How people respond to ransomware attacks
Monday, April 10, 2023 by David Carvalho
Ransomware attackers extorted $456.8 million from victims in 2022, 40% down from the $765.6 million in the previous year. However, before we clink glasses to celebrate victory, there are some significant caveats to consider. The recent hack of Euler Finance where $135 million in staked Ether tokens (stETH), was drained from the protocol, is a case in point. How organiza...
Will AI make us more secure
Friday, February 3, 2023 by Monica Oravcova
ChatGPT, the dialogue-based AI chatbot capable of understanding natural human language, has become another icon in the disruptor ecosystem. Gaining over 1 million registered users in just 5 days, it has become the fastest-growing tech platform ever. ChatGPT generates impressively detailed human-like written text and thoughtful prose, following a text input prompt. ...
Developers and brands must make mobile apps far more secure
Tuesday, January 17, 2023 by Christian Hargrave
The bad guys are still breaking digital windows and kicking down digital doors, so to speak, and will continue well into 2023 and beyond!
Consumers through experience or gut instinct will demand that their mobile app providers deliver key security features including trying to stop the increasingly prevalent "man-in-the-middle" attacks. The latest techn...
ChatGPT gains 1 million users within 5 days
Friday, December 23, 2022 by Richard Harris
ChatGPT has gained over 1 million registered users in just 5 days, it became the fastest-growing tech platform ever. ChatGPT generates impressively detailed human-like written text and thoughtful prose, after being fed a text input prompt. In addition, ChatGPT also writes code. The Web3 community was intrigued, curious, and shocked by the power of this AI Chatbot.
No...
Cardano gets largest upgrade in 5 years
Wednesday, October 19, 2022 by Richard Harris
The research and software development company behind Cardano, Input Output Global (IOG), has confirmed that it had last night, along with the Cardano Foundation technical team, successfully applied the much-anticipated ‘Vasil’ upgrade to the Cardano mainnet. The upgrade is set to bring increased network capacity, richer applications, and faster transactions ...
How eSIM iPhone 14 could be a disaster for unprepared carriers
Monday, September 12, 2022 by Richard Harris
The news that Apple has launched an eSIM-only iPhone 14 model in the US is an eSIM turning point in the mobile carrier industry, essentially signaling the start of a new era of digital connectivity competition, says GlobalData.
According to the leading data and analytics company, the consequences are many and varied, as the eSIM-only smartphone model represents myria...
Decentralized wallets suggested after Solana hack
Wednesday, August 17, 2022 by Freeman Lightner
The recent hack on the Solana cryptocurrency wallet has led to a drain of millions of dollars, which raised concerns about the security of the crypto ecosystem. Against this backdrop, the volume of discussions around 'Solana' among Twitter influencers surged in the first week of August as most of them commended the use of decentralized or open source w...
Using blockchain to grow your business
Tuesday, August 16, 2022 by Mark Kaley
By now, almost everyone who spends time in the tech space knows that blockchain technology is having a moment. It is a digital technology that has gained prominence in recent years, especially concerning the cryptocurrency industry.
How you could be using blockchain to grow your business
Blockchain technology is not just for tech-savvy bitcoin traders, however. Th...
2021 hackathon from NEAR
Friday, August 13, 2021 by Freeman Lightner
NEAR announced the first in a series of NEAR MetaBUIDL hackathons with $1 million in prizes until the end of the year. The first MetaBUIDL Hackathon runs from Aug 27 to Sep 12. Registration is open now.
Speakers and Activities at the 2021 hackathon from NEAR
They think it's a great opportunity for anyone interested in solving real-world problems that coul...
Security concerns will be front and center in 2021
Saturday, January 9, 2021 by Brittany Hainzinger
Security concerns, especially when it comes to cloud native applications, will be even more front and center in 2021 than they have been recently, said Linux Foundation SVP & General Manager of Training & Certification Clyde Seepersad.
Recent research by The Linux Foundation and Harvard found that open source developers are not prioritizing security issu...
