The Latest in IT Security

Posts Tagged ‘abettors’

You have to tip your cap to a man who makes a very unwise bet but who nonetheless follows through on it. Digital Trends brings us the story of a Redditor who goes by the name of “Anndddyyyy” who made a bet that he would eat his hat if Bitcoin’s price didn’t rise above $1,000 […]

Read more ...

Eldo Kim, Harvard student, wanted to get out of a final exam so he sent in a bomb threat using Tor to disguise his location and identity. Tor’s not magic and the FBI caught him anyway.

Read more ...

Researchers at Kaspersky Lab identified more malware utilizing Tor’s anonymity capabilities to shield their command and control infrastructure. Known as ChewBacca – after the character in Star Wars and the name given to one of its functions – the malware drops the function ‘P$CHEWBACCA$_$TMYAPPLICATION_$__$$_INSTALL’ as ‘spoolsv.exe’ into the Startup folder and requests the public IP […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments