article thumbnail

The Origins and History of the Dark Web

Identity IQ

2002 – 2006: Origins of the Tor Project After onion routing was patented, additional computer scientists joined the original development team in 2002 and created the biggest project for onion routing yet: The Onion Routing Project, now commonly known as the Tor Project. Navy patented onion routing in 1998.

article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

Today’s innovations and technologies provide tremendous opportunities for enterprises. Along with innovation and technology proliferation, new challenges that will shape business during 2020. In addition, malicious actors can and will adopt technologies such as AI and machine learning faster than security leaders can.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Jeff Moss on the Evolution of Hacking at SecTor 2021

ForAllSecure

In the dot.com era, 1994-2002, this was the time of the commercial internet, the rise of search engines, and internet browsers. In the Coming of Age era, 2005-2019, provided "free" long distance and "free" internet access, we're always online, but this gives rise to surveillance capitalism. He said security work is that like that.

Hacking 52
article thumbnail

Is Apple’s Safari browser the last, best hope for web privacy?

Malwarebytes

So instead of being logged into the giant surveillance monster while you were using its websites, you were logged into the giant surveillance monster all the time, unless you remembered to log out of the browser, which of course you didn’t, because people just don’t think about logging in and out of their browser.

Marketing 114
article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

Vamosi: In 2002, I wrote an article for ZDNET titled “Jail Time is Not The Answer to Cyber Crime.” ” I wrote about the pending Cyber Security Enhancement Act of 2002 (CSEA) and said: “ The problem with this legislation is that it's often very difficult to determine who is responsible for any given cybercrime.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

VAMOSI: Here’s former US Attorney General John Ashcroft in 2002. And we give them different goals and tasks, you know, so some of the things that I do ask for to begin with, like what are you doing in your free time at home with technology? How do you use technology in your own personal life to make it better?

Hacking 40
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. AllegisCyber Capital. Evolution Equity Partners. EEP Investments.