My analysis was on Philly.com attached are my findings.
ITACS 5211: Introduction to Ethical Hacking
Wade Mackay
Since we had a brief discussion about TOR last class I thought this article was interesting. It talks about a Zero-Day exploit that propagated on the TOR network. It took advantage of a FireFox exploit and was very similar to one that the FBI has used in the past. Unfortunately these are older vulnerabilities that have still not been patched up. But the point is that TOR is a probably not ideal for people seeking privacy or secure web browsing.
http://www.securityweek.com/tor-users-targeted-firefox-zero-day-exploit
This is an interesting twist on disclosing breaches. This can become an interesting conflict for an organization that may need to contain a breach for various reasons while also having an obligation to its shareholders to share the conditions of the organization. This article mentions the most reason case of the pending merger of Verizon and Yahoo. Since Yahoo had just recently disclosed that it had suffered a massive breach it may have a huge financial impact on Yahoo which Verizon did not account for when making an offer.
http://www.forbes.com/sites/christopherskroupa/2016/10/27/exposing-litigation-the-hidden-risks-of-cyber-breach/#7930f77c1988