Get ahead of the curve with the latest insights, trends, and analysis in the tech world.
Special thanks to Vlad Zamfir for much of the thinking behind multi-chain cryptoeconomic paradigms First off, a history lesson. In October 2013, when I was visiting Israel as part of my trip around the Bitcoin world, I came to know the core teams behind the colored coins and Mastercoin...
Published on: November 13, 2014 | Source:Microsoft's .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.
Published on: November 13, 2014 | Source:After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one
Published on: November 12, 2014 | Source:Special thanks to Robert Sams for the development of Seignorage Shares and insights regarding how to correctly value volatile coins in multi-currency systems Note: we are not planning on adding price stabilization to ether; our philosophy has always been to keep ether simple to minimize black-swan risks. Results of...
Published on: November 11, 2014 | Source:The Sednit espionage group, also known as the Sofacy group, APT28 or βFancy Bearβ, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- βair-gappedβ networks -- and exfiltrate sensitive files from them through removable drives.
Published on: November 11, 2014 | Source:Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Appleβs own system, and rivals playing catch-up.
Published on: November 07, 2014 | Source:iTunes Connect Analytics this Sunday? Expectations for WatchKit and the history of Core Graphics.
Published on: November 07, 2014 | Source:A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.
Published on: November 06, 2014 | Source:Hi, I'm Stephan Tual, and I've been responsible for Ethereum's adoption and education since January as CCO. I'm also leading our UKΓΞVhub, located at Co-Work in Putney (South West London). I feel really privileged to be able to lead the effort on the communication strategy at ΓΞV. For the very...
Published on: November 03, 2014 | Source:I thought it was about time I'd give an update on my side of things for those interested in knowinghow we're doing on the Dutch side. My name is Jeff, a founder of Ethereum and one of the three directors (alongside Vitalik and Gavin) of Ethereum ΓΞV, the development entity...
Published on: November 02, 2014 | Source:Well... what a busy two weeks. I thought it about time to make another update for any of you who might be interested in how we're doing. If you don't already know, I'm Gavin, a founder of Ethereum and one of the three directors (alongside Vitalik and Jeffrey) of Ethereum...
Published on: November 01, 2014 | Source:Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.
Published on: October 31, 2014 | Source:Learn how to update Adobe Flash Player, to help protect against malware attacks.
Published on: October 31, 2014 | Source:I've got a great idea for an iOS 8 notification centre widget... or do I?
Published on: October 31, 2014 | Source:Are you iOS 8 and 64-bit ready? Integrating Stripe into your iOS apps and much more...
Published on: October 24, 2014 | Source:An army of the undead, wreaking havoc on the Internet β it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.
Published on: October 23, 2014 | Source:Last month, we presented βThe Evolution of Webinjectβ in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.
Published on: October 23, 2014 | Source:An important and controversial topic in the area of personal wallet security is the concept of "brainwallets" - storing funds using a private key generated from a password memorized entirely in one's head. Theoretically, brainwallets have the potential to provide almost utopian guarantee of security for long-term savings: for as...
Published on: October 23, 2014 | Source:Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
Published on: October 22, 2014 | Source:Special thanks to Vlad Zamfir, Chris Barnett and Dominic Williams for ideas and inspiration In a recent blog post I outlined some partial solutions to scalability, all of which fit into the umbrella of Ethereum 1.0 as it stands. Specialized micropayment protocols such as channels and probabilistic payment systems...
Published on: October 21, 2014 | Source:In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
Published on: October 21, 2014 | Source:As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
Published on: October 20, 2014 | Source:Who are you? I'm Gav - together with Jeffrey Wilcke and Vitalik Buterin, I'm one third of the ultimate leadership of Ethereum ΓΞV. ΓΞV is a UK software firm that is under a non-profit-making agreement with the Ethereum Foundation to create version 1.0 of the Web Three software stack....
Published on: October 17, 2014 | Source:Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.
Published on: October 17, 2014 | Source:The chip that never dies, how does "Complete my Bundle" actually work and much more...
Published on: October 17, 2014 | Source:Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.
Published on: October 16, 2014 | Source:Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.
Published on: October 15, 2014 | Source:In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.
Published on: October 14, 2014 | Source:iOS 8 adoption rates slowing down and 10 open source Swift repositories you should be aware of!
Published on: October 10, 2014 | Source:For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation - we offer a few tips on how to get the most from the emoji-heavy network here.
Published on: October 09, 2014 | Source:Special thanks to Vlad Zamfir and Zack Hess for ongoing research and discussions on proof-of-stake algorithms and their own input into Slasher-like proposals One of the hardest problems in cryptocurrency development is that of devising effective consensus algorithms. Certainly, relatively passable default options exist. At the very least it...
Published on: October 03, 2014 | Source:Xcode 6.1 Beta 3, iOS 8.1, Swift 1.1 and so much more... There's so much new stuff...
Published on: October 03, 2014 | Source:Why I'm using a Plus as my primary phone, and the implications that the new sizes are going to have on app design.
Published on: September 26, 2014 | Source:The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.
Published on: September 25, 2014 | Source:State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that's evolved into a sophisticated threat with a modular architecture.
Published on: September 22, 2014 | Source: