Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

Scalability, Part 3: On Metacoin History and Multichain

Special thanks to Vlad Zamfir for much of the thinking behind multi-chain cryptoeconomic paradigms First off, a history lesson. In October 2013, when I was visiting Israel as part of my trip around the Bitcoin world, I came to know the core teams behind the colored coins and Mastercoin...

Ethereum Blog favicon Ethereum Blog β€’ almost 11 years ago β€’ 1 min read

.NET goes open source and cross-platform

Microsoft's .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

Korplug military targeted attacks: Afghanistan & Tajikistan

After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

The Search for a Stable Cryptocurrency

Special thanks to Robert Sams for the development of Seignorage Shares and insights regarding how to correctly value volatile coins in multi-currency systems Note: we are not planning on adding price stabilization to ether; our philosophy has always been to keep ether simple to minimize black-swan risks. Results of...

Ethereum Blog favicon Ethereum Blog β€’ almost 11 years ago β€’ 1 min read

Sednit Espionage Group Attacking Air-Gapped Networks

The Sednit espionage group, also known as the Sofacy group, APT28 or β€œFancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- β€œair-gapped” networks -- and exfiltrate sensitive files from them through removable drives.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

Apple Pay and security - what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

Issue 171

iTunes Connect Analytics this Sunday? Expectations for WatchKit and the history of Core Graphics.

iOS Dev Weekly favicon iOS Dev Weekly β€’ almost 11 years ago β€’ 1 min read

WireLurker: new malware targets Apple users

A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

Ethereum Community and Adoption Update - Week 1

Hi, I'm Stephan Tual, and I've been responsible for Ethereum's adoption and education since January as CCO. I'm also leading our UKÐΞVhub, located at Co-Work in Putney (South West London). I feel really privileged to be able to lead the effort on the communication strategy at ÐΞV. For the very...

Ethereum Blog favicon Ethereum Blog β€’ almost 11 years ago β€’ 1 min read

Jeff’s Ethereum ÐΞV Update I

I thought it was about time I'd give an update on my side of things for those interested in knowinghow we're doing on the Dutch side. My name is Jeff, a founder of Ethereum and one of the three directors (alongside Vitalik and Gavin) of Ethereum ÐΞV, the development entity...

Ethereum Blog favicon Ethereum Blog β€’ almost 11 years ago β€’ 1 min read

Gav’s Ethereum ÐΞV Update II

Well... what a busy two weeks. I thought it about time to make another update for any of you who might be interested in how we're doing. If you don't already know, I'm Gavin, a founder of Ethereum and one of the three directors (alongside Vitalik and Jeffrey) of Ethereum...

Ethereum Blog favicon Ethereum Blog β€’ almost 11 years ago β€’ 1 min read

Facebook welcomes private browsers with dedicated Tor link

Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

How to make sure Adobe Flash is up-to-date and enabling it on-demand

Learn how to update Adobe Flash Player, to help protect against malware attacks.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

Issue 170

I've got a great idea for an iOS 8 notification centre widget... or do I?

iOS Dev Weekly favicon iOS Dev Weekly β€’ almost 11 years ago β€’ 1 min read

Issue 169

Are you iOS 8 and 64-bit ready? Integrating Stripe into your iOS apps and much more...

iOS Dev Weekly favicon iOS Dev Weekly β€’ almost 11 years ago β€’ 1 min read

Top 5 Scariest Zombie Botnets

An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

The Evolution of Webinject

Last month, we presented β€œThe Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.

WeLiveSecurity favicon WeLiveSecurity β€’ almost 11 years ago β€’ 1 min read

An Information-Theoretic Account of Secure Brainwallets

An important and controversial topic in the area of personal wallet security is the concept of "brainwallets" - storing funds using a private key generated from a password memorized entirely in one's head. Theoretically, brainwallets have the potential to provide almost utopian guarantee of security for long-term savings: for as...

Ethereum Blog favicon Ethereum Blog β€’ almost 11 years ago β€’ 1 min read

Botnet malware: What it is and how to fight it

Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Scalability, Part 2: Hypercubes

Special thanks to Vlad Zamfir, Chris Barnett and Dominic Williams for ideas and inspiration In a recent blog post I outlined some partial solutions to scalability, all of which fit into the umbrella of Ethereum 1.0 as it stands. Specialized micropayment protocols such as channels and probabilistic payment systems...

Ethereum Blog favicon Ethereum Blog β€’ about 11 years ago β€’ 1 min read

Myths about malware: an exploit is the same as malware

In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Botnets: remote controls for cybercriminals

As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Gav’s ÐΞV Update I: Where Ethereum’s at

Who are you? I'm Gav - together with Jeffrey Wilcke and Vitalik Buterin, I'm one third of the ultimate leadership of Ethereum ÐΞV. ÐΞV is a UK software firm that is under a non-profit-making agreement with the Ethereum Foundation to create version 1.0 of the Web Three software stack....

Ethereum Blog favicon Ethereum Blog β€’ about 11 years ago β€’ 1 min read

Privacy online - what you can do (and what you can’t)

Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Issue 168

The chip that never dies, how does "Complete my Bundle" actually work and much more...

iOS Dev Weekly favicon iOS Dev Weekly β€’ about 11 years ago β€’ 1 min read

Facebook 'Safety Check' allows travelers to alert family

Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

October is the Cyber Security Month: stats, events and advice

Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Issue 167

iOS 8 adoption rates slowing down and 10 open source Swift repositories you should be aware of!

iOS Dev Weekly favicon iOS Dev Weekly β€’ about 11 years ago β€’ 1 min read

Ello privacy - what you need to know

For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation - we offer a few tips on how to get the most from the emoji-heavy network here.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Slasher Ghost, and Other Developments in Proof of Stake

Special thanks to Vlad Zamfir and Zack Hess for ongoing research and discussions on proof-of-stake algorithms and their own input into Slasher-like proposals One of the hardest problems in cryptocurrency development is that of devising effective consensus algorithms. Certainly, relatively passable default options exist. At the very least it...

Ethereum Blog favicon Ethereum Blog β€’ about 11 years ago β€’ 1 min read

Issue 166

Xcode 6.1 Beta 3, iOS 8.1, Swift 1.1 and so much more... There's so much new stuff...

iOS Dev Weekly favicon iOS Dev Weekly β€’ about 11 years ago β€’ 1 min read

Issue 165

Why I'm using a Plus as my primary phone, and the implications that the new sizes are going to have on app design.

iOS Dev Weekly favicon iOS Dev Weekly β€’ about 11 years ago β€’ 1 min read

4Chan: destructive hoaxes and the Internet of Not Things

The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that's evolved into a sophisticated threat with a modular architecture.

WeLiveSecurity favicon WeLiveSecurity β€’ about 11 years ago β€’ 1 min read