{"id":808,"date":"2018-02-24T23:11:47","date_gmt":"2018-02-25T04:11:47","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=808"},"modified":"2018-02-24T23:11:47","modified_gmt":"2018-02-25T04:11:47","slug":"latest-utorrent-bug-can-control-computer-steal-downloads","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/","title":{"rendered":"Latest uTorrent bug can control your computer to steal downloads"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"738\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/microsoft-announces-new-startup-program-invest-500m-next-two-years\/cropped-baronsoftwarelogo_2018-fw_-1-png\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png?fit=474%2C98&amp;ssl=1\" data-orig-size=\"474,98\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cropped-BaronSoftwareLogo_2018.fw_-1.png\" data-image-description=\"&lt;p&gt;https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png&lt;\/p&gt;\n\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png?fit=474%2C98&amp;ssl=1\" class=\"size-medium wp-image-738 aligncenter\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png?resize=300%2C62&#038;ssl=1\" alt=\"\" width=\"300\" height=\"62\" srcset=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png?resize=300%2C62&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png?w=474&amp;ssl=1 474w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h3 style=\"text-align: center;\">Latest uTorrent bug can control your computer to steal downloads<\/h3>\n<p>Two versions of uTorrent, one of the Internet&#8217;s most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher. uTorrent developers are in the process of rolling out fixes for both the uTorrent desktop app for Windows and the newer uTorrent Web product.\u00a0 The security breach only occurs for uTorrent users.<\/p>\n<p>The vulnerabilities, according to Google make it possible for any website when a user visits to control key functions in both the uTorrent desktop app for Windows and in uTorrent Web, an alternative to desktop BitTorrent apps that uses a Web interface and is controlled by a browser. The biggest threat is posed by malicious sites that could exploit the flaw to download malicious code into the Windows startup folder, where it will be automatically run the next time the computer boots up. Any web site is open to the attack.<\/p>\n<p>Customers and developers of 3rd-party applications that rely on the default-open state of port 10000 should be aware that moving forward, clients\u00a0<em>will no longer be discoverable over port 10000<\/em>. Pairing negotiation\u00a0<em>is now only allowed over a mutually agreed upon port<\/em>. Customers can set this port manually by enabling WebUI functionality via Advanced-&gt;WebUI-&gt; Enable Web UI and then specifying a port under the Connectivity section.<\/p>\n<p>In an e-mail sent late Tuesday afternoon, Dave Rees, VP of engineering at BitTorrent, which is the developer of the uTorrent apps, said the flaw has been fixed in a beta release of the uTorrent Windows desktop app but has not yet been delivered to users who already have the production version of the app installed. The fixed version, uTorrent\/BitTorrent 3.5.3.44352, is\u00a0<a href=\"http:\/\/www.utorrent.com\/downloads\/complete\/track\/beta\/os\/win\">available here for download<\/a>\u00a0and will be automatically pushed out to users in the coming days. In a separate e-mail sent Tuesday evening, Rees said uTorrent Web had also been patched. &#8220;We highly encourage all uTorrent Web customers to update to the latest available build 0.12.0.502\u00a0<a href=\"https:\/\/web.utorrent.com\/\">available on our website<\/a>\u00a0and also via the in-application update notification,&#8221; he wrote.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Latest uTorrent bug can control your computer to steal downloads Two versions of uTorrent, one of the Internet&#8217;s most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher. uTorrent developers are in the process of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[153],"tags":[179,178,180],"class_list":["post-808","post","type-post","status-publish","format-standard","hentry","category-news-items","tag-bittorrent","tag-utorrent","tag-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Latest uTorrent bug can control your computer to steal downloads - Baron Software<\/title>\n<meta name=\"description\" content=\"Two versions of uTorrent, one of the Internet&#039;s most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest uTorrent bug can control your computer to steal downloads\" \/>\n<meta property=\"og:description\" content=\"Two versions of uTorrent, one of the Internet&#039;s most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher. uTorrent developers are in the process of rolling out fixes for both the uTorrent desktop app for Windows and the newer uTorrent Web product.\u00a0 The security breach only occurs for uTorrent users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-25T04:11:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Latest uTorrent bug can control your computer to steal downloads\" \/>\n<meta name=\"twitter:description\" content=\"Two versions of uTorrent, one of the Internet&#039;s most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher. uTorrent developers are in the process of rolling out fixes for both the uTorrent desktop app for Windows and the newer uTorrent Web product.\u00a0 The security breach only occurs for uTorrent users.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"Latest uTorrent bug can control your computer to steal downloads\",\"datePublished\":\"2018-02-25T04:11:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/\"},\"wordCount\":368,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png\",\"keywords\":[\"BitTorrent\",\"uTorrent\",\"Web\"],\"articleSection\":[\"News Items\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/\",\"name\":\"Latest uTorrent bug can control your computer to steal downloads - Baron Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png\",\"datePublished\":\"2018-02-25T04:11:47+00:00\",\"description\":\"Two versions of uTorrent, one of the Internet's most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/cropped-BaronSoftwareLogo_2018.fw_-1.png?fit=474%2C98&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/cropped-BaronSoftwareLogo_2018.fw_-1.png?fit=474%2C98&ssl=1\",\"width\":474,\"height\":98},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/latest-utorrent-bug-can-control-computer-steal-downloads\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest uTorrent bug can control your computer to steal downloads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Latest uTorrent bug can control your computer to steal downloads - Baron Software","description":"Two versions of uTorrent, one of the Internet's most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/","og_locale":"en_US","og_type":"article","og_title":"Latest uTorrent bug can control your computer to steal downloads","og_description":"Two versions of uTorrent, one of the Internet's most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher. uTorrent developers are in the process of rolling out fixes for both the uTorrent desktop app for Windows and the newer uTorrent Web product.\u00a0 The security breach only occurs for uTorrent users.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/","og_site_name":"Baron Software","article_published_time":"2018-02-25T04:11:47+00:00","og_image":[{"width":1920,"height":400,"url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","type":"image\/png"}],"author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"Latest uTorrent bug can control your computer to steal downloads","twitter_description":"Two versions of uTorrent, one of the Internet's most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher. uTorrent developers are in the process of rolling out fixes for both the uTorrent desktop app for Windows and the newer uTorrent Web product.\u00a0 The security breach only occurs for uTorrent users.","twitter_image":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"Latest uTorrent bug can control your computer to steal downloads","datePublished":"2018-02-25T04:11:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/"},"wordCount":368,"commentCount":0,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png","keywords":["BitTorrent","uTorrent","Web"],"articleSection":["News Items"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/","url":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/","name":"Latest uTorrent bug can control your computer to steal downloads - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png","datePublished":"2018-02-25T04:11:47+00:00","description":"Two versions of uTorrent, one of the Internet's most widely used BitTorrent apps, have easy to exploit vulnerabilities that allow attackers to execute code, access downloaded files, and snoop on download histories recently discovered by a Google researcher.