Media coverage

Tor browser flaw could allow governments to bypass security settings

Sorry, this post has not been published yet, check again later!

September 12, 2018
Published by:

Security Now

Tor is used by attackers as a form of bypassing perimeter security controls to establish remote access and for command and control," says Chris Morales, head of security analytics at Vectra. "It is also used to anonymize activity on the web that a person would not want to be monitored by an ISP or government entity."

Read publication

Most recent media coverage

SANS Institute suffers data breach due to phishing attack

August 13, 2020

Security Magazine

Read more

SANS Institute breach proves anyone can fall victim to a ‘consent phishing’ scam

August 13, 2020

SC Magazine

Read more

Ransomware victim Travelex forced into bankruptcy

August 12, 2020

Security Magazine

Read more