:

Business

Attackers spread backdoor via eScan antivirus software update process

Avast discovered and analyzed GuptiMiner, a malware campaign hijacking an eScan antivirus update mechanism to distribute backdoors and coinminers.

My Dinner with [Marc] Andreessen

Billionaires I have known: Part One of a three-part series

Mac and MacBook hit with 'Cuckoo' malware stealing sensitive data

Kurt "CyberGuy" Knutsson has a warning about a new type of malware that's targeting Apple computers for files that may contain private information.

Deliberative Consensus Protocols

Introduction: Scalable Group Decision-Making A deliberative consensus protocol is a process that online groups can use to make decisions. It’s designed to produce good decisions that are fair and manifest the collective intelligence of the group.

The dangers of "decentralized" ID systems

Many decentralized identity protocols are being developed, which claim to increase users’ privacy, enable interoperability and convenient...

Bountysource Stole at Least $17,000 from Open Source Developers

This is why people say the open source ecosystem sucks.

Coinbase Delivers Major Earnings, Revenue Beat Thanks To Soaring Bitcoin Prices, Crypto Interest

Coinbase transaction revenue more-than doubled as crypto prices, participation rally with bitcoin.

Why there will never be another Bitcoin

On October 31, 2008, an unknown coder named Satoshi Nakamoto published a paper that laid the foundation for an entirely new monetary system – 15 years later, the world is only just catching on to its true value and potential.

Enough With Saving the Honeybees

For years, people have understood them to be at imminent risk of extinction, despite evidence to the contrary. Why?