Media coverage

Tor browser flaw could allow governments to bypass security settings

Sorry, this post has not been published yet, check again later!

September 12, 2018
Published by:

Security Now

Tor is used by attackers as a form of bypassing perimeter security controls to establish remote access and for command and control," says Chris Morales, head of security analytics at Vectra. "It is also used to anonymize activity on the web that a person would not want to be monitored by an ISP or government entity."

Read publication

Most recent media coverage

Moving targets: Brad Howarth speakers to the IT professionals monitoring a mobile threat landscape

September 17, 2019

CRN Magazine

Read more

Ecuador citizens’ data breach holds lessons for enterprises

September 17, 2019

Computer Weekly

Read more

Marketing analytics company leaks deep profiles of entire Ecuador population

September 16, 2019

Threatpost

Read more