Tag: tor

Biggest ever Tor raid sees 16 arrested 
Nov 10, 2014 | Comment Now 
Underground sites targeted.
 
Tor attack may have unmasked users 
Jul 31, 2014 | Comment Now 
Researchers suspected of altering traffic.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Black Hat cancels talk on how to crack Tor 
Jul 22, 2014 | Comment Now 
Research not approved for public release.
 
Credit card -stealing trojan 'offers better protection than Tor' 
By Adam Greenberg | Nov 22, 2013 | Comment Now 
i2Ninja sold on a Russian cyber crime forum.
 
FBI Tor server takeover leads to arrest 
By Adam Greenberg | Sep 17, 2013 | Comment Now 
Irishman charged with distributing child pornography.
 
Botnet likely behind massive Tor user spike 
By Adam Greenberg | Sep 12, 2013 | Comment Now 
Userbase boomed from 500,000 users to 3.5 million in a month.
 
Questions over Tor exploit link to US Govt 
By Darren Pauli | Aug 8, 2013 | Comment Now 
IP checks used dated methods.
 
Claims Tor malware linked NSA 
By Adam Greenberg | Aug 6, 2013 | Comment Now 
IP space traced.
 
Facebook blocked Tor 
By Dan Kaplan | Jun 19, 2013 | Comment Now 
Malicious activity tripped site integrity systems.
 
Ballot-stuffing bot hits News Ltd polls 
By Darren Pauli | Feb 12, 2013 | Comment Now 
Security efforts foiled.
 
Tor exit node operator raided by police 
By Darren Pauli | Nov 30, 2012 | Comment Now 
Says child pornography requests were Tor traffic.
 
Police struggle with online drug networks 
By Darren Pauli | Sep 11, 2012 | Comment Now 
Report paints bleak picture for narcotics enforcement.
 
Aussie coppers bedeviled by online contraband networks 
By Darren Pauli | Sep 10, 2012 | Comment Now 
War on the Silk Road requires legal barriers dismantled and police technical skills to be mapped.
 
Cryptoparty goes viral 
By Darren Pauli | Sep 4, 2012 | Comment Now 
Pen testers, privacy geeks spread security to the masses.
 
Tor Project mulls $100 cheque for exit relay hosts 
By Darren Pauli | Jul 25, 2012 | Comment Now 
Payments could speed up and secure the network.
 
Cyberoam hacked private key posted online 
By Darren Pauli | Jul 12, 2012 | Comment Now 
Tor users extract and decrypt private key.
 
Cyberoam generates fix for 'nullified' vulnerability 
By Darren Pauli | Jul 11, 2012 | Comment Now 
Generates unique certificates.
 
Cyberoam: "Not a mass surveillance device" 
By Darren Pauli | Jul 9, 2012 | Comment Now 
Company refutes TorProject claims private keys can be extracted.
 
Cyberoam intercept flaw puts enterprises at risk 
By Darren Pauli | Jul 5, 2012 | Comment Now 
Deep packet inspection boxes spy on staff.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 1069

Vote