallet”

A β€œcold cryptocurrency wallet” stores your β€œkeys” and verifies transactions. For a β€œcold wallet”, the Internet is required only when making a transfer. Many users consider β€œcold crypto wallets” to be more secure.

β€œHot crypto wallet”

Using a β€œhot crypto wallet” requires an Internet connection.. For example, let’s take those cryptocurrency wallets where your keys are controlled by a third party, namely the provider (for example, Binance or Coinbace). This type of wallet is also called custodial. Undoubtedly, these wallets are more convenient to use than regular cold wallets, but they also have their drawbacks. The disadvantages include the insecurity of your finances from hacker attacks and the poor attitude of the exchange to its users. To minimize the risks, there are non-custodial wallets that are software or browser-based and can be installed on your personal devices. The main advantage of such wallets is that you keep the keys to them.

What are the advantages and disadvantages of self-control of virtual finance?

The advantages immediately include full control over your financial transactions, you choose how much and what to spend money on without restrictions from the exchange, and this also gives you another advantage, namely, you get more financial privacy than when working through the exchange. It is also worth mentioning that self-storage of your cryptocurrency β€œkeys” minimizes the risk of losing money due to hacker attacks against the exchange, its bankruptcy, or simply irresponsible attitude to the finances of its users.

What are the disadvantages of self-control of your cryptocurrency finances?

Despite all the advantages of self-control, it is necessary to mention its disadvantages. If someone else gains physical access to your cold wallet with your passwords, they will be able to spend money from it without your knowledge. You should also not forget about the risk of losing passwords that are required to authorize and use the wallet.

Owning a cryptocurrency wallet opens up new opportunities and risks for you, so you need to be responsible and self-controlled.

Dutch man sold counterfeit money via DarkWeb

By: seo_spec
11 February 2023 at 14:51

The Hague Prosecutor’s Office has requested a 5 and a half year prison sentence for a counterfeiter who produced and distributed counterfeit money via DarkWeb.

According to the Dutch prosecutor’s office, a 32-year-old resident of The Hague has been producing and selling counterfeit banknotes via DarkWeb for more than 3 years and sending them by mail throughout Europe.

The investigation began in early 2020. At that time, the Dutch authorities were asked by the German and Austrian authorities to launch an investigation into counterfeiting. Based on the information provided, the customs authorities of Germany and Austria were able to intercept packages of counterfeit banknotes sent to them from the Netherlands.

During the course of this investigation, law enforcement authorities were able to intercept a dozen packages sent to customers. All packages contained counterfeit banknotes of various currencies and denominations. The intercepted banknotes, namely the fingerprints left on them, helped law enforcement agencies identify the counterfeiter.

On July 12, 2022, investigators obtained a search warrant for the accused. During the search, the 32-year-old man was found to have a full-fledged printing house for the production of counterfeit banknotes of various denominations. Also, about 60 thousand euros, approximately 100 thousand Swedish kronor and more than 10 thousand US dollars were found. Firearms and ammunition were also found on the accused’s person.

According to the information provided by the Central Bank of the Netherlands, the counterfeiter produced and partially distributed counterfeit banknotes worth about 800 thousand euros throughout Europe.

A court hearing is scheduled for 2023, at which the defendant will be sentenced.

New Jersey man tried to hire a killer via DarkWeb

By: seo_spec
11 February 2023 at 14:42

After being arrested, New Jersey resident John-Michael Musbach pleaded guilty to attempting to hire a hitman from DarkWeb to kill a minor.

According to the information provided, 31-year-old New Jersey resident John-Michael Musbach transferred about $20,000 in BTC to the account of a fraudulent website for hiring killers. He was trying to hire a killer to kill a 14-year-old boy whom he had sexually abused the day before. According to the police department, in the summer of 2015, John-Michael conducted sexual correspondence with a minor (the victim was only 13 years old at the time) using the Internet Relay Chat (IRC) resource.

This could not go unnoticed, so the victim’s parents found out about it and immediately contacted the police. On March 31, 2016, the police arrested Michael, and on October 11, he confessed to having sexual relations with the victim.

On February 9, 2018, Michael was sentenced to 2 years of suspended imprisonment. The case would have been closed, but in 2019, an anonymous informant contacted HSI agents. The anonymous informant reported that in 2016, a user under the nickname agentisai wanted to use the services of a DarkNet site to order the services of a killer.

The anonymous person shared private correspondence from which it became known that in May 2016, agentisai asked the site administration whether a minor could be a target, and received a response that age was not a problem for the order. After receiving a positive response to his request, agentisai transferred 40 bitcoins to the site’s account and placed an order to kill a 14-year-old boy. During the order confirmation, the administrator asked for another $5,000, saying that this way his order would be fulfilled by a more professional killer. After that, agentisai wanted to deactivate his order, but was refused. The site administrator threatened to provide all the information to law enforcement agencies if agentisai did not pay another 22 BTC. For this amount, the administration promised to delete the customer’s account.

The agents reported this information to the Coinbase exchange, as it was the exchange that was used to pay for the murder order. The exchange indicated that this transaction was made from an account registered to John-Michael.

