“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
(Visited 29 times, 1 visits today)
Related posts:
Depositing a Little Common Sense into the Law
Scientific Review: “Cannabinoids Are Medically Useful For The Treatment Of Various Medical Condition...
The Millions Killed in America’s Post-9/11 Wars – Part One: Iraq
"Most people are yet to understand how disruptive [Bitcoin] is."
NATO Vows Biggest Buildup against Russia since Cold War
How Many Hours of Work It Takes to Earn a Big Mac Around the World
Police Nationwide Say “You’re On Your Own”
Murray Sabrin: Cuba, part two, the economy
Kansas Prosecutor Defeated by Glaring Stupidity of Pot Laws
NYPD ‘looking into’ drones to survey crowds
Leahy Blocks Release of Some Mexican Drug War Aid
IRS employee union: We don’t want Obamacare
Price of Gold Part of a Larger 'Party' Pattern?
Europe Opens $80 Trillion Shadow Banking Pandora's Box: Will Seek To Collapse Repo "Collateral Chain...
How Cops Are Vetted For Aggression & Insensitivity, With Capt. Ray Lewis