How Does Law Enforcement ‘Subvert’ Tor?

Last summer an FOI request showed that the FBI had abandoned an investigation into TSChan, allegedly a child pornography site on the Darknet, since “because everyone… connected to the TOR Network is anonymous, there is not currently a way to trace th…

Read More >>

Google: Android Malware Threat is Vastly Exaggerated

Legions of vendor reports have highlighted the sheer pervasiveness of Android malware: that there are now 1 million samples in the wild; and that 99% of all mobile malware is Android-related. Google however says that the actual threat has been vastly o…

Read More >>

Was Nortel’s Ottawa Campus bugged?

On Monday of this week it was reported that listening devices had been found in the former Nortel campus – due to be occupied by the Canadian Department of National Defence (DND). DND has since denied this; but the accusation remains.

Read More >>

Yahoo Swap Bug Bounty Tshirt for $15,000

On Tuesday this week Infosecurity reported that Yahoo had offered the equivalent of $12.50 (being a voucher redeemable in the company shop) as a reward for responsibly disclosed vulnerabilities. Launch of a new Yahoo reward program has now been rushed …

Read More >>