
“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
The next frontier for 3D printing: drugs
PITA Side-Channel Attack Steals GPG Key from Laptops
Website leaked real-time location of most US cell phones to almost anyone
What An American Should Do If You're Put On The U.S. Government's Kill List
NRG Energy Deploying Dean Kamen’s Solar-Smart In-Home Generator
Marketing Genius: Girl Scout Sells Cookies Outside Marijuana Clinic
Professor Maintains List of 400,000 "Far-Right Extremists" For Antifa, SPLC
Coca-Capitulation
EU Unveils Border Control That Will Act "Even If A Government Objects"
Ecuador’s Correa rips into Snowden coverage; U.S. threatens trade sanctions
Student Loan Debt Will Exceed Median Annual Income For College Grads By 2023
Two Tier Travel Becoming a Reality in the US?
The Prison Industry in the United States: A New Form of Slavery?
Watch Ron Paul Crush It On His New TV Channel
Did A Silk Road Successor Just Commit the Perfect Bitcoin Scam?