Thursday 29 December 2016

Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War”

Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War”
The US will deport dozens of diplomats, and has named specific individuals implicated in the cyberattacks. The post Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War" appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/obama-russia-hacking-sanctions-diplomats/
from Tumblr http://zoehamilton671.tumblr.com/post/155134271150
via Zoe Hamilton

Top 10 HR technology stories of 2016

Here is a rundown of Computer Weekly’s most popular stories on HR technology in 2016

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404616/Top-10-HR-Stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/155112751125
via Zoe Hamilton

Sunday 25 December 2016

Where to Donate to Protect the Internet in 2017

Where to Donate to Protect the Internet in 2017
In uncertainty times, these non-profits need your year-end charity to protect privacy and civil liberties online. The post Where to Donate to Protect the Internet in 2017 appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/donate-protect-internet-2017/
from Tumblr http://zoehamilton671.tumblr.com/post/154933745585
via Zoe Hamilton

Friday 23 December 2016

Top 10 networking stories of 2016

A look back at Computer Weekly’s most-read networking stories of 2016

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404603/Top-10-networking-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154844673545
via Zoe Hamilton

Thursday 22 December 2016

The Most Dangerous People on the Internet in 2016

The Most Dangerous People on the Internet in 2016
It used to be people who disrupted the establishment. Now? It’s mostly the establishment. The post The Most Dangerous People on the Internet in 2016 appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/dangerous-people-internet-2016/
from Tumblr http://zoehamilton671.tumblr.com/post/154803909775
via Zoe Hamilton

Top 10 state surveillance, investigatory powers and activism stories of 2016

This year saw the UK introduce the Snoopers’ Charter, legalising some of the most extensive government surveillance powers in the world. Computer Weekly exposed state monitoring of Parliamentary emails, and reported on activist Lauri Love’s legal battle to be tried in the UK over alleged hacking in the US

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404654/Top-10-state-surveillance-investigatory-powers-and-activism-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154801257730
via Zoe Hamilton

Wednesday 21 December 2016

Encryption App ‘Signal’ Fights Censorship With a Clever Workaround

Encryption App ‘Signal’ Fights Censorship With a Clever Workaround
A technique called “domain fronting” makes the app’s encrypted traffic look no different from a Google search. The post Encryption App ‘Signal’ Fights Censorship With a Clever Workaround appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/encryption-app-signal-fights-censorship-clever-workaround/
from Tumblr http://zoehamilton671.tumblr.com/post/154776006955
via Zoe Hamilton

Anonymous’ Barrett Brown Is Free—and Ready to Pick New Fights

Anonymous’ Barrett Brown Is Free—and Ready to Pick New Fights
After four years in prison, Anonymous’ rabblerousing information activist is back with a new plan to restart his radical muckraking. The post Anonymous’ Barrett Brown Is Free—and Ready to Pick New Fights appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/anonymous-barrett-brown-free-ready-pick-new-fights/
from Tumblr http://zoehamilton671.tumblr.com/post/154762218005
via Zoe Hamilton

European court delivers blow to Snoopers’ Charter

Parts of the controversial Investigatory Powers Act relating to the bulk collection of communications data have been ruled unlawful by the European Court of Justice

from ComputerWeekly: IT security http://www.computerweekly.com/news/450409635/European-court-delivers-blow-to-Snoopers-Charter


from Tumblr http://zoehamilton671.tumblr.com/post/154761610210
via Zoe Hamilton

Top 10 IT security stories of 2016

Here are Computer Weekly’s top 10 IT security stories of 2016:

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404341/Top-10-IT-security-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154759223085
via Zoe Hamilton

Top 10 CW Middle East stories of 2016

Read the most popular articles about enterprise IT in the Middle East

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403785/Top-10-CW-Middle-East-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154759222995
via Zoe Hamilton

Tuesday 20 December 2016

Top 10 CW Nordics stories of 2016

Read the top 10 Nordic enterprise IT stories from Computer Weekly

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403696/Top-10-CW-Nordics-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154715716500
via Zoe Hamilton

Top 10 cyber crime stories of 2016

Here are Computer Weekly’s top 10 cyber crime stories of 2016:

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404344/Top-10-cyber-crime-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154715716375
via Zoe Hamilton

Monday 19 December 2016

Could blockchain revolutionise the Middle East?

The Middle East could pioneer the use of blockchain, transforming the processes used by organisations in the region

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404690/Could-blockchain-revolutionise-the-Middle-East


from Tumblr http://zoehamilton671.tumblr.com/post/154668164030
via Zoe Hamilton

Friday 16 December 2016

Obama Curbed Chinese Hacking, But Russia Won’t Be So Easy

Obama Curbed Chinese Hacking, But Russia Won’t Be So Easy
The Obama administration’s success story countering China’s hacking offers lessons about how to deter Russia’s attacks—and also how much tougher. The post Obama Curbed Chinese Hacking, But Russia Won’t Be So Easy appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/obama-russia-hacking-sanctions-china/
from Tumblr http://zoehamilton671.tumblr.com/post/154562987640
via Zoe Hamilton

Thursday 15 December 2016

“Secure the News” Grades Media Sites on HTTPS—And Most Fail

“Secure the News” Grades Media Sites on HTTPS—And Most Fail
A new service shows just how secure news sites are. Spoiler: Most of them aren’t. The post “Secure the News” Grades Media Sites on HTTPS—And Most Fail appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/secure-news-grades-media-sites-https-fail/
from Tumblr http://zoehamilton671.tumblr.com/post/154506839600
via Zoe Hamilton

Typo allowed Russian hackers to access US Democratic Party emails

Typographical mistake in an email warning of a phishing attack on the US Democrats led to thousands of private emails being accessed and published by Russian-backed hackers

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404682/Typo-allowed-Russian-hackers-to-access-US-Democratic-Party-emails


from Tumblr http://zoehamilton671.tumblr.com/post/154504378365
via Zoe Hamilton

Yahoo hacked: One billion users affected by August 2013 data breach, company confirms

Yahoo confirms details of a historic data breach, dating back to 2013, affecting one billion users

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404680/Yahoo-hacked-One-billion-users-affected-by-August-2013-data-breach-company-confirms


from Tumblr http://zoehamilton671.tumblr.com/post/154503983315
via Zoe Hamilton

Wednesday 14 December 2016

IT services advisory sector consolidates as ISG acquires Alsbridge

Significant robotic process automation skills included in ISG’s $74m acquisition of Alsbridge

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404611/IT-services-advisory-sector-consolidates-as-ISG-acquires-Alsbridge


from Tumblr http://zoehamilton671.tumblr.com/post/154467378605
via Zoe Hamilton

150 Filmmakers Ask Nikon and Canon to Sell Encrypted Cameras

150 Filmmakers Ask Nikon and Canon to Sell Encrypted Cameras
It’s high time camera companies give photojournalists and filmmakers the same protections built into your iPhone and WhatsApp. The post 150 Filmmakers Ask Nikon and Canon to Sell Encrypted Cameras appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/200-filmmakers-ask-nikon-canon-sell-encrypted-cameras/
from Tumblr http://zoehamilton671.tumblr.com/post/154464529680
via Zoe Hamilton

Swedish trading venue Nasdaq Stockholm fined for cyber security failures

The Swedish financial services regulator FI fines Nasdaq Stockholm and its clearing operation for not managing its security supplier adequately

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404605/Swedish-trading-venue-Nasdaq-Stockholm-fined-for-cyber-security-failures


from Tumblr http://zoehamilton671.tumblr.com/post/154461439195
via Zoe Hamilton

Tuesday 13 December 2016

KFC hacked: Customers urged to reset loyalty scheme passwords

Fast food giant has emailed all 1.2 million members of its loyalty scheme, urging them to change their passwords after its recent data breach

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404526/KFC-hacked-Customers-urged-to-reset-loyalty-scheme-passwords


from Tumblr http://zoehamilton671.tumblr.com/post/154416126270
via Zoe Hamilton

Monday 12 December 2016

Citrix: How the great survivor challenges the tech giants

In spite of Microsoft and VMware encroaching on its core product areas, Citrix is a company which seems to have “staying power”

