Новости о Code Web [ Фото новости ] [ Свежие новости ] | |
Hackers exploit Bitcoin inflation bug to print 235M fake Pigeoncoins
The collateral damage from Bitcoin’s epic inflation bug continues to spread. The developers of small-cap cryptocurrency Pigeoncoin have confirmed hackers successfully exploited the vulnerability to print 235 million Pigeoncoins, worth around $15,000. дальше »
2018-10-3 14:40 | |
|
|
RipaEx CEO interview at Business and Leaders
Giovanni Silvestri, Founder and CEO at RipaEx, has been recently interviewed by Erika Rosenstein from the businessandleaders. it web magazine. Giovanni, what is RipaEx and what is your mission? RipaEx is a project build on two pillars: Ripa Exchange: an open source exchange based on the source code of Peatio (www. дальше »
2018-10-2 01:55 | |
|
|
ShapeShift launches new cryptocurrency tracker (but it’s no CoinMarketCap)
In a blog posted yesterday, ShapeShift announced the relaunch of its cryptocurrency index, CoinCap. io. It’s built on entirely new code, but from a user perspective, it’s pretty much the same system as before – just a bit shinier. дальше »
2018-9-28 17:47 | |
|
|
Novice, Intermediate or Expert? A Quiz to Test Your Bitcoin Knowledge
Think you know the ins-and-outs of bitcoin? Test yourself with 30 questions that grill you on Bitcoin’s history, technology and politics. The 30 questions are split up into three segments ranging from novice to intermediate to expert, and cover a wide range of topics across the Bitcoin landscape. дальше »
2018-9-26 02:13 | |
|
|
Study Reveals Growing Sophistication in Malicious Mining of Cryptocurrency
Several Chinese researchers from Fudan University, Tsinghua University and the University of California Riverside have produced the first systematic study of the malicious mining of cryptocurrencies, known as cryptojacking, unveiling increasing complexity over time. дальше »
2018-9-25 23:59 | |
|
|
Sublime Git is a clean code editor for merge conflicts
Sublime HQ – the folks behind the excellent text editor Sublime Text – has released a code editor for developers that focuses on a clean interface for coding and solving git merges. It’s called Sublime Git, and it’s available for free on macOS, Windows, and Linux. дальше »
2018-9-21 17:03 | |
|
|
These few lines of CSS code will crash your iPhone
A security researcher has found out that due to a vulnerability in WebKit (a rendering engine used by Safari browser), it takes only a few lines of CSS code to crash an iPhone or an iPad. The code itself is not too complex and uses multiple nested elements like <div> tags inside a CSS effect called backdrop-filter, used for color shifting behind the element. дальше »
2018-9-17 14:33 | |
|
|
Facebook is building an AI tool to help devs fix buggy code
Facebook has built an artificial intelligence tool to help programmers patch buggy code. It’s called SapFix, and it’s currently being used internally to automatically detect anomalies in code and suggest relevant fixes to coders. дальше »
2018-9-14 09:33 | |
|
|
Kano’s latest DIY kit lets your kids build a touchscreen computer
London-based startup Kano has made a name for itself with its DIY computer kits, which aim to make it easier and more enjoyable for younger users to learn to code. Today, the company launched its newest offering, the Computer Kit Touch. дальше »
2018-9-13 12:00 | |
|
|
It took hackers just 22 lines of code to steal British Airways’ customer data
Last week, British Airways acknowledged that its website had been hacked – leading to 380,000 customers‘ data being compromised. It seems like it wasn’t too difficult either: Cybersecurity firm RiskIQ has found out that it took hackers just 22 lines of code to get a hold of the data. дальше »
2018-9-12 08:31 | |
|
|
Hackers Breach MEGA Chrome Extension To Steal Crypto Private Keys
Modern technologies, such as the internet, smartphones, and blockchain, are often touted as world-changing innovations, and while this may be the case, there are still glaring problems with the security of digital systems. дальше »
2018-9-5 09:45 | |
|
|
The Anatomy of Anonymity: How Dandelion Could Make Bitcoin More Private
Many people know bitcoin as an anonymous digital currency, one whose privacy features prime it for concealed payments in sketchy recesses of the internet’s dark web. дальше »
2018-8-29 17:33 | |
|
|
PSA: Major EOS bug makes it possible to steal valuable resources directly from users
Here we go again with more EOS troubles: the popular cryptocurrency purportedly suffers from a major vulnerability that makes it possible to steal valuable network resources directly from user accounts – without any authorization. дальше »
2018-8-27 14:24 | |
|
|
Dark Tequila is a sophisticated banking malware targeting victims in Mexico
Security researchers at Kaspersky Lab have uncovered a sophisticated cybercrime outfit called Dark Tequila, which targets banking customers in Mexico and other Latin American nations. Kaspersky believes Dark Tequila has been active since 2013, primarily in Mexico. дальше »
2018-8-21 17:24 | |
|
|
AMA With Origin Team Reveals Plans for Decentralized Sharing Economy
Matt Liu, Josh Fraser and former PayPal head Yu Pan want to bring the blockchain to the sharing economy. The trio is devising a platform with an emphasis on inclusive, peer-to-peer service hubs designed to decentralize the same consumer cost-friendly business models that have made companies like Airbnb, Uber and Lyft so popular in recent years. дальше »
2018-8-16 23:25 | |
|
|
Chromebooks to get new Windows 10 dual-booting feature called Campfire
Google is reportedly working in a new feature in ChromeOS called Campfire, which will allow users to dual-boot Windows 10 on their Chromebook laptops. The feature was highlighted by XDA Developers, which discovered a code branch called Campfire in the Chromium Git, and a reference to an “Alt OS. дальше »
2018-8-13 14:54 | |
|
|
Take a look inside the Furby’s source code
The source code to the original Furby has leaked. If you were a parent in the 1990’s annoyed by its incessant chirping (or indeed, if you were a kid doing the annoying), now’s your chance to dive into its internals and see how it works. дальше »
2018-8-13 14:05 | |
|
|
Take a look inside the Furby’s leaked source code
The source code to the original Furby has leaked. If you were a parent in the 1990’s annoyed by its incessant chirping (or indeed, if you were a kid doing the annoying), now’s your chance to dive into its internals and see how it works. дальше »
2018-8-13 14:05 | |
|
|
Google’s new Q&A app lets celebs personally answer your most boring queries
Google has, more and more, attempted to offer public figures a chance to manage their own Google results — and in this case it appears to be trying to have fun with those inane questions people are always Googling about their favorite celebrities. дальше »
2018-8-10 20:01 | |
|
|
Snapchat’s leaked source code is clean, literally
In May, hackers leaked a portion of Snapchat’s top secret source code to the wider Internet. Snapchat owner Snap Inc was quick to issue a takedown notice, but the Internet never forgets. You can still find it, if you know where to look. дальше »
2018-8-8 18:14 | |
|
|
Hacker swipes Snapchat’s source code, publishes it on GitHub
Snapchat doesn’t just make messages disappear after a period of time. It also does the same to GitHub repositories — especially when they contain the company’s proprietary source code. So, what happened? Well, let’s start from the beginning. дальше »
2018-8-7 21:56 | |
|
|
200,000 routers in Brazil were secretly hijacked to mine cryptocurrency
Brazil has been hit by an elaborate cryptocurrency mining attack that infected hundreds of thousands of routers across the country. The attack, which is still ongoing, affects MikroTik routers specifically. дальше »
2018-8-3 16:58 | |
|
|
Monero Glitch Allowed Hackers To Steal XMR From Exchanges
The Next Web’s in-house cryptocurrency column recently reported that Monero, the foremost privacy-centric cryptocurrency, was subject to a relatively minor cybersecurity vulnerability. According to the technology news outlet, “inventive” hackers could create false transaction data via the copying of a simple line of code from the Monero wallet code base, which is open-sourced and easily […] The post Monero Glitch Allowed Hackers To Steal XMR From Exchanges appeared first on Ethereum World News. дальше »
2018-8-3 06:14 | |
|
|
Monero wallet vulnerability made it possible to steal XMR from exchanges
It appears popular cryptocurrency Monero, often praised for its privacy functions, was riddled with security vulnerabilities – one of which allowed hackers to steal coins directly from the wallets of exchange desks. дальше »
2018-8-2 15:16 | |
|
|
Everything you need to know about Reddit’s recent security ‘incident’
Reddit recently learned that a hacker managed to access multiple employee accounts and walk away with “some” current email addresses and a 2007 database backup. It’s in the midst of a “painstaking investigation” currently to figure out what went wrong. дальше »
2018-8-2 22:00 | |
|
|
Facebook is developing a singing contest feature to rival musical.ly
If karaoke on the weekends isn’t enough for you to show off your vocals, you might like what Facebook has been caught working on. Researcher and code-breaker Jane Manchum Wong found a code which indicates that Facebook may introduce a ‘Talent Show’ feature where users would make use of Facebook’s recently added music partnerships by recording themselves singing and submitting their audition for review amongst other users on the platform. дальше »
2018-8-1 14:29 | |
|
|
Steam removes controversial game accused of mining cryptocurrency
Steam has removed “trivial platformer” game Abstractism from its store following accusations that the game is surreptitiously stealing users’ computing power to mine cryptocurrency. “We have removed Abstractism and banned its developer from Steam for shipping unauthorized code, trolling with content, and scamming customers with deceptive in-game items,” Doug Lombardi, VP of Marketing at Steam, told Hard Fork in an email. дальше »
2018-7-31 12:50 | |
|
|
Microsoft debuts free quantum computer programming katas
Microsoft yesterday announced the release of Quantum Katas, a self-paced programming project that teaches developers how to write code for quantum computers. Quantum Katas, as the name implies, are coding katas from Microsoft that teach beginning developers the fundamentals of the company’s quantum computer programming language called Q#. дальше »
2018-7-24 19:57 | |
|
|
Etherscan rushes to plug vulnerabilities following strange hacking attempts overnight
Etherscan, the most widely used Ethereum blockchain explorer, has quickly patched security vulnerabilities overnight as hackers exploited certain parts of its service. Hackers successfully manipulated the Disqus API – a third-party service used by Etherscan that allows for comments to be left on Ethereum wallet addresses. дальше »
2018-7-24 13:00 | |
|
|
DOOM in ASCII mode is equal parts fun and frustrating
You don’t really need an excuse to revisit id Software’s genre-defining FPS game, DOOM – but indie developer Dario Zubovoic’s take on the classic is good enough reason to jump back into the gory shooter for a few rounds. дальше »
2018-7-23 09:46 | |
|
|
A Prehistory of the Ethereum Protocol
Although the ideas behind the current Ethereum protocol have largely been stable for two years, Ethereum did not emerge all at once, in its current conception and fully formed. Before the blockchain has launched, the protocol went through a number of significant evolutions and design decisions. дальше »
2018-7-21 23:03 | |
|
|
Review of top 50 ICOs shows most promise things they will never deliver
The most extensive legal report on initial coin offerings (ICOs) is now available to the general public, and the findings are pretty damning. University of Pennsylvania legal professors, alongside research teams, have meticulously studied the top 50 highest grossing ICOs of last year – their whitepapers and their code – to determine if there was any disparity between promises made and cryptocurrencies developed. дальше »
2018-7-18 17:30 | |
|
|
A beginner’s guide to AI: Computer vision and image recognition
This is the second story in our continuing series covering the basics of artificial intelligence. While it isn’t necessary to read the first article, which covers neural networks, doing so may add to your understanding of the topics covered in this one. дальше »
2018-7-18 02:15 | |
|
|
Op Ed: Addressing the Threat of Cryptomining Malware
One major class of attacks to hit the hacking landscape recently is cryptomining. While cryptomining on its own supports a good cause when being done consciously, it also allows nefarious actors to make a lot of money fast, and, with the sheer number of cryptocurrencies available to mine, it is becoming a popular choice for attackers. дальше »
2018-7-18 23:18 | |
|
|
JavaScript runs the Web — so learn to run JavaScript with training under $15
JavaScript is one of the most versatile tools a web developer can swing — and you can get the complete JS exposure with the training found in the Essential JavaScript Coding Bundle. It’s available right now from TNW Deals for only $15, an over 90 percent savings with coupon code "DIGITALWEEK50." дальше »
2018-7-17 17:00 | |
|
|
How can we use coding more creatively? Artist and hacker Zach Lieberman will be taking all your questions
What do computer coding and creating art have in common? Who are the artists who have influenced you most? How can art make everyday life better? Ask all this and more to new media artist Zach Lieberman. дальше »
2018-7-11 18:21 | |
|
|























