Tag: tor

Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
Black Hat cancels talk on how to crack Tor 
Jul 22, 2014 | Comment Now 
Research not approved for public release.
Credit card -stealing trojan 'offers better protection than Tor' 
By Adam Greenberg | Nov 22, 2013 | Comment Now 
i2Ninja sold on a Russian cyber crime forum.
FBI Tor server takeover leads to arrest 
By Adam Greenberg | Sep 17, 2013 | Comment Now 
Irishman charged with distributing child pornography.
Botnet likely behind massive Tor user spike 
By Adam Greenberg | Sep 12, 2013 | Comment Now 
Userbase boomed from 500,000 users to 3.5 million in a month.
Questions over Tor exploit link to US Govt 
By Darren Pauli | Aug 8, 2013 | Comment Now 
IP checks used dated methods.
Claims Tor malware linked NSA 
By Adam Greenberg | Aug 6, 2013 | Comment Now 
IP space traced.
Facebook blocked Tor 
By Dan Kaplan | Jun 19, 2013 | Comment Now 
Malicious activity tripped site integrity systems.
Ballot-stuffing bot hits News Ltd polls 
By Darren Pauli | Feb 12, 2013 | Comment Now 
Security efforts foiled.
Tor exit node operator raided by police 
By Darren Pauli | Nov 30, 2012 | Comment Now 
Says child pornography requests were Tor traffic.
Police struggle with online drug networks 
By Darren Pauli | Sep 11, 2012 | Comment Now 
Report paints bleak picture for narcotics enforcement.
Aussie coppers bedeviled by online contraband networks 
By Darren Pauli | Sep 10, 2012 | Comment Now 
War on the Silk Road requires legal barriers dismantled and police technical skills to be mapped.
Cryptoparty goes viral 
By Darren Pauli | Sep 4, 2012 | Comment Now 
Pen testers, privacy geeks spread security to the masses.
Tor Project mulls $100 cheque for exit relay hosts 
By Darren Pauli | Jul 25, 2012 | Comment Now 
Payments could speed up and secure the network.
Cyberoam hacked private key posted online 
By Darren Pauli | Jul 12, 2012 | Comment Now 
Tor users extract and decrypt private key.
Cyberoam generates fix for 'nullified' vulnerability 
By Darren Pauli | Jul 11, 2012 | Comment Now 
Generates unique certificates.
Cyberoam: "Not a mass surveillance device" 
By Darren Pauli | Jul 9, 2012 | Comment Now 
Company refutes TorProject claims private keys can be extracted.
Cyberoam intercept flaw puts enterprises at risk 
By Darren Pauli | Jul 5, 2012 | Comment Now 
Deep packet inspection boxes spy on staff.
VPN boon as young Swedes seek anonymity 
By Liam Tung | May 3, 2012 | Comment Now 
Tough anti-piracy laws or 'big brother' paranoia?
Sign up to receive iTnews email bulletins
Latest Comments
In which area is your IT shop hiring the most staff?

   |   View results
IT security and risk
Sourcing and strategy
IT infrastructure (servers, storage, networking)
End user computing (desktops, mobiles, apps)
Software development

Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results