Friday, March 27, 2015

You may use these HTML tags and attributes:


Category Category tagged list Analytics Botnets Virtualization Malware DoS-attacks Category list Law & Order cyber Cryptography Fraud Category list Vulnerabilities Spam Phishing Hackers Authors Dennis Fisher Maxim Zaitsev Michael Mimoso Christopher Brook Brian Donohue Anne Saita Invited News Service Kaspersky Lab Home News Service Kaspersky Lab
0
Last week, it became clear that the most popular torrent client uTorrent when upgrading sets miner Cryptocurrency without the consent of the user that has not escaped the attention of many: in BitTorrent, the company - developer of uTorrent, asked customers notice a significant decrease in the performance of their PC. Later it became tagged known that the computer with the latest version of the torrent client to install software called Epic Scale, which is hidden CPU resource used for mining one of the most popular types of Cryptocurrency - laytkoinov.
At the moment, after a powerful stream of complaints BitTorrent stopped delivering client version with miner. According to the developer, Epic Scale tool has been installed on the machine 6% of users have downloaded uTorrent over the past couple of months.
Despite the dissatisfaction of users, representatives BitTorrent denies the fact of concealed installation tagged of unwanted programs. "We considered a precedent and can confirm that the installation of Epic Scale is carried out only with the consent of the user, as described in the user agreement when installing our torrent client. Like many developers, tagged we are working with partners which integrate their products into our own, but extra "partnership" program is completely voluntary for the user, "- noted in BitTorrent.
It is quite logical that such a way of earning actively exploited by developers of free software. It seems likely that the users themselves need to put a check too lazy to fully read the user agreement when installing. And let it formally takes responsibility with BitTorrent, puzzling the choice of partner: as you know, bitcoin miners often used botnet owners to "pumping" of the computing power of compromised machines for the purpose of mining Cryptocurrency, and their reputation is known to all. Therefore, from harm's way creators tagged brought uTorrent users apology and recommended to uninstall and remove Epic Scale appropriate tagged folder. At the same time, they called moral support to affected developer Epic Scale, which sends generated in the course of mining resources in a variety of NGOs, including Watsi, to raise funds for operations and Immunity Project, tagged which is engaged in the fight against HIV. Epic Scale itself also apologized to users and issued detailed instructions on removing tagged its software.
You may use these HTML tags and attributes: <a href="" title=""> <abbr title = ""> <acronym title = ""> <b> <blockquote tagged cite = ""> <cite> <code> <del datetime = ""> <em> <i> <q cite = ""> <strike> <strong>
by Maxim Zaitsev
March 26, 2015, 20:30 Customers will pay $ 10 million for the leakage of data in stores
Yesterday arrived very good news: we have finally, 1 in the European retail sector (retail)! There is an analytical agency GfK, which carefully considers the who, where and what sells. And fresh pr ...
This story began when I got to the popular fitness bracelet and I installed on Android-smartphone app to communicate with the device. The program inadvertently tagged linked to a bracelet of my colleagues. After ...
For fans of online games hunts kriptolokera tagged special variant, tagged and this story is much more serious than it seems at first glance. It seems that hackers have found a great way to get those ready to pla ...
Android smartphones and tablets are very popular among students for several reasons. tagged First, they are relatively affordable. Second, they are flexible, so users can choose the most suitable set-up for ...
Categories DoS-attack | Uncategorized | analytics | Botnets | Virtualization | malware | Home | Law and Order | cyber defense | Cryptography | fraud | M & A | spam | Leaks | Vulnerabilities | phishing | Hackers


No comments:

Post a Comment