Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Special thanks to Vlad Zamfir for much of the thinking behind multi-chain cryptoeconomic paradigms First off, a history lesson. In October 2013, when I was visiting Israel as part of my trip around the Bitcoin world, I came to know the core teams behind the colored coins and Mastercoin...
Microsoft's .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one
Special thanks to Robert Sams for the development of Seignorage Shares and insights regarding how to correctly value volatile coins in multi-currency systems Note: we are not planning on adding price stabilization to ether; our philosophy has always been to keep ether simple to minimize black-swan risks. Results of...
The Sednit espionage group, also known as the Sofacy group, APT28 or βFancy Bearβ, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- βair-gappedβ networks -- and exfiltrate sensitive files from them through removable drives.
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Appleβs own system, and rivals playing catch-up.
iTunes Connect Analytics this Sunday? Expectations for WatchKit and the history of Core Graphics.
A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.
Hi, I'm Stephan Tual, and I've been responsible for Ethereum's adoption and education since January as CCO. I'm also leading our UKΓΞVhub, located at Co-Work in Putney (South West London). I feel really privileged to be able to lead the effort on the communication strategy at ΓΞV. For the very...
I thought it was about time I'd give an update on my side of things for those interested in knowinghow we're doing on the Dutch side. My name is Jeff, a founder of Ethereum and one of the three directors (alongside Vitalik and Gavin) of Ethereum ΓΞV, the development entity...
Well... what a busy two weeks. I thought it about time to make another update for any of you who might be interested in how we're doing. If you don't already know, I'm Gavin, a founder of Ethereum and one of the three directors (alongside Vitalik and Jeffrey) of Ethereum...
Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.
Learn how to update Adobe Flash Player, to help protect against malware attacks.
I've got a great idea for an iOS 8 notification centre widget... or do I?
Are you iOS 8 and 64-bit ready? Integrating Stripe into your iOS apps and much more...
An army of the undead, wreaking havoc on the Internet β it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.
Last month, we presented βThe Evolution of Webinjectβ in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.
An important and controversial topic in the area of personal wallet security is the concept of "brainwallets" - storing funds using a private key generated from a password memorized entirely in one's head. Theoretically, brainwallets have the potential to provide almost utopian guarantee of security for long-term savings: for as...
Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
Special thanks to Vlad Zamfir, Chris Barnett and Dominic Williams for ideas and inspiration In a recent blog post I outlined some partial solutions to scalability, all of which fit into the umbrella of Ethereum 1.0 as it stands. Specialized micropayment protocols such as channels and probabilistic payment systems...
In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
Who are you? I'm Gav - together with Jeffrey Wilcke and Vitalik Buterin, I'm one third of the ultimate leadership of Ethereum ΓΞV. ΓΞV is a UK software firm that is under a non-profit-making agreement with the Ethereum Foundation to create version 1.0 of the Web Three software stack....
Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.
The chip that never dies, how does "Complete my Bundle" actually work and much more...
Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.
Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.
In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.
iOS 8 adoption rates slowing down and 10 open source Swift repositories you should be aware of!
For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation - we offer a few tips on how to get the most from the emoji-heavy network here.
Special thanks to Vlad Zamfir and Zack Hess for ongoing research and discussions on proof-of-stake algorithms and their own input into Slasher-like proposals One of the hardest problems in cryptocurrency development is that of devising effective consensus algorithms. Certainly, relatively passable default options exist. At the very least it...
Xcode 6.1 Beta 3, iOS 8.1, Swift 1.1 and so much more... There's so much new stuff...
Why I'm using a Plus as my primary phone, and the implications that the new sizes are going to have on app design.
The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.
State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that's evolved into a sophisticated threat with a modular architecture.