searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Tor

Get our top stories in your inbox

Mozilla fights in court to get info about potential Firefox flaw

May 12, 2016

Mozilla has asked a Washington State District Court to compel FBI investigators to provide details about a vulnerability in the Tor Browser with them before they share it with …

Former Tor developer helped the FBI unmask Tor users

April 28, 2016

A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to …

Dark web mapping reveals that half of the content is legal

April 8, 2016

A recent global survey commissioned by the Centre for International Governance Innovation (CIGI) showed that seven in ten (71%) global citizens say the “dark net” – …

Subgraph OS: Open source, hardened OS that prioritizes security and anonymity

April 5, 2016

Subgraph, an open source security company based in Montreal, has published the alpha release of Subgraph OS, which is designed to with security, anonymity AND usability in …

Tor Project exploring ways to keep its software and users safe

March 22, 2016

In view of the recent legal battle between the FBI and Apple regarding phone encryption, and this article revealing that there have been many instances where the US Department …

New ways to fingerprint Tor Browser users discovered

March 11, 2016

Users who want to remain anonymous online often opt for using the Tor Browser, which hides their real IP address, but there are techniques that (more or less) malicious actors …

FBI subpoenaed Carnegie Mellon University for Tor-using suspect’s IP address

February 25, 2016

A court order in the case of U.S. vs Brian Farrell, a man charged with conspiracy to distribute illegal drugs while he was allegedly an administrator of the Silk Road 2.0 …

Tor Project claims FBI paid university researchers $1m to unmask Tor users

November 12, 2015

Have Carnegie Mellon University researchers been paid by the FBI to unmask a subset of Tor users so that the agents could discover who operated Silk Road 2.0 and other …

Posts navigation

1 2 3

Featured news

  • Python packages with malicious code expose secret AWS credentials
  • OT security: Helping under-resourced critical infrastructure organizations
  • How phishing attacks are becoming more sophisticated
Webinar: What’s trending in email security?

What's new

OT security: Helping under-resourced critical infrastructure organizations

How phishing attacks are becoming more sophisticated

Python packages with malicious code expose secret AWS credentials

Clearview fine: The unacceptable face of modern surveillance

Don't miss

Python packages with malicious code expose secret AWS credentials

OT security: Helping under-resourced critical infrastructure organizations

How phishing attacks are becoming more sophisticated

Clearview fine: The unacceptable face of modern surveillance

Cybercriminals use Azure Front Door in phishing attacks

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers
  • Is your organization ready for Internet Explorer retirement?
  • Attackers aren’t slowing down, here’s what researchers are seeing

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise