Security News



Researchers warn several BitTorrent protocols can be leveraged to carry out distributed reflective denial of service (DRoS) attacks.



A group of researchers have discovered a new type of DoS attack that can be pulled off by a single attacker exploiting weaknesses in the BitTorrent protocol family. The weaknesses in the Micro Tran...




After an initial pre-alpha release in July 2014, BitTorrent's peer-to-peer private voice and text app Bleep is finally available for curious Windows, Mac, iOS and Android users to test it out. The ...