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404338/Citrix-How-the-great-survivor-challenges-the-tech-giants


from Tumblr http://zoehamilton671.tumblr.com/post/154383979970
via Zoe Hamilton

Trump Ignoring US Intelligence Creates Risks Beyond Russian Hacking

Trump Ignoring US Intelligence Creates Risks Beyond Russian Hacking
Donald Trump’s growing divide with the intelligence communities could have consequences well beyond Russia. The post Trump Ignoring US Intelligence Creates Risks Beyond Russian Hacking appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/trump-cia-national-intelligence-briefings/
from Tumblr http://zoehamilton671.tumblr.com/post/154380810215
via Zoe Hamilton

KPMG cautions CEOs against ignoring GDPR requirements because of Brexit

Professional services giant KPMG says UK businesses cannot afford to ignore incoming European data protection requirements if they want to continue to trade successfully with the continent in future

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404457/KPMG-cautions-CEOs-against-ignoring-GDPR-requirements-over-post-Brexit-data-protection-uncertainty


from Tumblr http://zoehamilton671.tumblr.com/post/154379612605
via Zoe Hamilton

Disaster recovery testing: technology systems to test DR

In this concluding part of a two-part series, Computer Weekly looks at ways of testing disaster recovery plans, with methods including array-based replication and hypervisor-based approaches

from ComputerWeekly: IT security http://www.computerweekly.com/feature/Disaster-recovery-testing-Technology-systems-to-test-DR


from Tumblr http://zoehamilton671.tumblr.com/post/154373795690
via Zoe Hamilton

Friday 9 December 2016

IT Priorities 2017: Buyers look for network privacy, visibility tools

The 2017 Computer Weekly/TechTarget IT Priorities survey shows growing interest in network privacy, security and management, but SDN and NFV are still lagging

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404334/IT-Priorities-2017-Buyers-look-for-network-privacy-visibility-tools


from Tumblr http://zoehamilton671.tumblr.com/post/154249128505
via Zoe Hamilton

Blackberry changes tack to secure enterprise internet of things

After dropping devices to concentrate on mobile device management, Blackberry is poised to take on IoT security under John Chen’s leadership

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404392/Blackberry-changes-tack-to-secure-enterprise-internet-of-things


from Tumblr http://zoehamilton671.tumblr.com/post/154249128625
via Zoe Hamilton

Thursday 8 December 2016

PowerShell security threats greater than ever, researchers warn

Administrators should upgrade to the latest version of Microsoft PowerShell and enable extended logging and monitoring capabilities in the light of a surge in related security threats, warn researchers

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404333/PowerShell-security-threats-greater-than-ever-researchers-warn


from Tumblr http://zoehamilton671.tumblr.com/post/154207947855
via Zoe Hamilton

Security Think Tank: Simplify infosec messages: If not X, then Y and Z

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Simplify-infosec-messages-If-not-X-then-Y-and-Z


from Tumblr http://zoehamilton671.tumblr.com/post/154207947580
via Zoe Hamilton

More than 2,000 TalkTalk routers hijacked by Mirai botnet variant

Security researchers are urging ISPs to issue emergency patches for Marai botnet infections after 2,374 TalkTalk routers were linked in a regional botnet

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404326/More-than-2000-TalkTalk-routers-hijacked-by-Mirai-botnet-variant


from Tumblr http://zoehamilton671.tumblr.com/post/154202475915
via Zoe Hamilton

Wednesday 7 December 2016

The United Arab Emirates enterprise IT trends for 2017

The UAE is already a leader in areas such as smart city developments, and 2017 looks set to see organisations in the country increase its adoption of other transformational IT

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404250/The-United-Arab-Emirates-enterprise-IT-trends-for-2017


from Tumblr http://zoehamilton671.tumblr.com/post/154189901955
via Zoe Hamilton

The Election Is Over. The Probe Into Russian Hacks Shouldn’t Be

The Election Is Over. The Probe Into Russian Hacks Shouldn’t Be
Two Congressmen are calling for a commission to investigate Russian political hacking. Cybersecurity experts are backing the idea. The post The Election Is Over. The Probe Into Russian Hacks Shouldn’t Be appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/russian-election-hacking-investigation/
from Tumblr http://zoehamilton671.tumblr.com/post/154182125820
via Zoe Hamilton

Few iOS apps in enterprises meet Apple’s new security mandate

Most iOS apps in the enterprise pose potential security risks, according to research by Appthority

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404262/Few-iOS-apps-in-enterprises-meet-Apples-new-security-mandate


from Tumblr http://zoehamilton671.tumblr.com/post/154168657025
via Zoe Hamilton

IT Priorities 2017: What will IT decision-makers be focusing on?

