FBI used drive-by downloads to track child porn suspects hidden on Tor

The FBI has been silently installing spyware in its quest to identify and prosecute criminals hiding behind the powerful Tor anonymity system. The technique’s a classic tool in the malware writer’s kit. Do the ends justify the means when it’s the law, using it to capture child abusers?

HP finds that “Internet of Things” gadgets are sitting ducks

TVs, webcams, thermostats, remote power outlets, sprinkler controllers, door locks, home alarms, scales and garage door openers: they’re all flunking Security 101, with issues as bad as “Sure, go ahead, we consider ‘1234’ to be a perfectly acceptable password.”

Apple faces class action suit for tracking users without consent

A Californian plaintiff says that nobody at Apple ever told her about tracking her whereabouts, nor did anybody ever ask for her permission. She says she only found out about it by watching a recent Chinese state TV report about iPhone being a security risk to the state.

Security must come first! 60 Sec Security [VIDEO]

Here’s this week’s 60 Second Security. News you can learn from, in just one minute…

Tor attack may have unmasked anonymous users

Two Carnegie-Mellon researchers had planned a highly anticipated talk at next week’s Black Hat security conference – a talk that was cancelled when the university’s lawyers freaked out – about how easy it is to break Tor anonymity. They’re innocent until proved guilty, but The Tor Project says it was likely the two researchers are behind the attack.

US Senator takes a swing at the NSA

If it emerges unscathed from the chamber, it could mean an end to bulk metadata collection, an end to the secrecy the government’s been operating under, and reform of the USA Patriot Act that’s been used to grant it vast surveillance rights.

3 security mistakes small companies make and how to avoid them

Dedicated IT staff are a luxury most very small businesses do without but those organisations still need to find a way to secure their computers against cyber ciminals who aren’t looking to cut them a break just because they’re small.