Site icon Netimperative

Guest comment: Anonymity doesn’t equal cyber security

James Fox, director in the cyber security practice at KPMG in the UK, comments on the news that Tor users have been advised to check their computers for malware, following an announcement that the anonymising service has been hacked.


The hacking of Tor, a popular service, is another example of how malicious developers and hackers are coming up with more intricate ways to of infiltrating users’ devices. The risk of pernicious malware cannot be understated, with hackers looking to use these tools to gain invaluable personal and financial information through these infected devices.
Once the security of a device is compromised, any activity can be observed, all password data and personal information is made available to the attackers. These criminals can use this information to extort the victims and often sell it on the black market.
With a new hack coming to light almost every day the temptation is for users to adopt an ostrich approach and bury their head in the sand. The truth is that they shouldn’t wait for something to happen; it is becoming increasingly important for people to take control of their own security. Rather than assume everything is OK, individuals in a personal capacity or as employees must take steps to know that the files and emails they click on are from trusted sources.

Exit mobile version