HackNotice announces threat intelligence platform
Friday, September 18, 2020 by Brittany Hainzinger
HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...
5 app development tips to help you avoid disaster
Wednesday, November 28, 2018 by Joe Hanson
Mobile app development: it’s easy and straightforward in the lab, but once your app is deployed to the wild, all bets are off. You need to deliver seamless, fast experiences for users on low-powered devices, in any number of network environments.
When it comes to building mobile apps, uncontrollable user behavior can lead you down the path to death by 1000 pape...
Twitter and KaiOS take on KaiOSpowered smart feature phones
Wednesday, November 21, 2018 by Joyce Shen
Imagine you’re a seasoned designer for smartphones working with ever-expanding resources, including memory, CPU speed, and screen resolution. Then, one day, your manager gives you an assignment to work on a device that has less of all this and doesn’t even have a touchscreen!
This is what happened to some of the designers at Twitter and KaiOS, all of whom...
DuckDuckGo vs. Google vs. Privacy
Friday, October 19, 2018 by Richard Harris
Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...
How the reddit security breach reminds us to be careful
Monday, August 6, 2018 by Christian Hargrave
reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files.
They went on to sa...
How Nintendo proves some people hate the app stores
Tuesday, May 29, 2018 by Richard Harris
When Nintendo announced that it’s bringing back the NES Classic console on June 29th my first thought was...why? It's a proven platform there's no doubt, but you can walk into any used video game store across the land and pickup the actual vintage console for around $100 bucks. Or just cruise Ebay and you'll find the console, controllers, 25 cartridge games, the zapper ...
The software fail watch report
Wednesday, January 31, 2018 by Richard Harris
Tricentis has announced the release of their fifth annual Software Fail Watch report, which is a detailed analysis of the software failures, defects, and vulnerabilities covered by news organizations from around the globe. Tricentis analyzed each failure to reveal industry-specific trends as well as impacts to stock prices, market share, and customer trust and loyalty. ...
US Military offers BrainHQ brain training to all personnel
Wednesday, January 24, 2018 by Richard Harris
In recognition of recent breakthroughs in brain science, every soldier, sailor, airman and marine in the US Armed Forces will now have access to computerized brain training and assessments from Posit Science, through its BrainHQ web, phone and tablet apps.Library distributor Demco Software made the arrangements with the US Department of Defense through the library syste...
Why developers must be blockchain agnostic for decentralized apps
Monday, December 4, 2017 by Ben Gorlick
It’s difficult to overemphasize how important blockchain technology will be to the world of app development over the next decade. While it’s clearly still an emerging technology, the fundamental shift that it will bring about in the foundations on which applications are built will be profound. Many developers have foreseen this change and are investigating how it might ...
Software testing considerations for voicefirst applications
Saturday, December 2, 2017 by Do Nguyen
The names Alexa and Echo are household names and someday soon, most people will have these devices in their homes, ordering takeout, picking out a song, answering trivia questions. Welcome to the voice-first applications era. Amazon and Google have sold millions of Amazon Alexa and Echo and Google Home devices and 24.5 million voice-first devices are expected to ship be...
Sending out an S.O.S. for SMS
Wednesday, October 4, 2017 by Will LaSala
What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i...
Pythonpowered machine learning with Anaconda and MS partnership
Monday, October 2, 2017 by Christian Hargrave
Anaconda, Inc. has announced it is partnering with Microsoft to embed Anaconda into Azure Machine Learning, Visual Studio and SQL Server to deliver data insights in real time. Microsoft and Anaconda will partner to deliver Anaconda for Microsoft, a subset of the Anaconda distribution available on Windows, MacOS and Linux. Anaconda, Inc. will also offer a range of suppor...
The HBO hack reveals how vulnerable data is to black hats
Thursday, August 31, 2017 by Richard Harris
The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...
New biometric authentication could be a password killer
Wednesday, July 12, 2017 by Christian Hargrave
Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...
