Media coverage

Tor browser flaw could allow governments to bypass security settings

Sorry, this post has not been published yet, check again later!

September 12, 2018
Published by:

Security Now

Tor is used by attackers as a form of bypassing perimeter security controls to establish remote access and for command and control," says Chris Morales, head of security analytics at Vectra. "It is also used to anonymize activity on the web that a person would not want to be monitored by an ISP or government entity."

Read publication

Most recent media coverage

VORTEILE DURCH “INTERNET OF THINGS CYBERSECURITY IMPROVEMENT ACT OF 2019”?

March 18, 2019

IT-Daily

Read more

Protecting Data Requires Knowledge, Understanding (Video)

March 15, 2019

SC Magazine

Read more

Vectra Names Channel Chief

March 15, 2019

Channel Happy Hour

Read more