Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

AOL blocks malicious ads from its advertising platform

AOL has taken steps to stop a set of malicious advertisements being served through their sites, including The Huffington Post, Computer Business Review reports.

Published on: January 07, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

CES 2015 in Las Vegas: first impressions, 5 hot topics

With nearly 160,000 lust-ridden techies, corporate denizens and a few of us security types descending on a slightly crisp wintery Las Vegas to see what all the fuss is about at CES 2015, here are a few things to keep an eye out for this year at the show.

Published on: January 07, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Jeff’s Ethereum ÐΞV Update II

Firstof all, happy new year! What a year it has been. With a little luck we'll surpass last year with an even more awesome year.It's been too long since I've given an update on my side of things and that of the Go team and mostly due to a lack...

Published on: January 06, 2015 | Source: Ethereum Blog favicon Ethereum Blog

Bitstamp hacked for $5 million in Bitcoin

19,000 Bitcoin - valued at around $275 each, so $5 million together - have been stolen from a majour European Bitcoin exchange, reports RT.

Published on: January 06, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Unpatched security hole has left millions of Moonpig customers at risk for 17 months

Moonpig, the online personalised card company, has been accused of a shockingly sloppy attitude to security, after apparently leaving a serious hole in its security unpatched.

Published on: January 06, 2015 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 179

Happy New Year everyone. Here's to a great 2015!

Published on: January 02, 2015 | Source: iOS Dev Weekly favicon iOS Dev Weekly

On Silos

One of the criticisms that many people have made about the current direction of the cryptocurrency space is the increasing amount of fragmentation that we are seeing. What was earlier perhaps a more tightly bound community centered around developing the common infrastructure of Bitcoin is now increasingly a collection of...

Published on: December 31, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Hobbit-inspired sword can help you find unsecured WiFi hotspots

Like many others, I was enchanted by The Hobbit (and later Lord of the Rings) at a young age - long before Peter Jackson turned J R R Tolkien's middle-earth fantasy books into a series of blockbuster movies.

Published on: December 29, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Biometrics - can your fingerprint be β€˜copied’ from a normal photo?

Fingerprint biometrics are entering the mainstream as a security measure, with both Apple and Samsung relying on readers to secure their flagship phones - but biometrics may not be as secure as many believe.

Published on: December 29, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Secret Sharing DAOs: The Other Crypto 2.0

The crypto 2.0 industry has been making strong progress in the past year developing blockchain technology, including the formalization and in some cases realization of proof of stake designs like Slasher and DPOS, various forms of

Published on: December 26, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Issue 178

Something a little different this week, my essential tools for iOS development! Enjoy!

Published on: December 26, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Virlock: First Self-Reproducing Ransomware is also a Shape Shifter

Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting piece of malware to analyze. This is the first time such combination of malware features has been observed.

Published on: December 22, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Madonna thinks her computer was hacked

Turns out that the Material Girl has had her material stolen, and she's blaming hackers!

Published on: December 22, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Mobile security: flaw allows hackers to read texts and listen to calls

Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.

Published on: December 19, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 177

Should you be writing WatchKit apps? EU VAT legislation and the App Store and a great introduction to SceneKit. Happy Holidays!

Published on: December 19, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

A call to all the bug bounty hunters out there…

Hi, I’m Jutta! As some of you might have read in earlier posts, I’ve recently been busy setting up a security audit prior to the Ethereum genesis block release. Ethereum will launch following a world-class review by experts in IT security, cryptography and blockchain technology.Prior to the launch, we will...

Published on: December 18, 2014 | Source: Ethereum Blog favicon Ethereum Blog

ICANN computers compromised by hackers

The nonprofit organization that looks after name and internet domains has been hit by a spear phishing hack that has compromised company data, reports The Register.

Published on: December 18, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Cybercrime Trends & Predictions for 2015

As regular readers will know, every year we publish our predictions on cybercrime attacks for the year ahead. Well, our South American research team has spent the last few weeks putting together our predictions for 2015.

Published on: December 18, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Ethereum ÐΞV: What are we doing?

