October 05, 2016 Unmasking Tor users with DNS The DefecTor attack uses DNS lookups to create a new spin on correlation attacks. Naked Security
March 11, 2016 IS defector steals USB stick revealing 22K members identities The disillusioned ex-fighter brought with him a stolen USB drive containing names, addresses, and phone numbers of Islamic State jihadis. Naked Security