John-Michael was arrested on August 13, 2020, and pleaded guilty on February 2, 2023. U.S. District Judge Joseph H. Rodriguez has scheduled his sentencing for June 13, 2023. Michael faces a 10-year prison sentence.

Rackspace, a major cloud service provider, was hacked

By: seo_spec
9 January 2023 at 17:06

Rackspace has been confirmed that the Play group was responsible for the December cyberattack. Hackers hacked the company’s email account. This was achieved using a zero-day exploit.

There is a high probability that the exploit was linked to a vulnerability under CVE-2022-41080. According to an investigation conducted by the same company, the hackers managed to get access to the e-mails and other confidential information, but no evidence was found that they were involved in its distribution.

It also remains a mystery as to whether Rackspace paid a ransom for the information for the cybercriminals. It should be noted that the report was followed by a report from IS company Crowd Strike, which shed light on the new attack used by the Play group. The technique is called OWASRF and is being used to cyberattack Exchange servers for which patches that fix the CVE 2022 41040 or CVE 2022 41083 vulnerability are not applied. Experts say the sequential application of CVE 2022-410800 and CSVE-2021-41082 allows hackers to remotely execute arbitrary code by ignoring OWA Outlook Web Access blocking rules.

Cybersecurity in 2023

By: seo_spec
9 January 2023 at 16:47

Companies are beginning to realize that the location of their employees and the devices they use are not as important as they used to be. The work culture will be more about what you do and not where you do it. In 2023, a hybrid world begins to develop where the barriers of the digital and real world will disappear. With flexibility being a priority for businesses and ordinary users, they face the challenge of user security and privacy as they easily change their location with multiple devices and networks and use different communication platforms. One of the most important trends that will dominate in 2023 is political or social attacks and state-sponsored cyberattacks. Political attacks can quickly damage businesses, industries, and economies, as well as cause unrest in a region.

The cloud platform and the Zero Trust method are the perfect combination to increase the security of access to every user and device, regardless of their local location. In 2023, this cybersecurity method will be actively implemented.

Clive Harby said in 2006 that this data is the new oil, but it is now routinely shared by vendors, customers and businesses. Zero Trust’s main goal is to protect this strategic asset from falling into the wrong hands.

As the use of artificial intelligence and machine learning evolve, we’re seeing new cybersecurity solutions emerge more often and help identify and respond to threats in real time. Such technologies will help organizations find and avoid attacks. Many expect technology to facilitate faster and more accurate responses to possible threats as the threat landscape evolves.

The emergence of quantum-type computers also indicates that the vulnerability of traditional forms of encryption is increasing. As a result, researchers have developed new quantum-resistant forms of security that can protect advanced computing systems. These new technologies will be crucial to securing sensitive information and methods over the coming years.

Companies, too, are beginning to view blockchain as something more than cryptocurrency. Blockchain is expected to be used to create new, innovative solutions to protect cyberspace. For example, blockchain systems can provide more secure verification of a user’s identity, and blockchain-based data stores can help protect against data leakage.

As the threat continues to grow, government and regulators are setting requirements for organizations to create appropriate cyber defenses. In 2023, expect an increased focus on cybersecurity regulation and compliance and the implementation of new requirements and guidelines to help organizations protect their system data.

As more and more devices connect to the Internet, IoT devices are becoming a serious problem. As a result, new technology is being developed to protect IoT devices from manipulation. This will be especially important in healthcare, where the security of medical devices is important.

In 2023, cyber threats will emerge in a new world, and many companies will actively use the latest technology to provide cyber protection. As a result, it is safe to assume that this trend and development will play an important role in strengthening information security in general.

Scientists have been banned from using ChatGPT in their writing

By: seo_spec
9 January 2023 at 15:47

The text created could lead to massive scandals and lawsuits between scientists. ICML leaders have banned scientists from submitting articles that are created using huge LLMs, such as ChatGPT ( ChatGPT).

Papers with generated text are forbidden if the text is not part of the experimental study of articles. However, scholars can use AI to correct text to improve its style or grammar. The ICML academies, to protect against spam, have banned the acceptance of articles created with the help of III. Note that the rules are not legally established, so they may still change in the future.

Depending on whether or not scientists adhere to the rule depends on their decision. Currently, there are no tools to effectively detect generated text, so the ICML will only rely on those who note in the process of examining suspicious documents. Generated texts often contain real errors, and authors must be heavily edited by the AI text to ensure that they are not suspicious.

Types of language models such as ChatGpt are trained on text from the Internet. They have learned to find common patterns between words to predict what to write next, using textual instructions or prompts. The question arises as to whether these systems work by plagiarizing authors? There is currently no evidence that ChatGPT directly copies the text of its article, but its results are based on human letters.

Hackers launched a cyberattack on U.S. nuclear labs

By: seo_spec
9 January 2023 at 15:26

Several U.S. nuclear research laboratories have been attacked. According to Reuters, the cyber attacks on the laboratories were carried out by Russian hackers.

According to journalists, over the course of several months in August-September 2022, terrorists attacked the Ernest Lawrence Livermore National Laboratory, the Argonne Laboratory, which is located near Chicago, Illinois, and the Brookhaven National Laboratory in Upton, New York. Among all the facilities attacked, each belongs to the U.S. Department of Energy.

