updated Mon. March 26, 2018
+
HackRead
March 22, 2018
Another day, another disappointing news for The Pirate Bay users – Today for the third time in 5 days The Pirate Bay domain has gone offline. Currently, those visiting the site can see “Error 522 Connection timed out” message generated by Cloudflare since The Pirate Bay uses its CDN and DDoSÃÂ ...
Cornell Chronicle
March 22, 2018
Library staff can help install tracking blockers, password managers, two-factor authentication and other security tools on your devices, and help you assess when to turn to more advanced tools like the Tor browser or a VPN. Those who can't make the drop-in hour, or who have specific issues, can arrange aÃÂ ...
Neowin
March 13, 2018
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody from watching yourÃÂ ...
TWCN Tech News (blog)
March 8, 2018
Things get even more interesting after finding out that anyone who wants to download a file from OnionShare, must be using the secure Tor Browser. For some, going this route is probably taking things too far, but from our point of view, security on the web is more important than convenience. Bear in mindÃÂ ...
Western Queens Gazette
March 7, 2018
Moreover, the TOR browser is a multi-platform browser available for free for those who want surfing anonymity by not having their IP (Internet Protocol) tracked. This browser is so effective that many websites will not allow you to use their servers if you use TOR as they insist on planting cookies on your IP soÃÂ ...
Washington Examiner
March 5, 2018
Christin said he believes government discovery and use of vulnerabilities in the Tor protocol or in the Tor browser, which is a modified version of Firefox, would be short-lived. In 2015, the government seized a darknet child porn website and used malware to unmask the IP addresses of hundreds of users.
BleepingComputer
February 28, 2018
The option was added at the request of Tor Browser developers as part of the Tor Uplift project, an initiative to bolster the Firefox codebase with some of the Tor Browser's unique privacy-focused features. The Tor Browser is based on Firefox and they wanted a simple way to hide the Firefox Sync UI [1, 2],ÃÂ ...
ValueWalk
February 26, 2018
While cybercriminals trust and use one of many VPN services, they also like to use the Tor browser for web anonymity. All websites in this network have the .onion extension. While almost all ransomware viruses provide instructions to download the Tor browser, some prefer to only provide links to TorÃÂ ...
The Register
February 23, 2018
Analysis US judges have shut down an appeal from a convicted pedophile who claimed the FBI hacking of his computer was an illegal and unreasonable search. Gabriel Werdene, 53, of Bucks County, Philadelphia, is serving two years in a federal prison for rummaging through the Playpen dark-web filthÃÂ ...
Tom's Hardware
February 14, 2018
The Tor browser is also expected to receive a significant update soon, once it switches to the Firefox ESR v60 base. Firefox ESR v60 will adopt all of the latest Firefox Quantum features, including the significantly more secure multi-process sandboxing architecture. Mozilla has also started adopting some ofÃÂ ...
SC Magazine UK
January 25, 2018
Tor Browser 7.5 has been released this week complete with a bunch of security fixes that have already been rolled out to the Firefox Extended Support Release (ESR) 52.6 client it is built upon. Firefox ESR is similar to other versions of the Mozilla browser client, but doesn't update as frequently apart fromÃÂ ...
Lifehacker
November 7, 2017
The IP address leaking issue only affects Tor browsers on Mac and Linux devices (Windows and Tails Tor users are safe for now). We Are Segment CEO Filippo Cavallarin identified the issue as a bug in the way the Tor browser (built atop a version of Firefox) deals with links beginning with the ... browser
Threatpost
November 4, 2017
The post said Tails users and sandboxed-tor-browsers are also unaffected by the bug. It is unclear if prior versions of the Tor Browser are also impacted or if it's just version 7.0.8. Filippo Cavallarin, CEO of We Are Segment, is credited for discovering the vulnerability and notifying Tor Project on Oct. 26. browser
Scottish Daily Record
February 16, 2018
Mr Borwick said that whilst examining the computer, he found that the TOR browser had been installed. He said that the computer records showed that the browser had been used twice but he couldn't discover what had been looked at. Speaking about TOR, Mr Goddard asked if the use of the TOR browserÃÂ ... browser
Tom's Hardware
February 14, 2018
The Tor browser is also expected to receive a significant update soon, once it switches to the Firefox ESR v60 base. Firefox ESR v60 will adopt all of the latest Firefox Quantum features, including the significantly more secure multi-process sandboxing architecture. Mozilla has also started adopting some ofÃÂ ... browser
Infosecurity Magazine
January 31, 2018
Ransomware-authors often advise victims to use a Tor proxy to complete payment to a specified Bitcoin address, as most users typically don't have a Tor browser installed. However, this workaround has proved to be the undoing of some. Proofpoint spotted several cases where hackers are using the onion[ÃÂ ... browser
The Register
January 30, 2018
Cybercriminals are using Tor proxies to divert ransomware payments to their own Bitcoin wallets. Ransomware scammers have long directed victims to payment portals on the Tor network. For those who do not want to or cannot install the Tor browser necessary to pay their ransoms, operators generallyÃÂ ... browser
BleepingComputer
January 29, 2018
For example, users can type in nytimes3xbfgragh.onion.to and access the New York Times' Dark Web portal without installing the Tor Browser. During the past two years, such services have become extremely popular, and especially popular with ransomware authors. Ransomware often includes ransomÃÂ ... browser
SC Magazine UK
January 25, 2018
Tor Browser 7.5 has been released this week complete with a bunch of security fixes that have already been rolled out to the Firefox Extended Support Release (ESR) 52.6 client it is built upon. Firefox ESR is similar to other versions of the Mozilla browser client, but doesn't update as frequently apart fromÃÂ ... browser
