cryptocurrency

Base layer protocols: Base layer protocols are the peer-to-peer networks which form the basis of the Decentralized application (dApp) web. These base protocols are typically blockchains with an associated cryptocurrency coin secured by a consensus protocol where participants in the network decide collectively on the addition of new blocks toRead More →

crypto

Hackers are trying a novel approach to extort developers of some money. Ransomware, a type of attack where hackers infect computers, encrypt their content, and ask for money in exchange for a decryption key that will restore their data, has been around for years. This new attack is a little differentRead More →

crypto

Hackers used a clever new tactic to steal over $800k from the users of a popular bitcoin wallet. Admins of popular Bitcoin wallet, Electrum, are warning users of a phishing attack that tricks its users into downloading a malicious update that steals their passwords. According to ZDNet, these hackers added tens of malicious serversRead More →

crypto

In an age where Facebook, Google, Amazon, and many others are amassing an immense amount of data, what could be more concerning than drastic advancements in artificial intelligence? Thanks to neural networks and deep learning, tons of decision problems can be solved by simply having enough labelled data. The implications ofRead More →