DocuSign talks about embedding eSigning into your app
Monday, June 12, 2017 by Richard Harris
DocuSign, an eSignature startup, has a reported $3 billion valuation, more than 100+ million users, and a client roster that includes Microsoft, Salesforce, LinkedIn and SAP. Here Marie Huwe, the VP of Developer Programs and Evangelism at DocuSign, tells us about their API and how developers have influenced their growth and success to date. ADM: What is your role at Doc...
Dashlane to utilize Android's new support for password managers
Monday, May 29, 2017 by Christian Hargrave
Google announced native support for password managers in Android O and an early preview of Autofill with Google, which in the absence of a password manager, allows the user to use information from Chrome Sync and Google Payments to autofill apps. By offering basic functionality out-of-the-box and making it much easier for users to adopt and use a password management app...
Get mobile printing up and running: What CIOs need to know
Wednesday, May 24, 2017 by Brent Richtsmeier
Enterprise workplace infrastructure is changing. Gartner found that total mobile sales into the enterprise globally are greater than 200,000 per year, while PCs are half that. The PC installed base has been on a steady decline since 2014, while the mobile installed base is on the rise - meaning mobile is set to surpass the PC installed base in 2017.However, even as more...
A DevOps framework for federal customers
Wednesday, May 17, 2017 by Christian Hargrave
Last Thursday, President Trump signed an executive order designed to strengthen the cybersecurity of federal networks including moving all federal IT systems to the cloud. The executive order also calls for effective risk management, which includes requiring planning so that maintenance, improvements and modernization occur in a coordinated way and with appropriate regu...
The Netflix hack: A chat about securing your company
Wednesday, May 10, 2017 by Richard Harris
As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...
How NGINX could overpower Microsoft soon
Thursday, April 13, 2017 by Richard Harris
In 2016, NGINX experienced their largest gains as a web server vendor, having increased by 4.8 million active sites and 2.85 percentage points. Netcraft believes that if these trends continue in 2017, NGINX could possibly overtake Microsoft as the second largest vendor in the second half of the year.In a recent conversation with Faisal Memon, Product Marketing at NGINX,...
Taking your mobile website SEO to the next level
Wednesday, April 12, 2017 by Richard Harris
Editors note: Guest submission by Tom HardyWhy does SEO have to be such a moving target? As frustrating as it is, the changing landscape of telling web crawlers all about your website for discovery is always changing. From 2015 until now, there have been well over 50 unofficial changes to the "rules" that search engines look for on your website.A good mobile friend...
Wait, the CIA can comprimise my iPhone or Android
Tuesday, March 14, 2017 by Christian Hargrave
In the largest leak of C.I.A. documents, Wikileaks disclosed the tools that C.I.A. uses to hack computers, phones and smart TVs around the world. The C.I.A.’s ability to compromise Apple and Android smartphones is especially troubling, since spies can access private information through these devices, including photos, emails, texts and videos. Further, a program ca...
ApexBrasil showcases Brazil's finest at SXSW
Friday, March 10, 2017 by Christian Hargrave
The Brazilian Trade and Investment Promotion Agency (Apex-Brasil) will showcase 68 of Brazil’s most exciting companies at the 2017 SXSW Interactive Festival. As part of its mission to bring the best of Brazil to the world’s global investors and trade fairs, Apex-Brasil will share the abundance of opportunities that exist in its vibrant ecosystem with attendees at SXSW I...
The hackers religion of open source: A manifesto (kind of)
Friday, January 27, 2017 by Pavel Cherkashin
Religion sucks. But people still need to believe in something to have motivation in life. Over the last 20 years, religions have reported incredible decreases in numbers. Many scholars attribute that to the growth of technology, connectivity and to the exposure it gives people to different religions. There are more people now that identity as “spiritual” than ever befor...
Privacy will be the name of the game in 2017
Thursday, December 22, 2016 by Richard Harris
Editors note: 2017 predictions by Alan Duric, Co-Founder and CTO at Wire
2016 has seen a huge rise in machine learning and connected devices from Amazon Alexa and Google Assistant; to Apple CarPlay and Android Auto. The world has become truly connected but not without the growing pains that any emerging industry is bound to face.
In Dec...