Lifehacker
November 7, 2017
The IP address leaking issue only affects Tor browsers on Mac and Linux devices (Windows and Tails Tor users are safe for now). We Are Segment CEO Filippo Cavallarin identified the issue as a bug in the way the Tor browser (built atop a version of Firefox) deals with links beginning with the “file://”à... browser
Threatpost
November 4, 2017
The post said Tails users and sandboxed-tor-browsers are also unaffected by the bug. It is unclear if prior versions of the Tor Browser are also impacted or if it's just version 7.0.8. Filippo Cavallarin, CEO of We Are Segment, is credited for discovering the vulnerability and notifying Tor Project on Oct. 26. browser
Android Police
December 16, 2017
The desktop Tor Browser is designed to make accessing sites as safe and anonymous as possible, sometimes at the cost of usability (JavaScript is disabled by default) and speed. It remains a popular tool for privacy-conscious users, but the mobile browser always lacked a major feature - Tor's securityÃÂ ... browser
Business 2 Community
December 11, 2017
When accessing the darknet through the TOR browser the connection is routed through several other computers (nodes) while would seemingly cover anyone's tracks. However many federal agencies have discovered that if they monitor the final exit nodes they can track all activity that happens. It is for thisÃÂ ... browser
Digital Trends
November 25, 2017
The site is a read-only version of Wikipedia as, in order to deal with trolls, the organization does not allow the site to be edited by the Tor browser. Currently, the site is not supported by the Wikimedia Foundation, but Muffett told Motherboard that he would be “delighted” if the non-profit used his solution orÃÂ ... browser
Motherboard
November 24, 2017
The service is accessible through the Tor browser, which routes your connection through several “hops” around the world to hide your location ... browser
BleepingComputer
November 20, 2017
Unbeknown to most users, Mozilla added a privacy-enhancing feature to the Firefox browser over the summer that can help users block online ... browser
Security.nl
November 16, 2017
Het Tor Project heeft vandaag updates voor Tor Browser uitgebracht, waaronder een 64-bit Windows-versie. Windows-gebruikers met een ... browser
Tweakers
November 15, 2017
Tor Browser Bundle logo (75 pix) Versie 7.0.10 van Tor Browser is uitgekomen. Tor staat voor The Onion Router en is een netwerk dat gebruikt ... browser
TechRepublic
November 9, 2017
You've probably heard of Tor Browser. If not, it's the easiest way to use a browser through the Tor network. Tor Browser is available for ... browser
Lifehacker
November 7, 2017
The IP address leaking issue only affects Tor browsers on Mac and Linux ... The newest update, Tor browser 7.0.9, fixes the TorMoil bug, and ... browser
Threatpost
November 4, 2017
Tor Browser Users Urged to Patch Critical 'TorMoil' Vulnerability ... The post said Tails users and sandboxed-tor-browsers are also unaffected ... browser
BleepingComputer
November 3, 2017
The Tor Project has released a security update for the Tor Browser on Mac and Linux to fix a vulnerability that leaks users' real IP addresses. browser
ExtremeTech
November 2, 2017
Firefox is rolling out an update that borrows from the Tor browser in order to prevent users from being tracked across websites via canvas ... browser
TechJuice
November 2, 2017
Mozilla Firefox, the famous web browser, is going to increase its security by opting for Tor like features. Mozilla, the maker of Firefox, is planning ... browser
TNW
November 2, 2017
Mozilla is making Firefox a more private experience by taking cues from Tor, the browser of choice for those who dare to visit the dark web. browser
ACLU (blog)
November 2, 2017
To get that to happen, the NIT used exploit code — software designed to take advantage of a flaw in the way the Tor browser works. Further ... browser
The Register
October 31, 2017
For the past four years, Mozilla developers have been mulling how the Tor browser, which is based on Firefox ESR, prevents the use of the ... browser
TAJ
October 31, 2017
Tor Browser is renowned for putting a high price on user security and therefore cookies are not allowed on it. What many might not know is that ... browser
Threatpost
October 31, 2017
The upcoming Firefox feature to block canvas fingerprinting attempts comes directly from the Tor Browser, which is almost entirely built on ... browser
BleepingComputer
October 30, 2017
Mozilla engineers have borrowed yet another feature from the Tor Browser and starting with version 58 Firefox will block attempts to fingerprint ... browser
TechRadar
October 27, 2017
The Tor browser is a tool designed to make the user anonymous online, which does not use VPN technology, and therefore does not encrypt ... browser
SC Magazine UK
October 16, 2017
The ransomware uses several variations of ransom notes and victims need a Tor browser to access the URL provided in the ransom notes. browser
Oxygen (blog)
October 12, 2017
According to court documents, Vallerius' laptop was searched following his apprehension. Police found a Tor browser to access the “dark web,” ... browser
Neowin
September 29, 2017
In terms of front-end changes, Tor Browser 7.0.6 is now based on Firefox 52.4.0 ESR (Extended Support Release) which includes security ... browser
The Daily Dot
September 26, 2017
Tor is one of the most popular tools for browsing the internet anonymously and accessing hidden sites on the dark net. Since its founding ... browser
Tech Advisor
September 21, 2017
You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser Bundle, which contains all the required tools. browser
Tech Advisor
September 21, 2017
You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser Bundle, which contains all the required tools. browser
The INQUIRER
September 18, 2017
SELF-STYLED premium zero-day acquisition platform Zerodium is offering one million dollars in bounty payments for Tor browser ... browser
Techworm
September 15, 2017
A U.S. based start-up security firm announced a new bug bounty program on Wednesday where it is offering a total of $1 million in rewards to ... browser
|
news and opinion
|