Tags: karmaRemove, torRemove

Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Black Hat cancels talk on how to crack Tor 
Jul 22, 2014 | Comment Now 
Research not approved for public release.
 
Credit card -stealing trojan 'offers better protection than Tor' 
By Adam Greenberg | Nov 22, 2013 | Comment Now 
i2Ninja sold on a Russian cyber crime forum.
 
FBI Tor server takeover leads to arrest 
By Adam Greenberg | Sep 17, 2013 | Comment Now 
Irishman charged with distributing child pornography.
 
Botnet likely behind massive Tor user spike 
By Adam Greenberg | Sep 12, 2013 | Comment Now 
Userbase boomed from 500,000 users to 3.5 million in a month.
 
Questions over Tor exploit link to US Govt 
By Darren Pauli | Aug 8, 2013 | Comment Now 
IP checks used dated methods.
 
Claims Tor malware linked NSA 
By Adam Greenberg | Aug 6, 2013 | Comment Now 
IP space traced.
 
Facebook blocked Tor 
By Dan Kaplan | Jun 19, 2013 | Comment Now 
Malicious activity tripped site integrity systems.
 
Ballot-stuffing bot hits News Ltd polls 
By Darren Pauli | Feb 12, 2013 | Comment Now 
Security efforts foiled.
 
Tor exit node operator raided by police 
By Darren Pauli | Nov 30, 2012 | Comment Now 
Says child pornography requests were Tor traffic.
 
Police struggle with online drug networks 
By Darren Pauli | Sep 11, 2012 | Comment Now 
Report paints bleak picture for narcotics enforcement.
 
Aussie coppers bedeviled by online contraband networks 
By Darren Pauli | Sep 10, 2012 | Comment Now 
War on the Silk Road requires legal barriers dismantled and police technical skills to be mapped.
 
Cryptoparty goes viral 
By Darren Pauli | Sep 4, 2012 | Comment Now 
Pen testers, privacy geeks spread security to the masses.
 
Tor Project mulls $100 cheque for exit relay hosts 
By Darren Pauli | Jul 25, 2012 | Comment Now 
Payments could speed up and secure the network.
 
Cyberoam hacked private key posted online 
By Darren Pauli | Jul 12, 2012 | Comment Now 
Tor users extract and decrypt private key.
 
Cyberoam generates fix for 'nullified' vulnerability 
By Darren Pauli | Jul 11, 2012 | Comment Now 
Generates unique certificates.
 
Cyberoam: "Not a mass surveillance device" 
By Darren Pauli | Jul 9, 2012 | Comment Now 
Company refutes TorProject claims private keys can be extracted.
 
Cyberoam intercept flaw puts enterprises at risk 
By Darren Pauli | Jul 5, 2012 | Comment Now 
Deep packet inspection boxes spy on staff.
 
VPN boon as young Swedes seek anonymity 
By Liam Tung | May 3, 2012 | Comment Now 
Tough anti-piracy laws or 'big brother' paranoia?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 702

Vote