The Tor Project released a patch fixing an issue that could reveal the correct IP address of MacOS and Linux users using the Tor browser.
Zero-day-acquisition firm Zerodium reported it will pay a total of US$ 1 million (£740,000) for zero day exploits found for the Tor browser on Tails Linux and Windows.
New research claims to show that up to three percent of hidden services directories, the backbone of the Tor anonymous router system, have been compromised, which could enable the identification of users in some cases.
The Guardian Project has integrated Tor security into the Internet of Things (IoT), creating a Tor Onion Service Configuration for the Home Assistant open source platform.
A team of researchers has created an anonymity network methodology that they believe is more efficient and more secure than existing anonymous networks such as Tor.
A newly discovered malware capable of cyberespionage and remote takeover is targeting Mac computers, delivering its payload by opening up a backdoor connection to a command-and-control web server via the encrypted Tor network.
Not a place you want to go shopping, the 'anonymous online marketplace' was meant to protect civil liberties but is now better known as a nefarious network for the illicit drugs trade.
Thomas Fischer believes that the Investigatory Powers Bill will incentivise more citizens to use Tor to protect their online privacy. In turn, this could lead to more people using the Tor network at work, either for privacy reasons or to bypass the company firewall and browsing policies.
A strain of malicious code written entirely in Python, dubbed PWOBot, has been discovered infecting a number of organisations based in Europe, specifically in Poland.
A security researcher has developed a proof-of-concept that can identify Tor users based how they move their mouse.
Professor Alan Woodward has identified a recent surge in .Onion address growth which may also mean an upswing of Locky infections
A bug bounty programme will be launched later this year by the Tor Project to help steer security researchers to report issues that they find in software in a responsible manner.
Onion router asks security researchers to keep eyes peeled for flaws
Julian Meyrick explains how companies should work toward a better understanding of the Dark Web and have useage policies in place for any rare instances where it is not blocked to employees.
Dark web version of GitHub offers a place for developers to code controversial projects anonymously.
The Tor project alleged that the FBI paid Carnegie Mellon University researchers to attack Tor hidden services last year.
A Russian firm tasked to gain information on Tor users is paying more than the value of the contract to back out of the agreement.
Agora, one of the largest online black market sites, halted operations after concerns arose of vulnerabilities in Tor's hidden services.
IBM advises businesses to block access to Tor and other anonymous networks.
The growing threat posed by ransomware and the possibility that cyber-criminals will graduate from extorting end users to large corporations topped the worry list of IBM's X-Force threat team in its Q3 threat intelligence report.
MIT and the Qatar Computing Research Institute (QCRI) have discovered a security vulnerability affecting the Tor anonymity network.
The latest ICYMI column looks at the biggest stories on SC this week, including a 'faster Tor', the security implications of Windows 10 and the actual cost of a real APT.
Security researchers are behind a new type of anonymous web browsing.
This week's ICYMI column looks at Tor sniffing, old-school router attacks and the fallout from the Hacking Team data breach.
If you are routing your traffic through the Tor network, don't make the assumption that it is always providing end-to-end security.