Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

Mihai’s Ethereum Project Update. The First Year.

Into the ether Hello, fellow Ethereans. I am Mihai Alisie, one of the Ethereum founders, and for the past year I’ve served as the Vice President of the Ethereum Foundation and Director of Ethereum Switzerland. In the early days of the project I concentrated my attention on the...

Ethereum Blog favicon Ethereum Blog β€’ over 10 years ago β€’ 1 min read

Will Windows 10 leave enterprises vulnerable to zero-days?

One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Issue 189

News on ResearchKit, keep track of what changed in the App Store Review Guidelines and has Xcode been compromised?

iOS Dev Weekly favicon iOS Dev Weekly β€’ over 10 years ago β€’ 1 min read

Getting to the Frontier

So first some background. We’ve already covered a little about what to expect from Frontier in the Ethereum Launch Process blog postand Gav has given us a comprehensive overview of the state of the development effort. You can also read about some of the ongoing security work, including the bug...

Ethereum Blog favicon Ethereum Blog β€’ over 10 years ago β€’ 1 min read

Hackers phish for data with fake Apple Watch giveaway

Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Operating System Vulnerabilities, Exploits and Insecurity

iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

CryptoFortress mimics TorrentLocker but is a different ransomware

ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

FBI investigating apparent ISIS attacks on Western websites

A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

DDoS attack on feminist blog backfires on International Women's Day

An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Lysa Myers: "There are still only a handful of women in the security field"

There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most prominent: Lysa Myers, a member of our research team in the US.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Issue 188

Ready to submit your Watch apps? It's almost go time. FRP and Swift and major 3D game engine releases.

iOS Dev Weekly favicon iOS Dev Weekly β€’ over 10 years ago β€’ 1 min read

The Ethereum Development Process

So I'm not sure if this kind of development methodology has ever been applied to such an extreme before so I figured I'd document it. In a nutshell, it's sort of like test-driven triplet-programming development. While speed-developing our alpha codebase, four of us sat around a table in the...

Ethereum Blog favicon Ethereum Blog β€’ over 10 years ago β€’ 1 min read

Casper Malware: After Babar and Bunny, Another Espionage Cartoon

In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is behind Babar and Bunny.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

FREAK attack: security vulnerability breaks HTTPS protection

A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

The Ethereum Launch Process

I’m Vinay Gupta, the newly minted release coordinator for Ethereum. I’ve been working with the comms team on strategy, and have now comeaboard to help smooth the release process (some of the content in this blog is out of date, please see this link for the most up to date...

Ethereum Blog favicon Ethereum Blog β€’ over 10 years ago β€’ 1 min read

Gav’s Ethereum ÐΞV Update V

I was woken by Vitalik's call at 5:55 this morning; pitch black outside, nighttime was still upon us. Nonetheless, it was time to leave and this week had best start on the right foot. The 25-minute walk in darkness from the Zug-based headquarters to the train station was wet....

Ethereum Blog favicon Ethereum Blog β€’ over 10 years ago β€’ 1 min read

Blu-ray exploits could allow computer malware infection

A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Issue 187

New Playgrounds in Xcode 6.3 beta 2, a huge list of Swift resources and how to sell an app.

iOS Dev Weekly favicon iOS Dev Weekly β€’ over 10 years ago β€’ 1 min read

Europol shuts down Ramnit botnet used to steal bank details

The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

5 common customer relationship mistakes (and how to fix them)

If customers are unhappy, they won’t remain customers for long. Here are some strategies to improve customer satisfaction and encourage them to help you attract more customers.

TechRadar favicon TechRadar β€’ over 10 years ago β€’ 1 min read

Lenovo and Superfish? Don't panic, you may not be affected

Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Issue 186

Visual editor for CA animations, never struggle with dates again in Swift and how notifications have evolved throughout the ages.

iOS Dev Weekly favicon iOS Dev Weekly β€’ over 10 years ago β€’ 1 min read

Jamie Oliver website serves up a side of malware

Jamie Oliver's website was affected by a malware issue, a spokesperson for the British celebrity chef has told the BBC.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

The Subjectivity / Exploitability Tradeoff

One of the issues inherent in many kinds of consensus architectures is that although they can be made to be robust against attackers or collusions up to a certain size, if an attacker gets large enough they are still, fundamentally, exploitable. If attackers in a proof of work system have...

Ethereum Blog favicon Ethereum Blog β€’ over 10 years ago β€’ 1 min read

Facebook exploit allowed attackers to remotely delete photos

A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Electronic health records and data abuse: it's about more than medical info

After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Issue 185

Swift 1.2, UXKit in Xcode 6.3 beta, Swift on Windows(β€½) and is your app a zombie in the App Store?

iOS Dev Weekly favicon iOS Dev Weekly β€’ over 10 years ago β€’ 1 min read

Is your valentine for real? Six signs you might be falling for an online dating scam

With Valentine’s Day nearly upon us, millions will be looking for love online. Here's six online dating scams to look out for.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Facebook launches ThreatExchange for companies to share security threats

Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Security terms explained: What does Zero Day mean?

One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Common eBay scams and how to avoid them

Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most common eBay scams and how they can be avoided.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

Issue 184

Is UXKit framework something to get excited about? How much does it cost to build an app? Design walkthroughs of Audio Hijack and Twitter Video.

iOS Dev Weekly favicon iOS Dev Weekly β€’ over 10 years ago β€’ 1 min read

What are the alternatives to passwords?

Is it time for big companies - at the very least - to abandon weak password security? If so, what password alternatives are there?

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read

The utterly crazy story of the death threat hacker (involves a cat)

A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.

WeLiveSecurity favicon WeLiveSecurity β€’ over 10 years ago β€’ 1 min read