Tuesday, July 7, 08:59
Home inet Data protected by https is in the Dark Web!

Data protected by https is in the Dark Web!

Transferring data from computer to server are exposed to hackers in Dark Web.

According to the Georgia State University and Surrey University, Dark Web has a large market for SSL and Transport Layer Security (TLS) certificates, security technology (https protocol) that protects the transfer of data and information between computers and servers. As the researchers point out, even the most secure data files used for confidential communication between the server and the computers are immediately accessible by hackers.

Networked machines use security keys and SSL and TLS certificates to identify them when they are connected to each other, such as users' user names and passwords to connect to the Internet.

These certificates can now be found on darknet and even include a wide range of crime tools that provide hackers with machine IDs used by themselves to violate websites to track encrypted traffic, attack, and steal sensitive data.

Dark web

According to David Maimon, Associate Professor at the State University of Georgia, interest has been attributed to the fact that TLS certificates are available in darknet services (eg web design services) that offer hackers direct access to reliable sources of information, Internet. In addition, their sales price was very economical, but included extensive validation certificates and all the necessary documents to create a credible "showcase" of the company without requiring verification information.

In a search on the Dark Web, 2,943 reports were found on SSL and 75 certificates on TLS. In the meantime, only 531 references to ransomware were found.

According to Kevin Bocek, vice president of security and information threat to the computer security company Venafi, "Every organization should be worried about the fact that certificates used to create and maintain online privacy are now sold and used as weapons in the hands of cyber criminals. "


Please enter your comment!
Please enter your name here


Windows 10 2004: Unauthorized settings "block" the upgrade

Users report that they have a problem with Windows 10, since they are excluded from the application of the May 2020 update, when they manually attempt to ...

Lenovo is improving Linux ThinkPads but the problems remain

Last month, when Lenovo announced that it was going to certify the ThinkPad series for use with Linux operating systems, we thought directly ...

Nigerian accused of fraud against US companies

A Nigerian was taken to the federal court in Chicago on Friday, after being accused of coordinating an international cyber fraud system, which affected ...

Home routers display critical errors and run unpatched Linux

The German Fraunhofer Communication Institute (FKIE) conducted a survey that included 127 home routers from seven different brands, in an effort to ...

IPhone 12 release: Will we finally see it by the end of 2021?

New data on the release of the iPhone 12, which we all expect not to happen in September, say that it will only be delayed ...

MySQL: Replaces terms that reinforce racial discrimination

MySQL database developers have announced that they will be replacing terminology such as master, slave, blacklist, and whitelist.

The CEO of a cryptocurrency investment company was cheating

As reported by News24, Willie Breedt, the founder of VaultAge Solutions (cryptocurrency investment company), declared bankruptcy last week and the ...

United Kingdom: Will it exclude Huawei from its 5G networks?

The UK government has received an NCSC report on Huawei, which may change its policy ...

A Yahoo engineer is not in jail after hacking 6.000 accounts

A former Yahoo engineer has been sentenced to five years in prison for hacking into personal accounts ...

PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices Two days after the release of updates on critical vulnerability on F5 ...