Useful articles


ring-of-keys-on-encrypted-code

What is PGP?

PGP (Pretty good Privacy) is the most widely recognized public key encryption program in the world. It can be used to protect the privacy of email, data files, drives and instant messaging. Traffic on the…


timthumb

Setting up a hidden service with Nginx

Setting up a hidden service is not difficult, despite all the headlines lately of major busts and it often being referred to as the “dark net”. In this quite short guide, we have the very…


072715_1300_Hackerssell1-1024x0-c-default

Hackers Selling Healthcare Data in the Black Market

With the drastic increase in Cyber Crime, the healthcare industry is a potential target for data hungry hackers. Patient safety may not directly relate to data security, but an individual’s personal health information includes everything…


CardingProcess01142014-1024x0-c-default

Introduction to the Business of Stolen Card Data

Introduction I receive many questions from people who don’t work in the security field about the use of stolen credit card data in the cyber-crime ecosystem, so I decided to provide more information, starting from…