“Security experts call it a ‘drive-by download’: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes. Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.”
http://www.wired.com/2014/08/operation_torpedo/
Related posts:
One Woman's Quest to Bring Bitcoin to Botswana
Given The Chance, All Governments Would Abolish Freedom Of Speech
After being hacked again, IRS shuts down e-File PIN service
Audited Virginia farmer faces more thuggery
How did we get here?
FBI Casting Set Stage for Boston Marathon Bombing, Shootout, Charade
Texas Generally Exempts Bitcoin From Money Transmission Laws
19 Insane Tidbits From Ex-Employee's Lawsuit Against Google
Mystery Sponsor Of Weapons And Money To Syrian Mercenary "Rebels" Revealed
4 Little-Known Facts about Immigrants and Company Founders
Ecuador’s Correa rips into Snowden coverage; U.S. threatens trade sanctions
California Considers $1,000 Fine for Waiters Offering Unsolicited Plastic Straws
Why Sir John Templeton renounced US citizenship – AKA why the US shot itself in the foot
Bitcoin meets Google Glass with in-store payment app GlassPay
Police chief defends ‘libtards’ rant: ‘Cops are there to clean up the mess’