Tor browser flaw could allow governments to bypass security settings
Tor is used by attackers as a form of bypassing perimeter security controls to establish remote access and for command and control," says Chris Morales, head of security analytics at Vectra. "It is also used to anonymize activity on the web that a person would not want to be monitored by an ISP or government entity."
Moving targets: Brad Howarth speakers to the IT professionals monitoring a mobile threat landscape
Ecuador citizens’ data breach holds lessons for enterprises
Marketing analytics company leaks deep profiles of entire Ecuador population