Tag: tor

Credit card -stealing trojan 'offers better protection than Tor' 
By Adam Greenberg | Nov 22, 2013 | Comment Now 
i2Ninja sold on a Russian cyber crime forum.
 
FBI Tor server takeover leads to arrest 
By Adam Greenberg | Sep 17, 2013 | Comment Now 
Irishman charged with distributing child pornography.
 
Botnet likely behind massive Tor user spike 
By Adam Greenberg | Sep 12, 2013 | Comment Now 
Userbase boomed from 500,000 users to 3.5 million in a month.
 
Questions over Tor exploit link to US Govt 
By Darren Pauli | Aug 8, 2013 | Comment Now 
IP checks used dated methods.
 
Claims Tor malware linked NSA 
By Adam Greenberg | Aug 6, 2013 | Comment Now 
IP space traced.
 
Facebook blocked Tor 
By Dan Kaplan | Jun 19, 2013 | Comment Now 
Malicious activity tripped site integrity systems.
 
Ballot-stuffing bot hits News Ltd polls 
By Darren Pauli | Feb 12, 2013 | Comment Now 
Security efforts foiled.
 
Tor exit node operator raided by police 
By Darren Pauli | Nov 30, 2012 | Comment Now 
Says child pornography requests were Tor traffic.
 
Police struggle with online drug networks 
By Darren Pauli | Sep 11, 2012 | Comment Now 
Report paints bleak picture for narcotics enforcement.
 
Aussie coppers bedeviled by online contraband networks 
By Darren Pauli | Sep 10, 2012 | Comment Now 
War on the Silk Road requires legal barriers dismantled and police technical skills to be mapped.
 
Cryptoparty goes viral 
By Darren Pauli | Sep 4, 2012 | Comment Now 
Pen testers, privacy geeks spread security to the masses.
 
Tor Project mulls $100 cheque for exit relay hosts 
By Darren Pauli | Jul 25, 2012 | Comment Now 
Payments could speed up and secure the network.
 
Cyberoam hacked private key posted online 
By Darren Pauli | Jul 12, 2012 | Comment Now 
Tor users extract and decrypt private key.
 
Cyberoam generates fix for 'nullified' vulnerability 
By Darren Pauli | Jul 11, 2012 | Comment Now 
Generates unique certificates.
 
Cyberoam: "Not a mass surveillance device" 
By Darren Pauli | Jul 9, 2012 | Comment Now 
Company refutes TorProject claims private keys can be extracted.
 
Cyberoam intercept flaw puts enterprises at risk 
By Darren Pauli | Jul 5, 2012 | Comment Now 
Deep packet inspection boxes spy on staff.
 
VPN boon as young Swedes seek anonymity 
By Liam Tung | May 3, 2012 | Comment Now 
Tough anti-piracy laws or 'big brother' paranoia?
 
Trojan talks over Tor 
By Darren Pauli | Jun 29, 2011 | Comment Now 
Malware traffic gets anonymised, encrypted.
 
Egyptians turn to Tor to organise dissent online 
By Nate Cochrane | Feb 2, 2011 | Comment Now 
US Senate to debate 'internet kill switch' to give Obama powers like Mubarak's.
 
Verizon launches hacki-leaks 
By Liam Tung | Nov 15, 2010 | Comment Now 
Share your shame but not your name.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  24%
 
Application integration concerns
  2%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 560

Vote