Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

ÐΞVcon-0 Recap

Day 1 - Monday 24th Nov - ÐΞV: Mission and Processes The first day of ÐΞVcon-0 kicked off early at 7am with the Ethereum UK communications team arriving at the venue (Ethereum Dev UG’s workspace in Kreuzberg, Berlin) to set up the 4K high quality recording equipment and arrange the...

Published on: December 05, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Issue 175

More woes with extensions and the app review process. Getting started with Pay for selling physical goods and of course, more WatchKit goodness!

Published on: December 05, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Firefox 34 disables SSL 3.0 and tackles eight security fixes

Firefox 34, the latest version of the Mozilla's popular web browser has disabled support for SSL 3.0 in reaction to the POODLE exploit, reported by We Live Security back in October.

Published on: December 04, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

From inside Ethereum ÐΞVhub Berlin

Yesterday was the first proper day of ÐΞVhub Berlin being open, following the first Ethereum internal developers' symposium ÐΞVcon-0. I want to post a few images to let you gauge the mood here. Henning, Marek, Viktor and Felix hacking on the couch

Published on: December 02, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Introduction to Service Worker: How to use Service Worker

Service Worker will revolutionize the way we build for the web. Learn about what it is, why it is important and how to use it.

Published on: December 01, 2014 | Source: HTML5 Rocks favicon HTML5 Rocks

Issue 174

CocoaPods and Carthage, generating animation images for WatchKit and why you should never use the colour black.

Published on: November 28, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Cyber Monday - 12 tips to help you shop safely online

Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.

Published on: November 27, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Do I need to worry about state-sponsored threats like Regin?

Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or sponsored by nation states. Does an average person or business really need to worry about these things?

Published on: November 26, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Driverless cars 'could be hacked' warns Institute of Engineering and Technology

Self-driving cars are just around the corner, with the UK government putting up 10 million (around $15.6 million) for cities to pilot trials as soon as next year, but the country's Institute of Engineering and Technology (IET) today issued stern warnings about the security of the technology.

Published on: November 25, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Proof of Stake: How I Learned to Love Weak Subjectivity

Proof of stake continues to be one of the most controversial discussions in the cryptocurrency space. Although the idea has many undeniable benefits, including efficiency, a larger security margin and future-proof immunity to hardware centralization concerns, proof of stake algorithms tend to be substantially more complex than proof of work-based...

Published on: November 25, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Smart home security - how not to be dumb with your devices

It's easy to imagine that ALL connected devices - from fridges to CCTV cameras - are a security nightmare, but there are simple, sensible steps you can take to lock these risks down.

Published on: November 24, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Can e-cigarettes give you malware?

The long-term health effects of electronic cigarettes - or E-cigarettes - are still open for discussion - but the devices could harm your computer, at least if one report is to be believed.

Published on: November 22, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 173

Did someone say WatchKit? What you need to know to get started and also some regular iOS links too!

Published on: November 21, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

First exploitation of Internet Explorer 'Unicorn bug' in-the-wild

Microsoft released a patch last week for a critical vulnerability allowing remote code execution in Internet Explorer. This vulnerability is significant because it exploits an old bug present in Internet Explorer versions 3 through 11.

Published on: November 20, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

On Bitcoin Maximalism, and Currency and Platform Network Effects

One of the latest ideas that has come to recently achieve some prominence in parts of the Bitcoin community is the line of thinking that has been described by both myself and others as "Bitcoin dominance maximalism" or just "Bitcoin maximalism" for short - essentially, the idea that an environment...

Published on: November 20, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Gav’s Ethereum ÐΞV Update III

I'm Gavin Wood, a co-founder of Ethereum and, along with Vitalik Buterin and Jeffrey Wilcke, one of the three directors of the Eth Dev, the NFP organisation that is managing the development (under contract from Ethereum Suisse) of the Ethereum blockchain. This is a small update to let you all...

Published on: November 18, 2014 | Source: Ethereum Blog favicon Ethereum Blog

The Hobbit Experience 2014: Adding WebRTC gameplay to the Hobbit Experience

Learn how North Kingdom built an immersive multimedia experience optimized for modern mobile browsers using Web RTC

Published on: November 18, 2014 | Source: HTML5 Rocks favicon HTML5 Rocks

Privacy and security post-Snowden: Pew Research parallels ESET findings

Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring similar results from two different privacy and security surveys conducted by ESET.

Published on: November 17, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Public Wi-Fi hotspots - know the risks

For ordinary laptop and smartphone users, Wi-Fi is not ideal - but it’s sometimes near-inescapable.

Published on: November 14, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

G20 2014 Summit Lure used to target Tibetan activists

APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.

Published on: November 14, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

IT Pros also guilty of risqué selfies on mobiles

ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them embarrassed if lost.

Published on: November 14, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 172

iOS development in Visual Studio, Swift app experiments and geiger counters for your frame rates.

Published on: November 14, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Scalability, Part 3: On Metacoin History and Multichain

Special thanks to Vlad Zamfir for much of the thinking behind multi-chain cryptoeconomic paradigms First off, a history lesson. In October 2013, when I was visiting Israel as part of my trip around the Bitcoin world, I came to know the core teams behind the colored coins and Mastercoin...

Published on: November 13, 2014 | Source: Ethereum Blog favicon Ethereum Blog

.NET goes open source and cross-platform

Microsoft's .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.

Published on: November 13, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Korplug military targeted attacks: Afghanistan & Tajikistan

After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one

Published on: November 12, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

The Search for a Stable Cryptocurrency

Special thanks to Robert Sams for the development of Seignorage Shares and insights regarding how to correctly value volatile coins in multi-currency systems Note: we are not planning on adding price stabilization to ether; our philosophy has always been to keep ether simple to minimize black-swan risks. Results of...

Published on: November 11, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Sednit Espionage Group Attacking Air-Gapped Networks

The Sednit espionage group, also known as the Sofacy group, APT28 or “Fancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- “air-gapped” networks -- and exfiltrate sensitive files from them through removable drives.

Published on: November 11, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Apple Pay and security - what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.

Published on: November 07, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 171

iTunes Connect Analytics this Sunday? Expectations for WatchKit and the history of Core Graphics.

Published on: November 07, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

WireLurker: new malware targets Apple users

A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.

Published on: November 06, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Ethereum Community and Adoption Update - Week 1

Hi, I'm Stephan Tual, and I've been responsible for Ethereum's adoption and education since January as CCO. I'm also leading our UKÐΞVhub, located at Co-Work in Putney (South West London). I feel really privileged to be able to lead the effort on the communication strategy at ÐΞV. For the very...

Published on: November 03, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Jeff’s Ethereum ÐΞV Update I

I thought it was about time I'd give an update on my side of things for those interested in knowinghow we're doing on the Dutch side. My name is Jeff, a founder of Ethereum and one of the three directors (alongside Vitalik and Gavin) of Ethereum ÐΞV, the development entity...

Published on: November 02, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Gav’s Ethereum ÐΞV Update II

Well... what a busy two weeks. I thought it about time to make another update for any of you who might be interested in how we're doing. If you don't already know, I'm Gavin, a founder of Ethereum and one of the three directors (alongside Vitalik and Jeffrey) of Ethereum...

Published on: November 01, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Facebook welcomes private browsers with dedicated Tor link

Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.

Published on: October 31, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

How to make sure Adobe Flash is up-to-date and enabling it on-demand

Learn how to update Adobe Flash Player, to help protect against malware attacks.

Published on: October 31, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity