Security News





2016-10-05 13:36
The DefecTor attack uses DNS lookups to create a new spin on correlation attacks.



2016-09-30 20:02
A group of researchers from Princeton University, Karlstad University and KTH Royal Institute of Technology have devised two new correlation attacks that can be leveraged to deanonymize Tor users....

2016-09-19 13:45
Malicious DNS tunnelling is a big problem in cybersecurity. The technique involves the use of the Domain Name System (DNS) protocol to smuggle sensitive corporate or personal information out of a...
