The Latest in IT Security

Bifrose Backdoor Variant Uses Tor, May Work Against It

30
Aug
2014

Communication with the command and control (CC) server via Tor used by a version of Bifrose backdoor could be leveraged by IT administrators to detect the cyber intrusion. Tor (The Onion Router) is a network of computers designed to anonymize communication between two parties by concealing their location. It is generally used to fight censorship and to protect the privacy of the users. While investigating an attack against an undisclosed device manufacturer, security researchers at Tren…

Comments are closed.

Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments