Deliver Your News to the World

DarkCyber for September 25, 2018, Now Available

This week’s DarkCyber video news program covers… Essential hacking tools… Online game money laundering methods… Verizon’s case studies of cyber crime exploits… and how to obtain a custom Tor Onion url.


Louisville, Kentucky, US – WEBWIRE
Dark Web Notebook provides information for security, law enforcement, and intelligence officers about the Dark Web. Information about access procedures and operational details are explained.
Dark Web Notebook provides information for security, law enforcement, and intelligence officers about the Dark Web. Information about access procedures and operational details are explained.

Stephen E Arnold, author of Dark Web Notebook (published in 2017), said, “The Verizon report contains information of value for security and law enforcement personnel. Unfortunately, this type of explanatory information provides bad actors with important insights into specific methods are effective when attacking an organization or an individual.”

DarkCyber for September 25, 2018, is now available at www.arnoldit.com/wordpress and on Vimeo at https://vimeo.com/291347184 .
 
Stephen E Arnold’s DarkCyber is a weekly video news and analysis program about the Dark Web and lesser known Internet services.
This week’s program covers four Dark Web and security related stories.
 
The first story answers the question, “What are some essential programs for my hacking toolkit. DarkCyber identifies eight tools used by an ethical hacker and provides links to these programs. Each program performs a specific function and delivers information about passwords, system configuration, and other items of information associated with a target.
 
The second story explores a money laundering method implemented via online games. By exploiting the allegedly lax credit card verification methods used by Apple and other online game sellers, bad actors can use a stolen card to purchase digital assets sold within an online game. The assets can enhance the game play of the purchaser by activating special powers and other features. These digital assets can then be resold with the payments directed to an encrypted and allegedly anonymous digital currency wallet. DarkCyber notes that few parents and some game players are unaware of this scam.
 
The third story takes a look at Verizon’s detailed analysis of cyber crime exploits. The free report provides “how to” instructions for undertaking social engineering, hardware attacks, and malware attacks. The report includes detailed tables and appendices with additional cyber crime information. Stephen E Arnold, author of Dark Web Notebook, said, “The Verizon report contains information of value for security and law enforcement personnel. Unfortunately, this type of explanatory information provides bad actors with important insights into specific methods are effective when attacking an organization or an individual.”

The final story explains how to create a custom Tor Onion URL. Instead of a string of incomprehensible letters and numbers, DarkCyber reviews a method for generating a more easily recognized URL like “bobsbankxxxxxxxx. The procedure taps an open source software program and specific operational types created by a security expert. The video includes the site locations for the software and the instructional article.

About Stephen E Arnold

Stephen E Arnold is the author of “Dark Web Notebook” and “CyberOSINT: Next Generation Information Access.” This book describes some of the technologies used by GSR and Cambridge Analytica to acquire and analyze Facebook user data. He has been named as a technology adviser to the UK based Judicial Commission of Inquiry into Human Trafficking and Child Sex Abuse.” Mr. Arnold also lectures to law enforcement and intelligence professionals who will be attending the September 2018 Telestrategies ISS conference in Washington, DC, in September 2018. In recent months, he has shared his research with law enforcement and intelligence professionals in the US and Europe. His most recent lectures focus on deanonymizing chat and digital currency transactions. One hour and full day programs are available via webinars and on-site presentations. He publishes the free Web log “Beyond Search,” which is available at www.arnoldit.com/wordpress.


( Press Release Image: https://photos.webwire.com/prmedia/45623/228922/228922-1.jpg )


WebWireID228922




 
 cyber crime
 Dark Web
 Tor
 case studies
 hacking


This news content may be integrated into any legitimate news gathering and publishing effort. Linking is permitted.

News Release Distribution and Press Release Distribution Services Provided by WebWire.