Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
One of the issues inherent in many kinds of consensus architectures is that although they can be made to be robust against attackers or collusions up to a certain size, if an attacker gets large enough they are still, fundamentally, exploitable. If attackers in a proof of work system have...
Published on: February 14, 2015 | Source:A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.
Published on: February 13, 2015 | Source:After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
Published on: February 13, 2015 | Source:Swift 1.2, UXKit in Xcode 6.3 beta, Swift on Windows(β½) and is your app a zombie in the App Store?
Published on: February 13, 2015 | Source:With Valentineβs Day nearly upon us, millions will be looking for love online. Here's six online dating scams to look out for.
Published on: February 12, 2015 | Source:Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.
Published on: February 12, 2015 | Source:One of the terms Iβm most often asked to explain is what a βzero dayβ vulnerability or exploit is; letβs look at what that phrase entails.
Published on: February 11, 2015 | Source:WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.
Published on: February 10, 2015 | Source:Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most common eBay scams and how they can be avoided.
Published on: February 09, 2015 | Source:Is UXKit framework something to get excited about? How much does it cost to build an app? Design walkthroughs of Audio Hijack and Twitter Video.
Published on: February 06, 2015 | Source:Is it time for big companies - at the very least - to abandon weak password security? If so, what password alternatives are there?
Published on: February 05, 2015 | Source:A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.
Published on: February 04, 2015 | Source:A vulnerability in the latest patched version of Microsoft Internet Explorer that could allow hackers to launch "highly credible phishing attacks" has been uncovered, according to PC World.
Published on: February 04, 2015 | Source:Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, hereβs what you need to know about the new settings and how they could affect you.
Published on: February 04, 2015 | Source:President Obama's budget proposal for the 2016 fiscal year includes a projected 10 percent increase in cybersecurity spend, reports Reuters.
Published on: February 03, 2015 | Source:The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?
Published on: February 03, 2015 | Source:A new porn scam is spreading startlingly quickly through Facebook - one that has managed to spread malware to over 110,000 users in 48 hours, reports The Guardian.
Published on: February 02, 2015 | Source:What's happening with the iTunes Connect data leak? React Native and Building Classic Mac OS X apps on Yosemite!
Published on: January 30, 2015 | Source:ESET's researchers recently encountered a piece of malware targeting the filling of the forms belonging to the Consulate of Poland. To understand why it is first necessary to have a brief look at the application process for visas.
Published on: January 29, 2015 | Source:Special thanks to Andrew Miller for coming up with this attack, and to Zack Hess, Vlad Zamfir and Paul Sztorc for discussion and responses One of the more interesting surprises in cryptoeconomics in recent weeks came from an attack on SchellingCoin conceived by Andrew Miller earlier this month. Although...
Published on: January 28, 2015 | Source:Singer Taylor Swift has had her Twitter and Instagram accounts hacked, but laughed off claims that the hackers will release nude photographs of her.
Published on: January 28, 2015 | Source:A vulnerability in Android's Wi-Fi Direct functionality has been uncovered by security researchers.
Published on: January 27, 2015 | Source:Even though WhatsApp now encrypts all of its messages and data, it pays to be secure with your chats. Here are our top WhatsApp security tips.
Published on: January 26, 2015 | Source:Warning: this post contains crazy ideas. Myself describing a crazy idea should NOT be construed as implying that (i) I am certain that the idea is correct/viable, (ii) I have an even >50% probability estimate that the idea is correct/viable, or that (iii) "Ethereum" endorses any of this in any...
Published on: January 23, 2015 | Source:NSA whistleblower Edward Snowden has claimed he doesn't use an iPhone for fear of surveillance technology in the smartphone, reports The Independent.
Published on: January 23, 2015 | Source:Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?
Published on: January 23, 2015 | Source:Are you 64 bit and iOS 8 ready? Feb 1st deadline for new apps approaches! What conferences are you attending this year?
Published on: January 23, 2015 | Source:Cybercrime: there's too much of it, and we need to do more to deter it. With the President of the United States now making frequent references to "doing more about cybercrime" now is a good time to look at what steps must be taken.
Published on: January 20, 2015 | Source:A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.
Published on: January 19, 2015 | Source:Lizard Squad failed to encrypt its database of LizardStresser's registered users - storing details of their usernames and passwords in plaintext. A schoolboy error if ever I heard one.
Published on: January 19, 2015 | Source:Swift on the way up, Core Graphics in Swift, Watch-a-palooza and App Store revenue stories.
Published on: January 16, 2015 | Source:The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to pay the ransom demanded by the attackers
Published on: January 14, 2015 | Source:President Barack Obama is planning to push legislation which would protect companies from lawsuits for sharing cyberthreat data with the government, reports the Washington Post.
Published on: January 13, 2015 | Source:The rent-a-DDoS service that knocked out Xbox Live and Playstation Network is powered by thousands of hacked residential internet routers.
Published on: January 13, 2015 | Source:British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies
Published on: January 13, 2015 | Source: