Remove Computer and Electronics Remove Government Remove Study
article thumbnail

Scraping the TOR for rare contents

Security Affairs

First of all you need an exceptional computational power (RAM mostly) for letting multiple runners grab web-pages, extracting new links and re-run the scraping-code against the just extracted links. I am a computer security scientist with an intensive hacking background. Scraping the “TOR hidden world” is a quite complex topic.

article thumbnail

Cyber Threats Observatory Gets Improvements

Security Affairs

Collecting everything coming from their execution and clustering on strings similitude would highlight several stereotypes that would be interesting for further studies or similitude blocking lists. Studying stereotypes would be useful to analyze similarities in clusters. The following image shows the current deployment state.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Cybersecurity in Context: A Policy-Oriented Comparative Analysis

Security Affairs

Thus, the very pervasiveness of digitalisation has made cybersecurity no longer only a matter of concern for computer scientists but a central transversal factor in securitising our future digital society. All this has contributed to creating a new and broader concept of ’cyberspace’, where the notion of security is increasingly relevant.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

When you press the power button you are providing the right power to every electronic chips who needs it. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. How the PC boot process works ? Used tools.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. prison system and deported back to Vietnam, Ngo is currently finishing up a mandatory three-week COVID-19 quarantine at a government-run facility. Secret Service.

article thumbnail

Iranian Threat Actors: Preliminary Analysis

Security Affairs

Nowadays Iran’s Cybersecurity capabilities are under the microscope, experts warn about a possible infiltration of the Iranian government. agencies and security experts warn about a possible cybersecurity infiltration from Iranian government and alert to increase cybersecurity defensive levels.

article thumbnail

Mastering Communication in Cyber Intelligence Activities: A Concise User Guide

Security Affairs

The term cyber refers, by and large, to the virtual world of ICT, the Internet and computers. A study on Cooperative Models for Information Sharing and Analysis Centers (ISACs) , published by the ENISA in 2017, proposes specific patterns for information sharing and good practices about physical and cyber threats, including mitigation.