The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: Search results for peer-to-peer

Windows 10 to deliver updates and App downloads via Peer-to-Peer Technology

Windows 10 to deliver updates and App downloads via Peer-to-Peer Technology

March 16, 2015Swati Khandelwal
Does downloading Windows updates from Microsoft's servers and waiting too long really annoy you? It might not be with the arrival of...
Ricochet — Most Secure Peer-to-Peer Encrypted Messenger that Sends No Metadata

Ricochet — Most Secure Peer-to-Peer Encrypted Messenger that Sends No Metadata

February 23, 2016Swati Khandelwal
There are several encrypted messaging apps for mobile and desktop platforms that shipped with "The Most Secure" tagline but e...
Google Solves Update Issue for Android Apps Installed from Unknown Sources

Google Solves Update Issue for Android Apps Installed from Unknown Sources

June 20, 2018Swati Khandelwal
If you are wondering how to receive latest updates for an Android app—installed via a 3rd party source or peer-to-peer app sharing—directly ...
Federal Judge ruled at Child pornography case, 'Your Peer-to-Peer file sharing data is not a private matter'

Federal Judge ruled at Child pornography case, 'Your Peer-to-Peer file sharing data is not a private matter'

November 13, 2013Mohit Kumar
Today computer telecommunications have become one of the most prevalent techniques used by pedophiles to share illegal photographic image...
THOR : Another P2P Botnet in development with extra stealth features

THOR : Another P2P Botnet in development with extra stealth features

March 05, 2012Mohit Kumar
THOR : Another P2P Botnet in development with extra stealth features The research community is now focusing on the integration of peer-to-...
OTR.to — Secure 'Off-the-Record' p2p Encrypted Messaging Service

OTR.to — Secure 'Off-the-Record' p2p Encrypted Messaging Service

March 09, 2015Wang Wei
In this post-Snowden era of mass surveillance, being out-of-reach from the spying eyes really doesn't mean they can not get you. So,...
Is WikiLeaks Really Hacking for Secrets !

Is WikiLeaks Really Hacking for Secrets !

February 04, 2011Mohit Kumar
In April 2009 the whistle-blower website WikiLeaks appear a abstruse U.S. aggressive certificate account abstruse capabilities of the U.S. N...
The Pirate Bay ~ Best Free Movie Download Torrent Sites (2018)

The Pirate Bay ~ Best Free Movie Download Torrent Sites (2018)

September 30, 2018Wang Wei
The Pirate Bay torrent search engine is one of the world's most famous and best torrent sites . But it has been caught second time mi...
Telegram Calling Feature Leaks Your IP Addresses—Patch Released

Telegram Calling Feature Leaks Your IP Addresses—Patch Released

September 30, 2018Swati Khandelwal
The desktop version of the security and privacy-focused, end-to-end encrypted messaging app, Telegram , has been found leaking both users...
How to Share Sensitive Files Instantly and Securely

How to Share Sensitive Files Instantly and Securely

May 12, 2015Mohit Kumar
Last week, I have to communicate with my friend overseas in China. We both were aware that our email communications were being monitored...
Sadly, Windows 10 Is Stealing Your Bandwidth 'By Default' — Disable It Immediately

Sadly, Windows 10 Is Stealing Your Bandwidth 'By Default' — Disable It Immediately

August 02, 2015Swati Khandelwal
After installing Windows 10, Feeling like your Internet Bandwidth is dropping away? Windows 10 is stealing your network bandwidth. ...
BitTorrent Unveiled New Decentralized "Bleep" Instant Messenger

BitTorrent Unveiled New Decentralized "Bleep" Instant Messenger

July 31, 2014Mohit Kumar
Pretty good news for privacy-oriented people! BitTorrent unwraps its new instant messaging program that doesn’t store your metadata and help...
Net pirate monitoring firm hacked !

Net pirate monitoring firm hacked !

May 17, 2011Mohit Kumar
A firm employed by the French government to track down net pirates has been hacked. Trident Media Guard is believed to have exposed a range...
New Dead drop techniques used by Security Agencies

New Dead drop techniques used by Security Agencies

November 09, 2012Mohit Kumar
Paul F Renda give an overview that, What and how new long distance and short distance Dead drop techniques are used by National Security ...
New KickAss Torrents (KAT) ~ 2018 Best Torrent Sites (Working)

New KickAss Torrents (KAT) ~ 2018 Best Torrent Sites (Working)

September 30, 2018Wang Wei
Good news, the new Kickass Torrents site is back from the dead! Back in July 2017, popular BitTorrent site Kickass Torrents (KAT cr) wa...
Kelihos Botnet with 110,000 PCs take down finally

Kelihos Botnet with 110,000 PCs take down finally

March 29, 2012Mohit Kumar
Kelihos Botnet with 110,000 PCs take down finally Botnets are particularly insidious, using thousands of virus-infected computers which t...
Over 51 Million Accounts Leaked from iMesh File Sharing Service

Over 51 Million Accounts Leaked from iMesh File Sharing Service

June 13, 2016Swati Khandelwal
How many more data dumps does this hacker have with him that has yet to be exposed? Well, no one knows the answer, but we were recently...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.