Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Turns out that the Material Girl has had her material stolen, and she's blaming hackers!
Published on: December 22, 2014 | Source:Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.
Published on: December 19, 2014 | Source:Should you be writing WatchKit apps? EU VAT legislation and the App Store and a great introduction to SceneKit. Happy Holidays!
Published on: December 19, 2014 | Source:Hi, Iβm Jutta! As some of you might have read in earlier posts, Iβve recently been busy setting up a security audit prior to the Ethereum genesis block release. Ethereum will launch following a world-class review by experts in IT security, cryptography and blockchain technology.Prior to the launch, we will...
Published on: December 18, 2014 | Source:The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.
Published on: December 18, 2014 | Source:As regular readers will know, every year we publish our predictions on cybercrime attacks for the year ahead. Well, our South American research team has spent the last few weeks putting together our predictions for 2015.
Published on: December 18, 2014 | Source:OK so a minor update about what we are (and are not) doing here at Ethereum DEV. We are, first and foremost, developing a robust quasi-Turing-complete blockchain. This is known as Ethereum. Aside from having quasi-Turing-completeness, it delivers on a number of other important considerations, stemming from the fact...
Published on: December 17, 2014 | Source:Today, we are publishing research on ransomware that emerged in 2014. We have posted blog articles about this threat before, to raise awareness when we realized the criminals were targeting the United Kingdom and Spain.
Published on: December 16, 2014 | Source:Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.
Published on: December 16, 2014 | Source:Time for another update! So quite a bit has happened following ΓΞVcon-0, our internal developer's conference. The conference itself was a great time to get all the developers together and really get to know each other, dissipate a lot of information (back to back presentations for 5 days!) and chat...
Published on: December 15, 2014 | Source:Rejections, HockeyApp gets acquired by Microsoft and WatchKit Beta 2.
Published on: December 12, 2014 | Source:Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.
Published on: December 11, 2014 | Source:Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves - if not more so. Lock yours down with our tips.
Published on: December 08, 2014 | Source:Day 1 - Monday 24th Nov - ΓΞV: Mission and Processes The first day of ΓΞVcon-0 kicked off early at 7am with the Ethereum UK communications team arriving at the venue (Ethereum Dev UGβs workspace in Kreuzberg, Berlin) to set up the 4K high quality recording equipment and arrange the...
Published on: December 05, 2014 | Source:More woes with extensions and the app review process. Getting started with Pay for selling physical goods and of course, more WatchKit goodness!
Published on: December 05, 2014 | Source:Firefox 34, the latest version of the Mozilla's popular web browser has disabled support for SSL 3.0 in reaction to the POODLE exploit, reported by We Live Security back in October.
Published on: December 04, 2014 | Source:Yesterday was the first proper day of ΓΞVhub Berlin being open, following the first Ethereum internal developers' symposium ΓΞVcon-0. I want to post a few images to let you gauge the mood here. Henning, Marek, Viktor and Felix hacking on the couch
Published on: December 02, 2014 | Source:Service Worker will revolutionize the way we build for the web. Learn about what it is, why it is important and how to use it.
Published on: December 01, 2014 | Source:CocoaPods and Carthage, generating animation images for WatchKit and why you should never use the colour black.
Published on: November 28, 2014 | Source:Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, itβs easy to sort the genuine bargains from the too-good-to-be-true fakes.
Published on: November 27, 2014 | Source:Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or sponsored by nation states. Does an average person or business really need to worry about these things?
Published on: November 26, 2014 | Source:Self-driving cars are just around the corner, with the UK government putting up 10 million (around $15.6 million) for cities to pilot trials as soon as next year, but the country's Institute of Engineering and Technology (IET) today issued stern warnings about the security of the technology.
Published on: November 25, 2014 | Source:Proof of stake continues to be one of the most controversial discussions in the cryptocurrency space. Although the idea has many undeniable benefits, including efficiency, a larger security margin and future-proof immunity to hardware centralization concerns, proof of stake algorithms tend to be substantially more complex than proof of work-based...
Published on: November 25, 2014 | Source:It's easy to imagine that ALL connected devices - from fridges to CCTV cameras - are a security nightmare, but there are simple, sensible steps you can take to lock these risks down.
Published on: November 24, 2014 | Source:The long-term health effects of electronic cigarettes - or E-cigarettes - are still open for discussion - but the devices could harm your computer, at least if one report is to be believed.
Published on: November 22, 2014 | Source:Did someone say WatchKit? What you need to know to get started and also some regular iOS links too!
Published on: November 21, 2014 | Source:Microsoft released a patch last week for a critical vulnerability allowing remote code execution in Internet Explorer. This vulnerability is significant because it exploits an old bug present in Internet Explorer versions 3 through 11.
Published on: November 20, 2014 | Source:One of the latest ideas that has come to recently achieve some prominence in parts of the Bitcoin community is the line of thinking that has been described by both myself and others as "Bitcoin dominance maximalism" or just "Bitcoin maximalism" for short - essentially, the idea that an environment...
Published on: November 20, 2014 | Source:I'm Gavin Wood, a co-founder of Ethereum and, along with Vitalik Buterin and Jeffrey Wilcke, one of the three directors of the Eth Dev, the NFP organisation that is managing the development (under contract from Ethereum Suisse) of the Ethereum blockchain. This is a small update to let you all...
Published on: November 18, 2014 | Source:Learn how North Kingdom built an immersive multimedia experience optimized for modern mobile browsers using Web RTC
Published on: November 18, 2014 | Source:Privacy and security online are hot button topics in America today, as a new survey by the Pew Research Center confirms, mirroring similar results from two different privacy and security surveys conducted by ESET.
Published on: November 17, 2014 | Source:For ordinary laptop and smartphone users, Wi-Fi is not ideal - but itβs sometimes near-inescapable.
Published on: November 14, 2014 | Source:APT actors trying to use big events as a lure to compromise their targets is nothing new. Tibetan NGOs being targeted by APT actors is also nothing new. Thus, surrounding the upcoming G20 2014 summit that is held in Brisbane, Australia, we were expecting to see G20 themed threats targeted at Tibetan NGOs. A Win32/Farfli (alias Gh0st RAT) sample ultimately confirmed our suspicions.
Published on: November 14, 2014 | Source:ESET study reveals many IT professionals are guilty of storing indecent material on their mobile phones, which would leave them embarrassed if lost.
Published on: November 14, 2014 | Source:iOS development in Visual Studio, Swift app experiments and geiger counters for your frame rates.
Published on: November 14, 2014 | Source: