The Ukrainian Secret Service is investigating the incident as a potential security breach.
The company failed to mention some Initial Coin Offerings were paying for inclusion.
The yellow bank has developed a blockchain prototype it reckons can support sustainable development and investment in Australia.
French researcher nets $15,000 prize for finding bugs in Moscow's Ethereum-based voting system.
If you’ve been trading but not declaring, the tax service might be on your case.
We've pulled together 19 facts and statistics that shed light on tech in this complex region.
The most frequently purchased items are coffee, baby wipes, clothes, and other necessities.
ZEC deposits will be automatically converted to British pounds if they are not moved elsewhere.
Neither blockchain nor IoT are simple technologies, but the growing credibility of managed platform services makes the technical aspects less daunting. The real barriers to success are the rules and processes required to change business models and culture.
IoT and blockchain: A powerful pairing that doesn't yet live up to its promise.
Commodity cryptomining appears to be shifting to a data theft model.
Anheuser-Busch InBev, Cisco, GlaxoSmithKline, Lenovo, Nokia, Schneider Electric, and Vodafone to use IBM's new blockchain network to tackle supplier challenges.
It has been suggested that $1.2 million in customs fees are outstanding.
The exchange expects the real innovation to come after its 2021 go-live.
The world’s first Lightning-compatible security key
One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're going to showcase some of those distros. Be careful, though. You may not want to load these, or if you do, put them in isolated VMs. We're not kidding when we say they could be dangerous.
We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, one million apps and services, and billions of authentications.
A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military branches.
All the facts and figures that matter to you and your business from the past month in technology news.
These are the 10 malware families used the most in new macOS attacks over 2019.
Are you suspicious about your phone? Have a look at these settings to put your mind at ease.
These are the top 20 biggest, fastest, and most lucrative bounty programs on the HackerOne platform.
Here are the top 10 tips for keeping the data on your iPhone safe from hackers and snoopers. Even if you are pretty confident in your security, it might be worth checking to make sure things are in good order.
If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, and political campaign teams – is for you. Here's how to enable the Google Advanced Protection Program.
Disassembly of a Google Titan Bluetooth two-factor security key .
2019 is already proving a fruitful year for hackers with millions of records stolen, medical data leaks, and credit card data theft.
European law enforcement has smashed everything from Dark Web marketplaces to ATM skimmer rings.
Interested in the world of cybersecurity? Consider picking up a copy of these books to enjoy over summer.
For the past few years, the FBI has been keeping a separate list of the US' most wanted cybercriminals. Time to take a look at who's still on it -- in no particular order.
For most people, the security that Apple has baked into an iPhone or Mac is more than enough. But determined criminals can find creative ways to bypass the locks to get at your data. Should you be worried?
ASD touts Constellation as a data analysis application enabling data access, federation, and manipulation activities across large and complex datasets.
Some Windows 7 and Server 2008 R2 users find updates blocked because the anti-virus maker can't manage to make basic coding tweaks in timely fashion. Read more: https://zd.net/2KKrPuM
Google takes a step towards cutting out passwords for some parts of authenticating to online services.
Following the example of Apple and Google, Facebook has also “paused” the program, for now.
Distributed Denial of Service attacks are getting smaller -- but they're still getting more dangerous.
Public Transport Victoria found in breach of Privacy and Data Protection Act after a dataset containing a record of 1.8 billion myki events was provided without sufficient de-identification.
Apple could do a better job of protecting iPhone users from remote attacks if it cut out non-essential code, according to Google's Project Zero.
People deal with hundreds of emails a day and employers aren't doing enough to help, which means the threat of fake messages will continue.
Danny Palmer explains that it's not fair to blame users for falling victim to attacks when employers aren't doing enough to help. Read more: https://zd.net/31Oiisg
The uncovered database had 37,170 rows of 'user' collection, the same amount of users that Neoclinical has.