Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Issue 188

Ready to submit your Watch apps? It's almost go time. FRP and Swift and major 3D game engine releases.

Published on: March 06, 2015 | Source: iOS Dev Weekly favicon iOS Dev Weekly

The Ethereum Development Process

So I'm not sure if this kind of development methodology has ever been applied to such an extreme before so I figured I'd document it. In a nutshell, it's sort of like test-driven triplet-programming development. While speed-developing our alpha codebase, four of us sat around a table in the...

Published on: March 05, 2015 | Source: Ethereum Blog favicon Ethereum Blog

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

Published on: March 05, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

Published on: March 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

The Ethereum Launch Process

I’m Vinay Gupta, the newly minted release coordinator for Ethereum. I’ve been working with the comms team on strategy, and have now comeaboard to help smooth the release process (some of the content in this blog is out of date, please see this link for the most up to date...

Published on: March 03, 2015 | Source: Ethereum Blog favicon Ethereum Blog

Gav’s Ethereum ÐΞV Update V

I was woken by Vitalik's call at 5:55 this morning; pitch black outside, nighttime was still upon us. Nonetheless, it was time to leave and this week had best start on the right foot. The 25-minute walk in darkness from the Zug-based headquarters to the train station was wet....

Published on: March 02, 2015 | Source: Ethereum Blog favicon Ethereum Blog

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

Published on: March 02, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 187

New Playgrounds in Xcode 6.3 beta 2, a huge list of Swift resources and how to sell an app.

Published on: February 27, 2015 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Europol shuts down Ramnit botnet used to steal bank details

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

Published on: February 26, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

5 common customer relationship mistakes (and how to fix them)

If customers are unhappy, they won’t remain customers for long. Here are some strategies to improve customer satisfaction and encourage them to help you attract more customers.

Published on: February 24, 2015 | Source: TechRadar favicon TechRadar

Lenovo and Superfish? Don't panic, you may not be affected

Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

Published on: February 20, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 186

Visual editor for CA animations, never struggle with dates again in Swift and how notifications have evolved throughout the ages.

Published on: February 20, 2015 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Jamie Oliver website serves up a side of malware

Jamie Oliver's website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.

Published on: February 19, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

The Subjectivity / Exploitability Tradeoff

One of the issues inherent in many kinds of consensus architectures is that although they can be made to be robust against attackers or collusions up to a certain size, if an attacker gets large enough they are still, fundamentally, exploitable. If attackers in a proof of work system have...

Published on: February 14, 2015 | Source: Ethereum Blog favicon Ethereum Blog

Facebook exploit allowed attackers to remotely delete photos

A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.

Published on: February 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Electronic health records and data abuse: it's about more than medical info

After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.

Published on: February 13, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 185

Swift 1.2, UXKit in Xcode 6.3 beta, Swift on Windows(β€½) and is your app a zombie in the App Store?

Published on: February 13, 2015 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Is your valentine for real? Six signs you might be falling for an online dating scam

With Valentine’s Day nearly upon us, millions will be looking for love online. Here's six online dating scams to look out for.

Published on: February 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook launches ThreatExchange for companies to share security threats

Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.

Published on: February 12, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Security terms explained: What does Zero Day mean?

One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.

Published on: February 11, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.

Published on: February 10, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Common eBay scams and how to avoid them

Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most common eBay scams and how they can be avoided.

Published on: February 09, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 184

Is UXKit framework something to get excited about? How much does it cost to build an app? Design walkthroughs of Audio Hijack and Twitter Video.

Published on: February 06, 2015 | Source: iOS Dev Weekly favicon iOS Dev Weekly

What are the alternatives to passwords?

Is it time for big companies - at the very least - to abandon weak password security? If so, what password alternatives are there?

Published on: February 05, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

The utterly crazy story of the death threat hacker (involves a cat)

A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.

Published on: February 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Internet Explorer exploit could let phishers steal logins

A vulnerability in the latest patched version of Microsoft Internet Explorer that could allow hackers to launch "highly credible phishing attacks" has been uncovered, according to PC World.

Published on: February 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook turns 11 - what you need to know, and what do your likes say about you?

Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about the new settings and how they could affect you.

Published on: February 04, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

White House seeks 10% increase in cybersecurity spend

President Obama's budget proposal for the 2016 fiscal year includes a projected 10 percent increase in cybersecurity spend, reports Reuters.

Published on: February 03, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

The New Hacker's List and an Old Debate: Would you Hire a Hacker?

The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?

Published on: February 03, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Facebook porn scam infects 110k users in 48 hours

A new porn scam is spreading startlingly quickly through Facebook - one that has managed to spread malware to over 110,000 users in 48 hours, reports The Guardian.

Published on: February 02, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 183

What's happening with the iTunes Connect data leak? React Native and Building Classic Mac OS X apps on Yosemite!

Published on: January 30, 2015 | Source: iOS Dev Weekly favicon iOS Dev Weekly

MSIL/Agent.PYO: Have botnet, will travel

ESET's researchers recently encountered a piece of malware targeting the filling of the forms belonging to the Consulate of Poland. To understand why it is first necessary to have a brief look at the application process for visas.

Published on: January 29, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

The P + epsilon Attack

Special thanks to Andrew Miller for coming up with this attack, and to Zack Hess, Vlad Zamfir and Paul Sztorc for discussion and responses One of the more interesting surprises in cryptoeconomics in recent weeks came from an attack on SchellingCoin conceived by Andrew Miller earlier this month. Although...

Published on: January 28, 2015 | Source: Ethereum Blog favicon Ethereum Blog

Taylor Swift hacked, but denies naked pictures will be leaked

Singer Taylor Swift has had her Twitter and Instagram accounts hacked, but laughed off claims that the hackers will release nude photographs of her.

Published on: January 28, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Android Wi-Fi Direct bug means hackers can reboot your device

A vulnerability in Android's Wi-Fi Direct functionality has been uncovered by security researchers.

Published on: January 27, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity