Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How Simply Browsing The Internet Gives Scammers An Advantage – And What You...

Data privacy has become one of the most talked about topics in 2023. According to recent statistics, the data brokering industry is now worth around $200 billion, with a CAGR growth rate of 5.6%,...

View Article


Image may be NSFW.
Clik here to view.

Exploring the Dark Web: Unveiling its Dual Nature of Good and Evil

Freedom of speech is one of the fundamental human rights. It took a long time in human history to be developed to this stage of freedom and openness. With the advancement of the different technologies...

View Article


Image may be NSFW.
Clik here to view.

Slicing the Onion: An introduction to the Onion Routing

When you first searched for information about terms like “Tor network”, “deep web” or “dark web” you probably ended up learning two main key characteristics about this world: 1) The Tor network is the...

View Article

Image may be NSFW.
Clik here to view.

The Bring Your Own Device (BYOD) Dilemma

The use of personal mobile devices like smartphones and tablets in the workplace, known as “bring your own device” (BYOD), has become ubiquitous. But this perceived convenience and flexibility comes...

View Article

Image may be NSFW.
Clik here to view.

AI and the War on Trust

The AI Revolution A revolution of Artificial Intelligence has occurred in the past few years, leapfrogging previous machine learning systems, with LLMs (Large Language Models) taking front and center...

View Article


Image may be NSFW.
Clik here to view.

Multi-Factor Identification and AI Tools

Introduction In the modern world of computers and the internet, where vital information can be shared with a single click, protecting our online identities has become of the uttermost importance. With...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Defensive and Offensive AI in Cybersecurity

In the ever-changing landscape of cybersecurity, the conflict between criminal actors seeking to exploit vulnerabilities and defenders working on protecting systems and networks has become...

View Article

Image may be NSFW.
Clik here to view.

How to protect yourself on the deep web: Tools, evaluation, legality and...

This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be an unsafe place and navigating it without the proper tools could get you in trouble....

View Article


Image may be NSFW.
Clik here to view.

The Social dangers of the dark web

Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice and hosts all sorts of anti-social and deviant ideas. Whether it be...

View Article


Image may be NSFW.
Clik here to view.

"I've observed a prevailing misconception surrounding the Dark Web" -...

How did you first become aware of the dark web, and what sparked your interest in it? My interest in the various threats and approaches to securing cyberspace began in the late 2000s, but it truly...

View Article

Image may be NSFW.
Clik here to view.

How to use the deep web as a force for good: Internet 2.0, Hyperreality and...

Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep web as a force for good, effectively distancing it from the dark web. This...

View Article

Image may be NSFW.
Clik here to view.

Leveraging AI in Cybersecurity: Transforming Threat Detection, Prevention,...

In an era of accelerating digital transformation, emerging challenges cast a shadow over technological advancements. Among them, cybersecurity threats are rapidly becoming more complex and harmful....

View Article
Browsing all 612 articles
Browse latest View live