[Video] ThreatVlog, Episode 1: Tor and Apple exploits revealed


What is Tor? Is it really secure? What about the Apple App Store approval process? Are all these applications really looked at?

In today’s episode, Grayson Milbourne covers the exploitation of the Tor network through Firefox and a proof of concept showing just how insecure Apple app testing can be.

One thought on “[Video] ThreatVlog, Episode 1: Tor and Apple exploits revealed

  1. Pingback: [Video] ThreatVlog, Episode 2: Keyloggers and your privacy | Webroot Threat Blog - Internet Security Threat Updates from Around the World

Join the Conversation

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s