Misbehaving hidden service directories are scattered around the world.
Category: Technology Lab
“Introspection Engine” might one day work with wide variety of smartphones.
Code-execution vuln resides in code used in cell towers, radios, and basebands.
Sites exploited by SoakSoak bots give the gift of CryptXXX malware.