-
Ars Technica
Feb 20, 2018, 10:47 pm397 ptsEnlarge / A screenshot of one of the uTorrent PoC exploits in action. (credit: Google Project Zero) Two versions of uTorrent, one of the Internet's most widely used BitTorrent apps, are vulnerable to a host of easy-to-exploit vulnerabilities that allow attackers to execute code, access downloaded files, and…
Trending Today on Tech News Tube
Tech News Tube is a real time news feed of the latest technology news headlines.
Follow all of the top tech sites in one place, on the web or your mobile device.
Follow all of the top tech sites in one place, on the web or your mobile device.