August 20, 2013Grayson Milbourne By Grayson Milbourne

ThreatVlog Episode 1: Tor and Apple exploits revealed

What is Tor? Is it really secure? What about the Apple App Store approval process? Are all these applications really looked at?

In today’s episode, Grayson Milbourne covers the exploitation of the Tor network through Firefox and a proof of concept showing just how insecure Apple app testing can be.

Share Button

One Response to ThreatVlog Episode 1: Tor and Apple exploits revealed

  1. Pingback: [Video] ThreatVlog, Episode 2: Keyloggers and your privacy | Webroot Threat Blog - Internet Security Threat Updates from Around the World

Leave a Reply

Your email address will not be published. Required fields are marked *

true