Each year, TechTarget looks at how CIOs and senior IT decision-makers will be investing in IT in the 12 months ahead

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404188/IT-Priorities-2017-What-will-IT-decision-makers-be-focusing-on


from Tumblr http://zoehamilton671.tumblr.com/post/154168656695
via Zoe Hamilton

Security Think Tank: Communication is key to cyber security in digital era

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Communication-is-key-to-cyber-security-in-digital-era


from Tumblr http://zoehamilton671.tumblr.com/post/154166880645
via Zoe Hamilton

40 firms to trial IBM Watson cognitive computing for cyber security

Forty companies sign up to apply IBM’s Watson cognitive computing systems to cyber security, but threat intelligence experts caution against total reliance on such systems

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404252/40-firms-to-trial-IBM-Watson-cognitive-computing-for-cyber-security


from Tumblr http://zoehamilton671.tumblr.com/post/154166880405
via Zoe Hamilton

Tuesday 6 December 2016

Dailymotion breach prompts calls for password alternatives

The latest breach of millions of user details prompts fresh calls for better security of user data and an alternative to passwords

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404205/Dailymotion-breach-prompts-calls-for-password-alternatives


from Tumblr http://zoehamilton671.tumblr.com/post/154126139230
via Zoe Hamilton

This App Wants to Be Your Encrypted, Self-Destructing Slack

This App Wants to Be Your Encrypted, Self-Destructing Slack
As anxiety grows over leaked, hacked, and subpoenaed conversations, Wickr is expanding its encrypted messaging app into workplace collaboration. The post This App Wants to Be Your Encrypted, Self-Destructing Slack appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/wickr-professional-encrypted-work-chat/
from Tumblr http://zoehamilton671.tumblr.com/post/154125060430
via Zoe Hamilton

Security Think Tank: How to make cyber risk easier for business to understand

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-How-to-make-cyber-risk-easier-for-business-to-understand


from Tumblr http://zoehamilton671.tumblr.com/post/154116802970
via Zoe Hamilton

UK falls below global cyber security confidence

Global confidence in ability to accurately assess cyber risk has fallen in the past year, but the UK has fallen below the global average

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404174/UK-falls-below-global-cyber-security-confidence


from Tumblr http://zoehamilton671.tumblr.com/post/154116699540
via Zoe Hamilton

Monday 5 December 2016

What happens to data protection when we leave the EU?

The UK was a keen participant in the formulation of new data protection laws for the European Union, but its electorate has since voted to leave the EU. How is that likely to affect data protection in the UK once Brexit is accomplished?

from ComputerWeekly: IT security http://www.computerweekly.com/feature/What-happens-to-data-protection-when-we-leave-the-EU


from Tumblr http://zoehamilton671.tumblr.com/post/154083060840
via Zoe Hamilton

Obama Has a Plan to Fix Cybersecurity, But Its Success Depends on Trump

Obama Has a Plan to Fix Cybersecurity, But Its Success Depends on Trump
Obama’s presidential commission on cybersecurity wants consumer product security ratings and a new generation of government hackers. Will Trump listen? The post Obama Has a Plan to Fix Cybersecurity, But Its Success Depends on Trump appeared first on WIRED.

from WIRED https://www.wired.com/2016/12/obama-cybersecurity-plan/
from Tumblr http://zoehamilton671.tumblr.com/post/154080862905
via Zoe Hamilton

The ICO drafts in expertise of former diplomat

Former British diplomat Rob Luke takes up the role of the ICO’s second deputy commissioner in January 2017

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404130/The-ICO-drafts-in-expertise-of-former-diplomat


from Tumblr http://zoehamilton671.tumblr.com/post/154079368445
via Zoe Hamilton

Europol hosts simulated cyber attack on retail sector

Europol and MasterCard hold a retail cyber attack simulation exercise to raise awareness of the issue and how to respond to attacks, as well as promote information sharing in the sector

