“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
(Visited 29 times, 1 visits today)
Related posts:
Bitcoin ATM Company Refused Account by Bank of Ireland
America’s Afghanistan Troops: “Home by Christmas . . . 2014”
Glenn Greenwald slams Rep. Peter King: He supported terrorism for decades
Spy-Coins.Com
Marijuana Breath Test, Alternative To Controversial Blood Test For Pot?
Doug Casey on Taxes & Citizenship & Axel Merk on ECB, Japan, and US
Home Prices Continue to Soar; Best Gains Since 2006
Ukraine’s Gold Reserves Secretly Flown Out by the New York Fed?
Bill O’Reilly suddenly opposed to NSA surveillance he supported under Bush
Taxi firms seek to drive bitcoin adoption
Hunger for bitcoin grows in Scandinavia as regulatory approach evolves
UK 'internet safety' plan just means internet censorship
Who Gave Hollywood's Representatives the Same Exact DMCA Question?
FBI Concocting A Terrorist Threat Out of Racial Justice Groups
7 Fundamental Conclusions about 2014