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png?fit=474%2C98&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1.png?fit=474%2C98&ssl=1","width":474,"height":98},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/latest-utorrent-bug-can-control-computer-steal-downloads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"Latest uTorrent bug can control your computer to steal downloads"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-d2","jetpack-related-posts":[{"id":630,"url":"https:\/\/www.baronsoftware.com\/Blog\/windows-10-fall-creators-update-sdk-now-available-sweepstakes\/","url_meta":{"origin":808,"position":0},"title":"Windows 10\u2014Fall Creators Update SDK is now available Sweepstakes","author":"richard@baronsoftware.com","date":"October 19, 2017","format":false,"excerpt":"\u00a0 Windows 10 SDK Fall Creators Update SDK Downloads and tools for Windows\u00a010 Visual Studio 2017 The latest version of Visual Studio, released October 2017 The latest\u00a0Windows Standalone SDK\u00a0(ver. 10.0.16299.15) Templates for Universal Windows Platform (UWP) apps for tablet, phone, PC, Windows\u00a0IoT, or Xbox Templates for Windows desktop applications Windows\u00a010\u2026","rel":"","context":"In &quot;Microsoft Development&quot;","block_context":{"text":"Microsoft Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/microsoft-development\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/02\/Microsoft.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":411,"url":"https:\/\/www.baronsoftware.com\/Blog\/windows-developer-day-creators-update-coming\/","url_meta":{"origin":808,"position":1},"title":"Windows Developer Day Creators Update is coming up","author":"richard@baronsoftware.com","date":"January 28, 2017","format":false,"excerpt":"Windows Developer Day Creators Update is coming up On February 8, 2017 you are invited to see what\u2019s new for developers in the Windows 10 Creators Update, what it means for your apps and games, and more about Microsoft\u2019s latest developer products. Whether you\u2019re building for the web or UWP,\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"Microsoft","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/10\/microsofts-logo-gets-a-makeover-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":67,"url":"https:\/\/www.baronsoftware.com\/Blog\/microsoft-windows-10-upcoming-features\/","url_meta":{"origin":808,"position":2},"title":"Microsoft Windows 10 upcoming features","author":"richard@baronsoftware.com","date":"January 25, 2015","format":false,"excerpt":"At this writing things may change either losing some of these features or gaining a few more with the Microsoft Windows 10 preview release. As always Microsoft will show you a batch of nice features which could be in the final release or if they are truly buggy they will\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":654,"url":"https:\/\/www.baronsoftware.com\/Blog\/meltdown-spectre-vulnerabilities\/","url_meta":{"origin":808,"position":3},"title":"Meltdown and Spectre vulnerabilities","author":"richard@baronsoftware.com","date":"January 6, 2018","format":false,"excerpt":"Meltdown and Spectre vulnerabilities Recently, two critical vulnerabilities were discovered in modern processors. Dubbed \"Meltdown and Spectre\", these processor chip vulnerabilities are found on personal computers, mobile devices, and in the cloud. What is Meltdown Meltdown\u00a0exploits a flaw in out-of-order execution, a performance feature found in many modern processor chips.\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":165,"url":"https:\/\/www.baronsoftware.com\/Blog\/apple-os-x-el-capitan-is-being-released-today\/","url_meta":{"origin":808,"position":4},"title":"Apple OS X El Capitan is being released today.","author":"richard@baronsoftware.com","date":"September 30, 2015","format":false,"excerpt":"Starting on September 30th, everybody will be able to install Apple's latest OS X update, El Capitan, on their Macs. It'll be free, and given that Apple claims its predecessor had \"the fastest adoption ever\" of any PC OS, it'll be popular too. El Capitan is the small one in\u2026","rel":"","context":"In &quot;SQL Tips&quot;","block_context":{"text":"SQL Tips","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/sql-tips\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":749,"url":"https:\/\/www.baronsoftware.com\/Blog\/microsoft-office-2019-will-work-windows-10\/","url_meta":{"origin":808,"position":5},"title":"Microsoft Office 2019 will only work on Windows 10","author":"richard@baronsoftware.com","date":"February 9, 2018","format":false,"excerpt":"Microsoft Office 2019 will only work on Windows 10 Microsoft is providing an update on Office 2019 today, revealing that it will only run on Windows 10. On the Microsoft web site there is a\u00a0story\u00a0for service and support of Windows and Office, Microsoft has revealed you\u2019ll need to upgrade to\u2026","rel":"","context":"In &quot;Software Releases&quot;","block_context":{"text":"Software Releases","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-releases\/"},"img":{"alt_text":"Phone","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2016\/10\/microsofts-logo-gets-a-makeover-300x225.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=808"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/808\/revisions"}],"predecessor-version":[{"id":809,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/808\/revisions\/809"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}