According to reporters, the attacker’s initial goal was to take the scientists’ passwords, which he reached through intimidating threatening emails from employees and creating fake Lab employee pages.

Be that as it may, there have been no official answers to the question of why these sites were chosen as cyberattacks.

Dridex Trojan has a new infection method

By: seo_spec
9 January 2023 at 15:25

According to Trend Micro research, an updated version of Dridex implemented an improved technique of downloading Trojans to user devices and without masquerading as a working software.

Dridex is a Trojan that is used to introduce malware and subsequently steal bank data. The Evil Corp. group is believed to be behind the development.

Initially early companies sent phishing emails to users with Excel files inside which there were Trojan programs.

Behind the results of the Dridex analysis, which was conducted by Trend Micro, a Mach-O file was found. As you know, an early version of it appeared back in April 2019 on VirusTotal. From the beginning of its use until the end of December 2022, a total of about 67 artifacts were found. Every single one of them contained Auto-Open, a malicious macro that had the ability to run automatically when a document was opened.

The malware communicates with the server, which eventually leads to a Dridex dropper being downloaded to the infected computer.

Secure Phone and Hack Phone Android Intensive

By: seo_spec
7 January 2023 at 14:57
Download now!

β€œSECURE PHONE”

  • Let’s create a phone using ANDROID OS as an example
  • With protection against network traffic interception;
  • With notification about substitution of the base station (BS);
  • By choosing open source firmware or removing built-in backdoors (yes, yes, they’re present in almost every firmware!);
  • By encrypting it and making it resistant to forensics;
  • Discuss backup and recovery methods, as well as encryption for secure storage;
  • Talking about antiviruses for Android: are they useful and which one to choose?
  • We will highlight services of automatic caller’s number detection, as well as services of automatic call recording of GSM standard and messengers;
  • Figuring out the safest messengers of the 3 dominant types (federated, centralized, and p2p);
  • Protecting sim cards, types of root and frameworks to change OS function on the fly;
  • Using VPN for smartphone;
  • Protecting the phone’s DNS from spoofing;
  • Using firewalls for Android;
  • By protecting your smartphone from being tapped by third-party applications;
  • Safely deleting files, with a clear understanding of why you can’t give your phone to repair or sell it without first scrubbing it.

β€œHACK PHONE”

  • Phone as a pentester tool that is always on hand
  • Phone as a bootable flash drive for hacking and administering Windows;
  • Phone as a BAD UASB tool to deliver a payload;
  • Net Hunter and its installation types, directly on the phone, or as an element of Smartphone firmware;

Testing router security via Smartphone;

Setting up and optimizing Termux to work with root rights and pentester frameworks for β€œunderhand” testing

A lesson in personal cybersecurity (2022)

By: seo_spec
7 January 2023 at 14:45
Download now!

Description:

How we can help you save money and your reputation?

We’ll tell and show you by real examples:

  • Why simple and repeated passwords are dangerous
  • Who needs your data and why
  • The pitfalls of public wifi
  • How bank cards are stolen
  • Pros and cons of dual authentication
  • How to easily access your phone
  • What smart homes and assistants keep quiet about

    Also, let’s talk about topics:

    • Digital Hygiene
    • Antivirus, VPN and other protection
    • Online extortion
    • Surveillance of intelligence services and not only
    • Who needs your intimate photos
    • Online porn, dangers and precautions
  • Network vulnerability analysis

    By: seo_spec
    7 January 2023 at 14:30
    Download now!

    Description:

    If you want to learn how to defend or attack networks, one of the most important thing is the ability to detect and analyze vulnerabilities in systems or networks.

    In this course, you will learn how to follow a systematic process and use it to detect and handle potential vulnerabilities. At . first, you’ll learn passive and active scanning techniques for vulnerabilities. Next, you’ll learn how to extract the results from the data and analyze them to identify vulnerabilities that can be attack, or identify risks that need to be minimize. Finally, you’ll learn how to apply the three most popular vulnerability scanners and compare them with each other. At the end of the course, you will have have the knowledge and skills needed to identify vulnerabilities and take take action.

    Course content:

    • Introduction
    • Preparing the tools
    • Virtual Machines
    • OWASP Broken Web Applications
    • Metasploitable 2
    • Nmap
    • Vulnerability scanning methodology
    • Search targets to work around without penetration
    • Find targets to work around with penetration
    • Port and service discovery/scanning
    • Vulnerability detection
    • Find Internet vulnerabilities effectively
    • Types of vulnerability scans
    • Passive scan
    • Active scan
    • Vulnerability scanning

    Advanced anonymity on the Internet from scratch

    By: seo_spec
    7 January 2023 at 14:18
    Download now!

    A course for those who care about anonymity online

    You will learn how to:

    • Install and configure Linux Mint
    • Work with VPN
    • Install and configure Whonix Workstation and Whonix Gateway in a virtual machine
    • Set up a browser on Whonix Workstation
    • Hacking Wi-Fi
    ❌
    ❌