Haktuts-Hacking News

All About ethical hacking,hacking news hacker news,security news,privacy Issue,cyber crime,pentesting tools,open sources,cyber security, information security, technology news,how-to,Tips and tricks and dark web news

UTORRENT FLAGGED AS ‘MALICIOUS’ BY ANTI-VIRUS COMPANIES AND GOOGLE

in: BitTorent Google NEWS Random utorrent






Several anti-virus vendors have begun block uTorrent once examining the package as malicious or probably dangerous.
Additionally, Google Chrome is presently obstructing many pages on uTorrent's official webpage. consistent with the reports the favored file-sharing application is coupled to riskware and trojans.

With a lot of new downloads per month uTorrent is doubtless the foremost used Bit-Torrent applicant around.The package is that the main determinant of revenue for the Bit-Torrent inc,as it  generates revenue through advertisements and bundled package.

The latter currently seems to be inflicting hassle as many anti-virus vendors have begun listing uTorrent as a security risk.

The scanning result below from VirusTotal shows that a minimum of six anti-virus applications, together with ESET and Symantec, have flagged the package as problematic.
The anti-virus scans associate the uTorrent.exe file with Trojan.Win32.Generic!BT and a disputed OpenCandy bundling package. whereas this isn’t 1st time that uTorrent has been flagged like this, and haven’t seen it being described by this varied separate tests before.


In addition to action by the anti-virus firms, uTorrent is additionally being blocked by Google in many ways in which. once making an attempt to transfer the most recent stable version of the torrent applicant, Chrome flags the package as malicious and blocks the transfer, though this solely seems to happen periodically.

Google is additionally actively obstructing many pages that link to uTorrent and different BitTorrent inc. software. As per Google, elements of the uTorrent page contain “harmful programs.”

The same “harmful software” warning from Google additionally prevented a lot of folks from accessing well-liked torrent sites earlier this month.

A Google representative said that this was the results of the company’s exaggerated efforts restrict ing programs that create “unexpected changes” to people’s computers.

“Google Safe Browsing’s ability to discover deceptive package has a lot of improvement,” the co. explained in an exceedingly recent journal post.“In the approaching weeks, these detection enhancements can become a lot of noticeable in Chrome: users can see a lot of warnings regarding unwanted package than ever before.

These and therefore the different uTorrent threat reports all appear to be triggered by bundled third-party package bundled. there's no indication or proof that the BitTorrent client itself is harmful.

0 comments:

Post a Comment

Newer Post Older Post Home
Powered by Blogger.

Labels

  • Ethical hacking course

Featured post

Free Ethical Hacking Tranning

Ethical hacking and pentesting from beginners to advance are given below: Introduction Hackers Hierarchy Hackers Keyword Virus Typ...

Popular Posts

  • How To Unfriend All Facebook Friend In Single Click Using Firefox|Chrome|Opera Browser
    Unfriend all the facebook friend in single click is quite simple,just follow the given below : Steps to unfriend all the facebook friend...
  • How to secure android device from spying and location tracking
    Ever  puzzled   regarding  being snooped  on-line  by  the large    companies?  will  it raise associate  alarm in your head?  affirmative...
  • How to become admin of any facebook fan page (Hijack Facebook Fan Page)
    Hacking Any Facebook Page The latest bug in Social networking site facebook could allow attackers to  take over control of your Facebo...
  • CEH v9 : Certified Ethical Hacker V9 PDFs & Tools Download
    Download Certified Ethical Hacking ( CEHv9 ) PDF & Tools. This is a PDF & Tools collection of CEH | V9. Read to learn How to Hack ...
  • List of Top 20 Google dorks
    What is google hacking? Google hacking involves using advanced operators in the google search engine to locate the specific string of ...
  • How To Root Xiaomi Redmi Note 4 using android application
    How To Root Xiaomi Redmi Note 4 using android application Towel Root? 1). Download towel root 2). Install the application 3). Ru...
  • Free Ethical Hacking Tranning
    Ethical hacking and pentesting from beginners to advance are given below: Introduction Hackers Hierarchy Hackers Keyword Virus Typ...
  • How to build linux web server
    How to build linux web server Out for a walk one day, a woman came across a construction site and saw three men working. She asked the ...
  • How to Hack|Crack wpa wpa2-psk wifi using social engineering technique WIFIPHISHER
    Requirements Kali Linux. Two wireless network adapters; one capable of injection. Wifiphisher script  Follow the given below ste...
  • How to root all samsung device
    SAMSUNG DEVICES: 1. Root Samsung Galaxy S Duos S7562 a)  Samsung KIES b)  Rooting file 2. Root Samsung Gravity Q using one click me...

About This Blog