tor


Vawtrak, also known as Neverquest, is a banking trojan that is capable of bypassing 2FA (two factor authentication) on some financial institutions. It is also one of your typical information stealer. One of the main strengths of Vawtrak is its use of layering techniques within its code. Within its layers, Vawtrak employs different armoring strategies such as Anti-Emulator, Anti-Debugger, Anti-Analysis, Encryption/Decryption/Hashing, Compression/Decompression, Garbage collection, and Code injection. TOR 101 The Onion Router, or simply known... [Read More]
by RSS Raul Alvarez  |  Jun 05, 2015  |  Filed in: Industry Trends & News
Anonymous browsing with Tor presents serious challenges for IT as well as possible opportunities for organizations that need it. One of my best friends growing up was named Tor. He was Norwegian through and through and looked like he could wield a giant hammer (for those of you without any Scandinavian stock in you, Tor is the traditional Anglicized spelling of Thor). This blog isn’t about him. Just a good story. Anyway, what we’re talking about here is the Tor Browser and the related Tor protocol that enables anonymous web browsing... [Read More]
by RSS Chris Dawson  |  Jan 21, 2015  |  Filed in: Industry Trends & News
[Read More]
by RSS Michael Perna  |  Nov 21, 2014  |  Filed in: Industry Trends & News
[Read More]
by RSS Michael Perna  |  Nov 14, 2014  |  Filed in: Industry Trends & News
[Read More]
by RSS Michael Perna  |  Oct 24, 2014  |  Filed in: Industry Trends & News
[Read More]
by RSS Michael Perna  |  Oct 17, 2014  |  Filed in: Industry Trends & News
[Read More]
by RSS Michael Perna  |  Oct 04, 2014  |  Filed in: Industry Trends & News
[Read More]
by RSS Michael Perna  |  Aug 16, 2014  |  Filed in: Industry Trends & News
[Read More]
by RSS Michael Perna  |  Aug 09, 2014  |  Filed in: Industry Trends & News
We are in the age of information and for the past 25 years the internet has been an awesome force for good. It has created an incredible information economy across networks and won our trust as a viable platform for the exchange of just about anything. However, underneath it all, there is a terrible tempest brewing. In a time when any motivated person can raise a few hundred thousand dollars in crowdfunding, so too can any motivated person find a way to steal it. The hacking economy is booming and the barriers to entry are low. Prerequisite knowledge... [Read More]
by RSS Michael Perna  |  Mar 17, 2014  |  Filed in: Security 101