The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: Search results for peer-to-peer

Variant of Zeusbot/Spyeye Botnet uses p2p network model

Variant of Zeusbot/Spyeye Botnet uses p2p network model

February 22, 2012Mohit Kumar
Variant of Zeusbot/Spyeye Botnet uses p2p network model Cybercriminals are using a modified version of the Zeusbot/Spyeye, which is using...
To Protect Your Devices, A Hacker Wants to Hack You Before Someone Else Does

To Protect Your Devices, A Hacker Wants to Hack You Before Someone Else Does

April 19, 2017Swati Khandelwal
It should be noted that hacking a system for unauthorised access that does not belong to you is an illegal practice, no matter what's...
Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign

Uroburos Rootkit: Most sophisticated 3-year-old Russian Cyber Espionage Campaign

March 04, 2014Swati Khandelwal
The Continuous Growth of spyware, their existence, and the criminals who produce & spread them are increasing tremendously. It’s dif...
FBI issues alert over two new malware linked to Hidden Cobra hackers

FBI issues alert over two new malware linked to Hidden Cobra hackers

May 30, 2018Swati Khandelwal
The US-CERT has released a joint technical alert from the DHS and the FBI, warning about two newly identified malware being used by the p...
Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication

Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication

May 30, 2017Swati Khandelwal
What if your laptop is listening to everything that is being said during your phone calls or other people near your laptop and even reco...
27C3: GSM cell phones even easier to tap !

27C3: GSM cell phones even easier to tap !

December 30, 2010Mohit Kumar
At the 27th Chaos Communication Congress ( 27C3 ) hacker conference, security researchers demonstrated how open source software on a number ...
Gladius Shows Promise in Utilizing Blockchain Tech to Fight Hackers

Gladius Shows Promise in Utilizing Blockchain Tech to Fight Hackers

November 27, 2017Wang Wei
Image Credit: Pixelbay Blockchain startups are cropping up left and right aiming to disrupt existing services and business models. Th...
Vigilante Hackers Aim to Hijack 200,000 Routers to Make Them More Secure

Vigilante Hackers Aim to Hijack 200,000 Routers to Make Them More Secure

February 09, 2016Swati Khandelwal
The same "Vigilante-style Hacker," who previously hacked more than 10,000 routers to make them more secure, has once again ma...
Incredible! Someone Just Hacked 10,000 Routers to Make them More Secure

Incredible! Someone Just Hacked 10,000 Routers to Make them More Secure

October 05, 2015Khyati Jain
Has anyone ever heard about a " Vigilante-style Hacker ," who hacks every possible system to make them more Secure? No. It...
Hola — A widely popular Free VPN service used as a Giant Botnet

Hola — A widely popular Free VPN service used as a Giant Botnet

May 29, 2015Swati Khandelwal
The bandwidth of Millions of users of a popular free VPN service is being sold without their knowledge in an attempt to cover the cost o...
Cyber criminals targeting another cryptocurrency 'Primecoin' with malicious miners

Cyber criminals targeting another cryptocurrency 'Primecoin' with malicious miners

January 16, 2014Mohit Kumar
Like Bitcoin, There are numerous other cryptocurrency similar in nature, including  MasterCoin , ProtoShares, Litecoin, Peercoin, BitBar and...
'Dark Mail Alliance', Future of surveillance proof email technology

'Dark Mail Alliance', Future of surveillance proof email technology

October 30, 2013Mohit Kumar
Yesterday I learned about  ' Dark Mail Alliance ', where  Lavabit , reportedly an email provider for NSA leaker Edward Snowden a...
RIP Aaron Swartz, A legendary Internet Activist

RIP Aaron Swartz, A legendary Internet Activist

January 13, 2013Anonymous
Aaron Swartz has committed suicide on January 11, 2013 in New York City.  I have long been fought if you write something about this ...
Tor Anonymizing network overload caused by Mevade Botnet

Tor Anonymizing network overload caused by Mevade Botnet

September 08, 2013Anonymous
Recently, Tor Project Director - Roger Dingledine described a sudden increase in Tor users on the Tor Network after the events related...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.