Attackers appear to download legitimate Adobe Flash Player from Adobe and Akamai IP addresses
Users will be alerted when a 'man-in-the-middle' attack is attempted
Compromised Tor exit nodes are spying on users, according to research by Swedish security specialist Chloe