
“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
Myanmar’s MySQUAR social media startup raises $2.6m in London listing
Federal Court: Government Doesn't Need a Reason to Ban Competition
Bitcoin Exchange Berlin to Open on Saturday, June 29
Obama: Our ideals and principles, national security at stake in Syria
Former US Treasury Official: 'Banks Move To Enslave Humanity'
CISA Security Bill: An F for Security But an A+ for Spying
Chrome Plug-In for Bitcoin Wallet Attracts Big-Name Talent
Where the World's Unsold Cars Go To Die
Baltimore man gets speed camera ticket for going 0 MPH
Top Homeland Security Checkpoint Refusals
Don’t Pull in Front of a Fatherland “Security” Bureaucrat on a Highway...
How Inventor Paul Vo Created a Little Black Box That Could Change Guitars Forever
Detroit city officials misplace $1 million check for a month
Trump said Obama needed war authority from Congress. Will he ask for it now?
Get Your Money Out: “All Legal Bank Deposit Protections Are Now Officially Gone”