
“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
Manchester Bomber Was Product of West's Libya/Syria Intervention
The European Central Bank on Bitcoins
Skype with care – Microsoft is reading everything you write
The FDA: A Pain From the Neck to the Big Toe
Jews say no to AIPAC and say no to bombing Syria
Rand Paul Defends Apple Tax Avoidance Against Homeland Security Subcommittee
New Active Trading Bitcoin Fund Seeks UK Investors
GOP Governors Continue Caving In to ObamaCare Mandates
Privacy group to file Supreme Court petition against NSA surveillance program
Gel used for buttocks enhancements blamed for 15 deaths in Venezuela
Who REALLY Produced the Film 'Desert Warrior' That Is Now Convulsing the Middle East?
Reality Check: President Obama’s Rules For Assassinating U.S. Citizens?
Vitalik Buterin: Bitcoin Is A Transition Technology
Groklaw Shuts Down Over U.S. Internet Surveillance
Illinois Cops: Don't Legalize Weed, Or We'll Have to Kill Our Drug Dogs