Attention torrent users! WiHD leak threatens your data!

Following the increasing exchange rates and the prices of content such as games and movies, Torrent, which was once overlooked by all users, started to gain popularity again. And then, as you can guess, many malicious hackers wanted to use this popularity to obtain some data. One of these threatens users who download content such as movies and TV series via Torrent. Here is the Torrent data vulnerability and its details…

Torrent WiHD leak may have exposed all your data!

Torrent, the world-famous platform that allows you to download content such as free movies, TV series, games and programs over the internet, has caused the data of some users to be disclosed. Although Torrent did not cause this situation, Torrent users were left with a big threat.

Regarding the subject, we can say that the Torrent system is an intermediary platform that allows you to download content via viewer applications on the platform. One of the most popular of these viewer applications is WiHD. WiHD is an application that has become popular especially with its content such as TV series and movies in HD format. However, many users were using WiHD to watch movies and TV series.

Zoom, the rising star of the pandemic, is making innovations!

Zoom, the rising star of the pandemic, is making innovations!

Zoom, which entered our lives with the pandemic that ravaged the world, has now become even stronger with artificial intelligence tools.

However, a vulnerability in the application attracted the attention of malicious people. And thus he stole the data of almost 100 thousand people. According to the WiHD team, this data consists of user emails, IP addresses, service provider information, usernames and hashed passwords for all Torrent users. While IP address and service provider information are a serious threat here, if you are a WiHD user, you may constantly receive infected e-mails containing advertisements to your e-mail on the application.

Experts on the subject explained, “Threat actors may engage in a variety of illegal activities, such as tracking and identifying users for legal consequences, launching spear-phishing attacks or potentially revealing users’ downloading habits, increasing the privacy and legal concerns of affected individuals.”

source site-28