Dark web News
December 12, 2017
A massive repository containing more than 1.4 billion stolen credentials was found on the dark web with special features for malicious actors.
November 09, 2017
New court documents indicate an FBI hacking operation may have crossed international borders and infected systems in Russia, China and Iran.
March 06, 2017
A new cybersecurity report used a hacker survey to offer a perspective on IT that can often be overlooked and found there may not be any easy answers.
February 17, 2017
At RSAC, former Tor Project CEO Andrew Lewman explains the latest research into darknet technology and how that tech continues to evolve as an attack vector.
Dark web Get Started
Bring yourself up to speed with our introductory content
A dark post is an inexpensive sponsored message on a social media website that is not published to the sponsor page timeline and will not display in follower feeds organically. Continue Reading
Bill Caraher, CIO and director of operations for a Wisconsin law firm, is one believer in the huge impact blockchain technology -- a peer-to-peer distributed network used to validate transactions and other records -- can have on legal services. Blockchain implementations, he said, could "lead to speedier resolutions, [and] it could lead to better evidence gathering [and to establishing] foundation for a case" and have other "sweeping implications" for this industry. Indeed, the technology's potential use cases are a hot talking point among Caraher and fellow observers of blockchain -- but figuring out which use cases make sense and putting them into action demand a lot of work. The effort involved in implementing blockchain will depend on many factors, including vertical industry, having the right software and hardware, and more.
In this issue of CIO Decisions, Editorial Director Sue Troy lays out the four key stages of blockchain implementations, including identifying use cases, running proofs of concept and launching field trials. Plus, we explore how one healthcare CIO used cloud computing to bridge the disconnect between IT and patient care; get MIT Sloan cybersecurity expert Stuart Madnick's take on how to build a better defense against dark web hackers; and delve into innovative ways to close the tech skills gap.Continue Reading
The Tor (the onion routing) browser is a web browser designed for encrypted, anonymous web surfing and protection against traffic analysis.TOR was originally developed by and for the United States Navy to protect sensitive U.S. government communications. Continue Reading
Evaluate Dark web Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Darkleech campaigns have taken a new form and have now stopped using obfuscated script. Expert Nick Lewis explains the changes in Darkleech operations to watch for. Continue Reading
During the 2006 E. coli outbreak, it took the U.S. Food and Drug Administration and the Centers for Disease Control and Prevention three weeks from the first report of the outbreak to announce that the culprit was spinach from a particular supplier. Had the Internet of Things been in place, however, it would have taken a lot less time to track and trace the implicated product, suggests Michael Coene, executive adviser at Booz Allen Hamilton. And this is only one example of the numerous possible IoT applications in food supply chains.
In this issue of CIO Decisions, Senior Site Editor John Moore details the various potential IoT applications for reducing food safety problems and other issues inherent in the food supply chain. Plus, we break down how VDI technology helped one blood supply provider become more efficient, decrease blood wastage costs and potentially save more lives; sit down with the United Nations' CITO to discuss how she plans to innovate the organization's IT group and combat the dark Web; and get an organizational agility expert's take on how to successfully carry out a reorganization.Continue Reading
Is a cloud bridge right for your enterprise? Learn what a cloud bridge is and the benefits it can offer, as well as when you might consider using one in the workplace. Continue Reading
Manage Dark web
Learn to apply best practices and optimize your operations.
Etay Maor, executive security advisor at IBM, discusses the growing ransomware threat and why IoT could be the next ransomware target. Continue Reading
ICIT Fellow Robert Lord discusses the exploitation of protected health information on the deep web and gives cybersecurity tips on how to best protect these valuable records. Continue Reading
Healthcare organizations can protect patient data from breaches with a three-layered approach that combines traditional and advanced protection features. Continue Reading
Problem Solve Dark web Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Stampado ransomware is a low-cost threat to networks and external drives. Expert Matthew Pascucci explains how Stampado works and how enterprises should handle it. Continue Reading
Organizations are getting better at defending against cyberattacks, says MIT Sloan's Stuart Madnick, but dark Web hackers maintain an edge. He explains why. Continue Reading
A command and control server for the "Gh0st" malware campaign went undetected for two years, according to security researchers. Expert Nick Lewis explains how it happened. Continue Reading