Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Scalability, Part 3: On Metacoin History and Multichain

Special thanks to Vlad Zamfir for much of the thinking behind multi-chain cryptoeconomic paradigms First off, a history lesson. In October 2013, when I was visiting Israel as part of my trip around the Bitcoin world, I came to know the core teams behind the colored coins and Mastercoin...

Published on: November 13, 2014 | Source: Ethereum Blog favicon Ethereum Blog

.NET goes open source and cross-platform

Microsoft's .NET framework, which is used to build millions of websites and online applications, is taking further steps to go completely open-source, Microsoft has announced at the Connect() virtual development event. The company also stated its commitment to eventually ensure the free code runs on Mac OS and Linux too, Wired reports.

Published on: November 13, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Korplug military targeted attacks: Afghanistan & Tajikistan

After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access Trojan. This blog gives an overview of the first one

Published on: November 12, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

The Search for a Stable Cryptocurrency

Special thanks to Robert Sams for the development of Seignorage Shares and insights regarding how to correctly value volatile coins in multi-currency systems Note: we are not planning on adding price stabilization to ether; our philosophy has always been to keep ether simple to minimize black-swan risks. Results of...

Published on: November 11, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Sednit Espionage Group Attacking Air-Gapped Networks

The Sednit espionage group, also known as the Sofacy group, APT28 or β€œFancy Bear”, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks -- β€œair-gapped” networks -- and exfiltrate sensitive files from them through removable drives.

Published on: November 11, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Apple Pay and security - what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.

Published on: November 07, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 171

iTunes Connect Analytics this Sunday? Expectations for WatchKit and the history of Core Graphics.

Published on: November 07, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

WireLurker: new malware targets Apple users

A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.

Published on: November 06, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Ethereum Community and Adoption Update - Week 1

Hi, I'm Stephan Tual, and I've been responsible for Ethereum's adoption and education since January as CCO. I'm also leading our UKÐΞVhub, located at Co-Work in Putney (South West London). I feel really privileged to be able to lead the effort on the communication strategy at ÐΞV. For the very...

Published on: November 03, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Jeff’s Ethereum ÐΞV Update I

I thought it was about time I'd give an update on my side of things for those interested in knowinghow we're doing on the Dutch side. My name is Jeff, a founder of Ethereum and one of the three directors (alongside Vitalik and Gavin) of Ethereum ÐΞV, the development entity...

Published on: November 02, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Gav’s Ethereum ÐΞV Update II

Well... what a busy two weeks. I thought it about time to make another update for any of you who might be interested in how we're doing. If you don't already know, I'm Gavin, a founder of Ethereum and one of the three directors (alongside Vitalik and Jeffrey) of Ethereum...

Published on: November 01, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Facebook welcomes private browsers with dedicated Tor link

Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.

Published on: October 31, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

How to make sure Adobe Flash is up-to-date and enabling it on-demand

Learn how to update Adobe Flash Player, to help protect against malware attacks.

Published on: October 31, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 170

I've got a great idea for an iOS 8 notification centre widget... or do I?

Published on: October 31, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Issue 169

Are you iOS 8 and 64-bit ready? Integrating Stripe into your iOS apps and much more...

Published on: October 24, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Top 5 Scariest Zombie Botnets

An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

Published on: October 23, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

The Evolution of Webinject

Last month, we presented β€œThe Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.

Published on: October 23, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

An Information-Theoretic Account of Secure Brainwallets

An important and controversial topic in the area of personal wallet security is the concept of "brainwallets" - storing funds using a private key generated from a password memorized entirely in one's head. Theoretically, brainwallets have the potential to provide almost utopian guarantee of security for long-term savings: for as...

Published on: October 23, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Botnet malware: What it is and how to fight it

Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.

Published on: October 22, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Scalability, Part 2: Hypercubes

Special thanks to Vlad Zamfir, Chris Barnett and Dominic Williams for ideas and inspiration In a recent blog post I outlined some partial solutions to scalability, all of which fit into the umbrella of Ethereum 1.0 as it stands. Specialized micropayment protocols such as channels and probabilistic payment systems...

Published on: October 21, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Myths about malware: an exploit is the same as malware

In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.

Published on: October 21, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Botnets: remote controls for cybercriminals

As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.

Published on: October 20, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Gav’s ÐΞV Update I: Where Ethereum’s at

Who are you? I'm Gav - together with Jeffrey Wilcke and Vitalik Buterin, I'm one third of the ultimate leadership of Ethereum ÐΞV. ÐΞV is a UK software firm that is under a non-profit-making agreement with the Ethereum Foundation to create version 1.0 of the Web Three software stack....

Published on: October 17, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Privacy online - what you can do (and what you can’t)

Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.

Published on: October 17, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 168

The chip that never dies, how does "Complete my Bundle" actually work and much more...

Published on: October 17, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Facebook 'Safety Check' allows travelers to alert family

Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.

Published on: October 16, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

October is the Cyber Security Month: stats, events and advice

Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.

Published on: October 15, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns

In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackEnergy dropper.

Published on: October 14, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Issue 167

iOS 8 adoption rates slowing down and 10 open source Swift repositories you should be aware of!

Published on: October 10, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Ello privacy - what you need to know

For any security-conscious user, there are a few things worth remembering once you have secured that crucial invitation - we offer a few tips on how to get the most from the emoji-heavy network here.

Published on: October 09, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Slasher Ghost, and Other Developments in Proof of Stake

Special thanks to Vlad Zamfir and Zack Hess for ongoing research and discussions on proof-of-stake algorithms and their own input into Slasher-like proposals One of the hardest problems in cryptocurrency development is that of devising effective consensus algorithms. Certainly, relatively passable default options exist. At the very least it...

Published on: October 03, 2014 | Source: Ethereum Blog favicon Ethereum Blog

Issue 166

Xcode 6.1 Beta 3, iOS 8.1, Swift 1.1 and so much more... There's so much new stuff...

Published on: October 03, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

Issue 165

Why I'm using a Plus as my primary phone, and the implications that the new sizes are going to have on app design.

Published on: September 26, 2014 | Source: iOS Dev Weekly favicon iOS Dev Weekly

4Chan: destructive hoaxes and the Internet of Not Things

The media have associated a number of destructive hoaxes with 4chan: people need some historical perspective on how the site actually works.

Published on: September 25, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity

Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland

State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that's evolved into a sophisticated threat with a modular architecture.

Published on: September 22, 2014 | Source: WeLiveSecurity favicon WeLiveSecurity