
“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
Ohio Supreme Court Takes Up Photo Enforcement Kangaroo Courts
The Technological Evolution of Nonlethal Weaponry
Libertarian state senate candidate gets arrested at pro-marijuana rally
Medical marijuana bill approved by New Hampshire House
James Corbett with Sibel Edmonds: Gladio Revisited
Rep holds up vodka and steak on House floor to shame food stamp opponents
Estonia opens online applications for world's first e-residency program
Bitcoin Boomtown: Digital Currency Tops $400, Mining Rigs Sell for $3M
Oregon Prosecutors Still Wasting Resources on Medical Cannabis
ACLU Coordinating Ed Snowden's Defense
U.S. Reacts To Fukushima By Raising Acceptable Radiation Standards
Odorless ‘weed candies’ in high schools worry Oregon authorities
Springfield, Missouri Marijuana Decriminalization Initiative Certified
Capital Controls Rolling Into High Gear Under FATCA
The Feds Promote Hunger and Poverty in America but the Kids Are Alright