OK so a minor update about what we are (and are not) doing here at Ethereum DEV. We are, first and foremost, developing a robust quasi-Turing-complete blockchain. This is known as Ethereum. Aside from having quasi-Turing-completeness, it delivers on a number of other important considerations, stemming from the fact...

Published on: December 17, 2014 | Source: Ethereum Blog favicon Ethereum Blog

TorrentLocker — Ransomware in a country near you

Today, we are publishing research on ransomware that emerged in 2014. We have posted blog articles about this threat before, to raise awareness when we realized the criminals were targeting the United Kingdom and Spain.

Published on: December 16, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

TorrentLocker: Racketeering ransomware disassembled by ESET experts

Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.

Published on: December 16, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Gav’s Ethereum ÐΞV Update IV

Time for another update! So quite a bit has happened following ÐΞVcon-0, our internal developer's conference. The conference itself was a great time to get all the developers together and really get to know each other, dissipate a lot of information (back to back presentations for 5 days!) and chat...

Published on: December 15, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Issue 176

Rejections, HockeyApp gets acquired by Microsoft and WatchKit Beta 2.

Published on: December 12, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Android scam: Firms fined over $500,000 for malicious apps' hidden subscriptions

Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.

Published on: December 11, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Identity theft - six tips to help keep yours safe

Private data such as addresses and social security numbers can be just as valuable to cybercriminals as valid credit card details can be to thieves - if not more so. Lock yours down with our tips.

Published on: December 08, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

ÐΞVcon-0 Recap

Day 1 - Monday 24th Nov - ÐΞV: Mission and Processes The first day of ÐΞVcon-0 kicked off early at 7am with the Ethereum UK communications team arriving at the venue (Ethereum Dev UG’s workspace in Kreuzberg, Berlin) to set up the 4K high quality recording equipment and arrange the...

Published on: December 05, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Issue 175

More woes with extensions and the app review process. Getting started with Pay for selling physical goods and of course, more WatchKit goodness!

Published on: December 05, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Firefox 34 disables SSL 3.0 and tackles eight security fixes

Firefox 34, the latest version of the Mozilla's popular web browser has disabled support for SSL 3.0 in reaction to the POODLE exploit, reported by We Live Security back in October.

Published on: December 04, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

From inside Ethereum ÐΞVhub Berlin

Yesterday was the first proper day of ÐΞVhub Berlin being open, following the first Ethereum internal developers' symposium ÐΞVcon-0. I want to post a few images to let you gauge the mood here. Henning, Marek, Viktor and Felix hacking on the couch

Published on: December 02, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Introduction to Service Worker: How to use Service Worker

Service Worker will revolutionize the way we build for the web. Learn about what it is, why it is important and how to use it.

Published on: December 01, 2014 | Source: HTML5 Rocks favicon HTML5 Rocks

Issue 174

CocoaPods and Carthage, generating animation images for WatchKit and why you should never use the colour black.

Published on: November 28, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Cyber Monday - 12 tips to help you shop safely online

Technology might evolve, but cyber gangs rely on tried-and-tested tactics. With a bit of care and attention, it’s easy to sort the genuine bargains from the too-good-to-be-true fakes.

Published on: November 27, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Do I need to worry about state-sponsored threats like Regin?

Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or sponsored by nation states. Does an average person or business really need to worry about these things?

Published on: November 26, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Driverless cars 'could be hacked' warns Institute of Engineering and Technology

Self-driving cars are just around the corner, with the UK government putting up 10 million (around $15.6 million) for cities to pilot trials as soon as next year, but the country's Institute of Engineering and Technology (IET) today issued stern warnings about the security of the technology.

Published on: November 25, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Proof of Stake: How I Learned to Love Weak Subjectivity

Proof of stake continues to be one of the most controversial discussions in the cryptocurrency space. Although the idea has many undeniable benefits, including efficiency, a larger security margin and future-proof immunity to hardware centralization concerns, proof of stake algorithms tend to be substantially more complex than proof of work-based...

Published on: November 25, 2014 | Source: Ethereum Blog favicon Ethereum Blog