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404120/Europol-hosts-simulated-cyber-attack-on-retail-sector


from Tumblr http://zoehamilton671.tumblr.com/post/154079368345
via Zoe Hamilton

Security Think Tank: Cyber risk not just an IT issue

How can information security professionals help businesses to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-risk-not-just-an-IT-issue


from Tumblr http://zoehamilton671.tumblr.com/post/154079368200
via Zoe Hamilton

UK and European firms to continue to invest in data protection ahead of GDPR

Data protection is to remain a key focus for IT security investment for European firms in 2017, but the emphasis is on cloud and mobile security as companies move to these technology platforms

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404112/UK-and-European-firms-to-continue-to-invest-in-data-protection-ahead-of-GDPR


from Tumblr http://zoehamilton671.tumblr.com/post/154073605005
via Zoe Hamilton

Top 10 ANZ enterprise IT stories of 2016

Here is a rundown of Computer Weekly’s most popular ANZ enterprise IT articles for 2016

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403537/Top-10-ANZ-enterprise-IT-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154071251375
via Zoe Hamilton

Top 10 Asean enterprise IT stories of 2016

The 10 most popular Asean articles of 2016

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403540/Top-10-Asean-enterprise-IT-stories-of-2016


from Tumblr http://zoehamilton671.tumblr.com/post/154071251130
via Zoe Hamilton

Friday 2 December 2016

Security Think Tank: Cyber security must be recognised as a fundamental component of business

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-security-must-be-recognised-as-a-fundamental-component-of-business


from Tumblr http://zoehamilton671.tumblr.com/post/153953428260
via Zoe Hamilton

Security veteran urges firms to prioritise spear phishing defence

UK firms should prioritise defence against spear phishing as a key component of cyber attacks, according to security veteran Peter Wood

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404028/Security-veteran-urges-firms-to-prioritise-spear-phishing-defence


from Tumblr http://zoehamilton671.tumblr.com/post/153949717695
via Zoe Hamilton

UK helps dismantle Avalanche global cyber network

The UK’s National Crime Agency has contributed to the takedown of a cloud-based cyber crime network in a collaborative law enforcement operation involving 30 countries

from ComputerWeekly: IT security http://www.computerweekly.com/news/450404018/UK-helps-dismantle-Avalanche-global-cyber-network


from Tumblr http://zoehamilton671.tumblr.com/post/153949717460
via Zoe Hamilton

Academics link payment card vulnerability to Tesco Bank cyber heist

UK academics uncover a vulnerability in online payment systems, which they say could have been used in the Tesco Bank cyber heist

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403998/Academics-link-payment-card-vulnerability-to-Tesco-Bank-cyber-heist


from Tumblr http://zoehamilton671.tumblr.com/post/153944012450
via Zoe Hamilton

Thursday 1 December 2016

Mirai botnet hits Post Office Broadband and Kcom customers

Broadband providers Post Office Broadband and Kcom are among a number of operators to have been hit by a hack targeting Zyxel routing hardware

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403957/Mirai-botnet-hits-Post-Office-Broadband-and-Kcom-customers


from Tumblr http://zoehamilton671.tumblr.com/post/153911407585
via Zoe Hamilton

US and UK government expand surveillance powers

The US has introduced wide new hacking powers for federal agents a day after the UK’s Investigatory Powers Act firmed up bulk surveillance powers for intelligence and polices services

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403905/US-and-UK-government-expand-surveillance-powers


from Tumblr http://zoehamilton671.tumblr.com/post/153907633740
via Zoe Hamilton

Security Think Tank: Cyber security is everyone’s responsibility

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses?

from ComputerWeekly: IT security http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-security-is-everyones-responsibility


from Tumblr http://zoehamilton671.tumblr.com/post/153907633650
via Zoe Hamilton

Mozilla and Tor issue patches for Firefox flaw exposing Tor users

Users of Tor anonymous browsing urged to update to the latest versions of relevant software to block an exploit that collects IP and MAC addresses to identify users

from ComputerWeekly: IT security http://www.computerweekly.com/news/450403896/Mozilla-and-Tor-issue-patches-for-Firefox-flaw-exposing-Tor-users


from Tumblr http://zoehamilton671.tumblr.com/post/153902120010
via Zoe Hamilton