The Latest in IT Security

CISO View: Blocking Tor from the Enterprise

26
Nov
2015

torrouter

The Onion Router (Tor) was designed to protect privacy and anonymity on the internet. However, it is increasingly being used by criminals to protect themselves and their endeavors. Last year Kaspersky Lab noted, “the cyber-criminal element is growing… We found Zeus with Tor capabilities, then we detected ChewBacca and finally we analyzed the first Tor Trojan for Android.”

The reason is simple: “Hosting C&C servers in Tor makes them harder to identify, blacklist or eliminate.” Earlier this year IBM concluded that “it is absolutely necessary to block access to Tor or other similar networks from your corporate networks.”

Read More

Leave a reply


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments