Famed Yale professor David Gelernter and investment banker Rob Rosenthal field questions about Revolution Populi, their startup effort to build a blockchain-based alternative to Facebook. Will the desire to control our personal information prompt us to abandon the giants that control today's Internet?
The transaction led by local construction giant Cyrela and startup Growth Tech used IBM Blockchain technology.
Samsung Electronics, SK Telecom, KT, LG Uplus, KEB Hana Bank, Woori Bank, and Koscom have formed a consortium to build a new blockchain network as a foundation for a new mobile authentication service.
$23 million of the stolen funds belonged to Bitpoint's customers; the rest belonged to the exchange itself.
It will be based on LG's blockchain platform Monachain.
The FCA says it is clear that crypto-derivatives and exchange traded notes are unsuitable investments for retail consumers.
The company plans to develop its digital identity exchange technology as a 'trust-based service platform' supporting digital business.
Three of the four Australian banking heavyweights are trialling Lygon, a new digital bank guarantees platform that uses blockchain.
The technology could potentially disrupt these popular services -- but don’t expect anything soon.
The rules could unmask cryptocurrency trades and account holders in the future.
Move to issue up to five new digital bank licenses will add market diversity and boost the local banking system in Singapore's bid to become a digital economy, says industry regulator, which will begin reviewing applicants in August
PwC and VeChain used for blockchain system that will cover 100 product lines by the end of 2019.
Two brothers arrested in Israel last week have been linked to the massive 2016 Bitfinex hack.
The mobile botnet is focused on compromising Android devices.
The malware emulates Linux in its quest for cryptocurrency.
We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, one million apps and services, and billions of authentications.
A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military branches.
All the facts and figures that matter to you and your business from the past month in technology news.
These are the 10 malware families used the most in new macOS attacks over 2019.
Are you suspicious about your phone? Have a look at these settings to put your mind at ease.
These are the top 20 biggest, fastest, and most lucrative bounty programs on the HackerOne platform.
Here are the top 10 tips for keeping the data on your iPhone safe from hackers and snoopers. Even if you are pretty confident in your security, it might be worth checking to make sure things are in good order.
If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, and political campaign teams – is for you. Here's how to enable the Google Advanced Protection Program.
Disassembly of a Google Titan Bluetooth two-factor security key .
2019 is already proving a fruitful year for hackers with millions of records stolen, medical data leaks, and credit card data theft.
European law enforcement has smashed everything from Dark Web marketplaces to ATM skimmer rings.
Interested in the world of cybersecurity? Consider picking up a copy of these books to enjoy over summer.
For the past few years, the FBI has been keeping a separate list of the US' most wanted cybercriminals. Time to take a look at who's still on it -- in no particular order.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.3.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.2.
The new Android malware operation is preparing to invade the Google Play Store.
A survey of security professionals found that over half believe management are ignoring advice designed to help them stay safe from cyberattacks.
Tor vulnerability has been exploited for years and has been used for censorship, sabotage, and extortion of Onion sites.
YouTube removed 'instructional hacking' content from a prominent educational channel. Supporters fought back.
UK ISP group has even named Mozilla 'Internet Villain' for supporting 'DNS-over-HTTPS.'
NAS devices are often used to store critical data and back-ups - but many are exposed to the open internet and the cybercriminals behind eCh0raix are taking advantage.
Information Commissioner's Office intends to fine airline for “poor security arrangements” - British Airways says it's “surprised and disappointed” by planned penalty.
Researchers develop a proof-of-concept attack after reverse engineering the Microsoft BlueKeep patch.
ZDNet's Steve Ranger and TechRepublic's Karen Roby sit down and discuss if that Word doc really comes from who you think it does. Read more: https://zd.net/2XFCQRo
Traditionally secretive agencies must be open with the public about the dangers they face and how to combat them, says GCHQ chief.
Godlua, a Linux DDoS bot, is the first-ever malware strain seen abusing new DoH (DNS over HTTPS) protocol.
These are the 10 malware families used the most in new macOS attacks over 2019. Read more: http://bit.ly/2JyCJSy
The Guardian has reported Chinese guards install a secret app to extract emails, text messages, contacts, and handset information.