Tag: tor

  • Small Talks return to the Virus Bulletin Conference

    VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed “Small Talks”, these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks…

  • Small Talks return to the Virus Bulletin Conference

    VB2015 was the 25th Virus Bulletin conference and, to celebrate the occasion, we added a third stream to the programme. Dubbed “Small Talks”, these talks were longer than those on the regular programme and took place in a smaller room, which allowed for a more informal discussion. Various subjects were covered, ranging from targeted attacks…

  • To make Tor work better on the web, we need to be honest about it

    If you regularly browse the web through the Tor network, you will have noticed that many websites are either inaccessible, or have strong barriers (in the form of difficult CAPTCHAs) put in front of them. In a blog post , ‘The Trouble with Tor’, CloudFlare CEO Matthew Prince, whose company is responsible for many of…

  • Vawtrak uses Tor2Web to connect to Tor hidden C&C servers

    Option hides the servers, without having to include a Tor client in the malware. The authors of the Vawtrak trojan (also known as Neverquest) have moved some of its C&C servers to Tor hidden services and made the malware use Tor2Web to connect to them, Fortinet researcher Raul Alvarez writes . The use of hidden…

  • Tor exit node found to turn downloaded binaries into malware

    Tor provides anonymity, not security, hence using HTTPS is essential. A security researcher has discovered a Tor exit node that was modifying binaries downloaded through it on the fly. The researcher, Josh Pitts of Leviathan Security , has previously shown how easy it is to modify binaries downloaded over HTTP in transit, thus turning them…

  • Updated botnet likely cause of surge in Tor traffic

    New Tor version should help the network deal with increased traffic. Sometimes a picture says more than a thousand words: The graph shows the daily number of users of the Tor anonymity network over the past three years. As both the network and concerns over anonymity have grown, the usage has shown a slow but…

  • Firefox 17 zero-day exploit targets users of Tor network

    Visitors to child abuse websites likely target of operation, but will there be collateral damage? A zero-day exploit in Firefox 17 that was probably used to track the visitors to child abuse websites hosted on the Tor network will spark further debate on the notion of “good malware” and could lead to very serious false…

  • Facebook temporarily blocks access from Tor

    Malicious activity triggered automatic lockdown. A ‘high volume of malicious activity across Tor exit nodes’ is believed to have been the reason why Facebook temporarily blocked access through Tor – an issue that has since been resolved. Tor is software that provides online anonymity by making Internet traffic pass through a number of nodes before…