Malware is Using TOR to Bypass Your Domain Blacklists
About a week ago I turned on a new rule on our IPS system that is designed to detect (and block) users who are using TOR to make their activities on our network anonymous. You can say that TOR is about protecting a user’s privacy all you want, but I’d argue that while using corporate […]