What Is the Dark Web and Why Would Businesses Use It?

What is the Dark Web, besides an underground haven for cybercriminals to exchange ideas and illicit data anonymously? It can also be a valuable tool for security teams looking to share threat data.

The post What Is the Dark Web and Why Would Businesses Use It? appeared first on Security Intelligence.

Continue reading What Is the Dark Web and Why Would Businesses Use It?

Tor executive director Shari Steele to step down

The Tor Project’s executive director Shari Steele resigned from her role leading the prominent organization dedicated to building online anonymity software, CyberScoop has learned. Steele, previously the executive director at the Electronic Frontier Foundation, became executive director of Tor in 2015. Much of the early part of her time at Tor involved dealing with the aftermath of the numerous sexual assault accusations leveled at predecessor Jacob Appelbaum, previously a high-profile member of some activist circles. Appelbaum has denied all accusations. The Tor Project underwent something of a reset in recent years, bringing in a new board of directors to work alongside Steele. Dealing with the aftermath of the Appelbaum incidents — and the accusations that Tor leadership had long known and ignored the problem — has partly defined Steele’s tenure. Steele will serve until Dec. 31. The organization is now actively looking for a replacement. This story is developing and will […]

The post Tor executive director Shari Steele to step down appeared first on Cyberscoop.

Continue reading Tor executive director Shari Steele to step down

$1 million bounty offered for Tor Browser zero-day exploits

Zerodium, a hacking company that sells exploits to governments around the world, is now offering $1 million for previously undiscovered vulnerabilities in the Tor web browser. The top prize, a $250,000 bounty, requires a researcher to be able to demonstrate a remote code exploit against Tor while the browser is at its highest security settings on either Windows 10 or the security-focused operating systems TAILS. The attack vector has to be a website targeting the Tor Browser. The Tor browser anonymizes web traffic, encrypting it between computers known as nodes. The network’s architecture makes determining the origin of traffic extremely difficult. The section of the internet known as the “dark web” is only accessible via the Tor browser. The six-figure prize comes weeks after Zerodium placed $500,000 bounties on secure messenger applications, like Signal, Telegram and WhatsApp. The highest single bounty offered by the company is $1.5 million for an iPhone zero-day vulnerability […]

The post $1 million bounty offered for Tor Browser zero-day exploits appeared first on Cyberscoop.

Continue reading $1 million bounty offered for Tor Browser zero-day exploits

Tor Project Opens Bounty Program To All Researchers

The Tor Project is launching a public bug bounty program to encourage security researchers to responsibly report issues they find in the software. Continue reading Tor Project Opens Bounty Program To All Researchers