Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Even though WhatsApp now encrypts all of its messages and data, it pays to be secure with your chats. Here are our top WhatsApp security tips.
Published on: January 26, 2015 | Source:Warning: this post contains crazy ideas. Myself describing a crazy idea should NOT be construed as implying that (i) I am certain that the idea is correct/viable, (ii) I have an even >50% probability estimate that the idea is correct/viable, or that (iii) "Ethereum" endorses any of this in any...
Published on: January 23, 2015 | Source:NSA whistleblower Edward Snowden has claimed he doesn't use an iPhone for fear of surveillance technology in the smartphone, reports The Independent.
Published on: January 23, 2015 | Source:Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?
Published on: January 23, 2015 | Source:Are you 64 bit and iOS 8 ready? Feb 1st deadline for new apps approaches! What conferences are you attending this year?
Published on: January 23, 2015 | Source:Cybercrime: there's too much of it, and we need to do more to deter it. With the President of the United States now making frequent references to "doing more about cybercrime" now is a good time to look at what steps must be taken.
Published on: January 20, 2015 | Source:A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.
Published on: January 19, 2015 | Source:Lizard Squad failed to encrypt its database of LizardStresser's registered users - storing details of their usernames and passwords in plaintext. A schoolboy error if ever I heard one.
Published on: January 19, 2015 | Source:Swift on the way up, Core Graphics in Swift, Watch-a-palooza and App Store revenue stories.
Published on: January 16, 2015 | Source:The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to pay the ransom demanded by the attackers
Published on: January 14, 2015 | Source:President Barack Obama is planning to push legislation which would protect companies from lawsuits for sharing cyberthreat data with the government, reports the Washington Post.
Published on: January 13, 2015 | Source:The rent-a-DDoS service that knocked out Xbox Live and Playstation Network is powered by thousands of hacked residential internet routers.
Published on: January 13, 2015 | Source:British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies
Published on: January 13, 2015 | Source:It started, innocently enough, as a question asked in the ESET Security Forum titled "Eset β Do I Really Need Antivirus On My Linux Distros?" However, the answer to that seemingly simple question on Linux antivirus is more complex than a simple yes-or-no response.
Published on: January 13, 2015 | Source:Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software
Published on: January 12, 2015 | Source:Special thanks to Vlad Zamfir and Jae Kwon for many of the ideas described in this post Aside from the primary debate around weak subjectivity, one of the important secondary arguments raised against proof of stake is the issue that proof of stake algorithms are much harder to make...
Published on: January 10, 2015 | Source:Back in November, we created a quick survey for the Ethereum community to help us gauge how we're doing, what can be improved, and how best we can engage with you all as we move forward towards the genesis block release in March. We feel it's very important to enable...
Published on: January 09, 2015 | Source:Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? Thereβs an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.
Published on: January 09, 2015 | Source:Facebook users around the world have reported the return of the networkβs longer-lasting hoaxes - a legal disclaimer which allows users to regain copyright over their images and other content. Here's why it doesn't work.
Published on: January 09, 2015 | Source:New App Store pricing, more commentary on Apple software quality and get yourself a WATCH for $27!
Published on: January 09, 2015 | Source:Today, we published our research about Windows exploitation in 2014. This report contains interesting information about vulnerabilities in Microsoft Windows and Office patched over the course of the year, drive-by download attacks and mitigation techniques.
Published on: January 08, 2015 | Source:While phishing-related malware is still mostly Windows targeting, attacks that rely purely on social engineering and fake web sites might be delivered by any platform, including smartphones and tablets. The more cautious you are, the better informed you are, and the more you think before you click, the more chance you have of leaving phishing craft stranded.
Published on: January 08, 2015 | Source:Are hacking victims "hacking back"? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of "hacking back" when he asked me about revenge hacking.
Published on: January 07, 2015 | Source:AOL has taken steps to stop a set of malicious advertisements being served through their sites, including The Huffington Post, Computer Business Review reports.
Published on: January 07, 2015 | Source:With nearly 160,000 lust-ridden techies, corporate denizens and a few of us security types descending on a slightly crisp wintery Las Vegas to see what all the fuss is about at CES 2015, here are a few things to keep an eye out for this year at the show.
Published on: January 07, 2015 | Source:Firstof all, happy new year! What a year it has been. With a little luck we'll surpass last year with an even more awesome year.It's been too long since I've given an update on my side of things and that of the Go team and mostly due to a lack...
Published on: January 06, 2015 | Source:19,000 Bitcoin - valued at around $275 each, so $5 million together - have been stolen from a majour European Bitcoin exchange, reports RT.
Published on: January 06, 2015 | Source:Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.
Published on: January 06, 2015 | Source:Happy New Year everyone. Here's to a great 2015!
Published on: January 02, 2015 | Source:One of the criticisms that many people have made about the current direction of the cryptocurrency space is the increasing amount of fragmentation that we are seeing. What was earlier perhaps a more tightly bound community centered around developing the common infrastructure of Bitcoin is now increasingly a collection of...
Published on: December 31, 2014 | Source:Like many others, I was enchanted by The Hobbit (and later Lord of the Rings) at a young age - long before Peter Jackson turned J R R Tolkien's middle-earth fantasy books into a series of blockbuster movies.
Published on: December 29, 2014 | Source:Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones - but biometrics may not be as secure as many believe.
Published on: December 29, 2014 | Source:The crypto 2.0 industry has been making strong progress in the past year developing blockchain technology, including the formalization and in some cases realization of proof of stake designs like Slasher and DPOS, various forms of
Published on: December 26, 2014 | Source:Something a little different this week, my essential tools for iOS development! Enjoy!
Published on: December 26, 2014 | Source:Win32/VirLock is ransomware that locks victimsβ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting piece of malware to analyze. This is the first time such combination of malware features has been observed.
Published on: December 22, 2014 | Source: