Posts

Showing posts from December, 2022

A quick word on the dark web.

Have you ever heard of the dark web? Of course you have! Still, it's a mysterious and largely uncharted part of the internet that can only be accessed using specialized software like the TOR network. While some people use the dark web for legitimate purposes, it's also a hotbed of cybercriminal activity. One thing you'll find being traded on the dark web is stolen data. This is often data that has been obtained through data breaches, which are attacks that involve the theft of sensitive personal and financial information. These breaches can happen through unsecured databases, insecure communication protocols, or malicious insiders. Stolen data is typically sold on underground marketplaces that are only accessible through the use of TOR and other anonymity tools. These marketplaces often have complex security protocols in place to avoid detection by law enforcement and security researchers. In addition to underground marketplaces, stolen data is also often shared on pa...

Password Management 101. Part B: A quick what if in a hypothetical Data Breach

Image
 The Dangers of Reusing Passwords: An Entirely Hypothetical Scenario. Imagine that you're a hacker looking to gain access to someone's online accounts. You've come across a list of passwords that were recently leaked in a data breach, and you notice that one of the passwords is one that you've seen before - it's a password that you've used on a few of your own accounts and its also linked to a target of yours. You decide to try using this password to see if it works on any other accounts. You start by searching for the person's email address online, and you quickly find their social media profiles. You try logging into their social media accounts using the password from the data breach, and to your surprise, it works. Now that you have access to their social media accounts, you start digging deeper. You look through their posts and profile information to see what you can learn about them. You notice that they've posted about their recent vacation to Hawa...

Password Mangement 101. Part A: Why a password manager.

Password Management for Beginners: Why Reusing Passwords is a Major Security Risk If you're like most people, you probably have a lot of online accounts - from social media to online shopping to banking. Keeping track of all of these accounts and their corresponding passwords can be a hassle, so it's tempting to use the same password for multiple accounts. But this is a major security risk. If one of your accounts is compromised, the attacker can then try using that same password to gain access to your other accounts. One way that hackers can gain access to your passwords is through data breaches. These are instances where a company's database is hacked and sensitive information, including user passwords, is stolen. Once the hacker has access to this information, they can try using the stolen passwords to gain access to other accounts that use the same password. One way to protect against password reuse and data breaches is to use a password manager, which stores all of you...

A quick run down on Open Source Intelligence and Online Investigative Techniques

Open source intelligence (OSINT) is the process of collecting, analyzing, and disseminating information that is publicly available and legally obtainable. It is a powerful tool for research, investigations, decision making, and intelligence gathering, as it allows individuals and organizations to gather and analyze a wide range of publicly available information in a cost-effective and legally obtainable manner. There are many different sources of open source intelligence, including online news articles, social media, government websites, and public records. To effectively gather and analyze OSINT, it is important to have a systematic approach and to ensure you use a variety of tools and techniques. This will include using search engines, social media platforms, and specialized OSINT tools such as Maltego, Recon-ng and Shodan. It is also important to verify and validate the information you gather through OSINT, using multiple sources and considering any potential biases, agendas and bei...

VPN & Proxy Servers. Being realistic with our protections.

Virtual private networks (VPNs) and proxy services are two common tools that can be used to protect your online activity and enhance your online privacy. In this post, we'll take a closer look at how these services work and the benefits they offer, with a focus on the benefits of using a VPN. What is a VPN? A VPN is a service that encrypts your internet connection and routes it through a server in a different location. This has several benefits, including: Hiding your IP address: Your IP address is a unique identifier that can be used to track your online activity. By connecting to a VPN, you can mask your IP address and make it more difficult for others to track your online activity. Bypassing censorship: Some countries and organizations block certain websites or content. By using a VPN, you can bypass these restrictions and access blocked content. Enhancing security: Encrypting your internet connection can help protect your data from being intercepted by hackers or other maliciou...

Welcome to the Investigator515 blog!

  Welcome to The Investigator515 blog! As a seasoned investigator with over 17 years of experience working for corporate and government clients, I'm excited to bring my knowledge and expertise to this blog. We're here to help give people what they need to assist them in staying safe and informed online. Here at Investigator515, we're passionate about sharing valuable insights and resources related to open source intelligence techniques, (OSINT), investigative techniques for managing and processing data, cybersecurity for beginners and online safety. Whether you're a journalist, law enforcement officer, osint nerd or simply someone looking to stay safe online, we believe that everyone can benefit from the information and tools we'll be sharing on this blog. We'll cover a wide range of topics, from the basics of OSINT and data analysis to advanced techniques for protecting your online privacy and staying safe from cyber threats. We hope you'll join us on this ...

ad social bar