Myneral.me wins the TechCrunch Hackathon at VivaTech

It’s been a long night at VivaTech. The building hosted a very special competition — the TechCrunch Hackathon in Paris. Hundreds of engineers and designers got together to come up with something cool, something neat, something awesome. The only condition was that they only had 36 hours to work on their projects. Some of them […]

New secret-spilling flaw affects almost every Intel chip since 2011

Security researchers have found a new class of vulnerabilities in Intel chips which, if exploited, can be used to steal sensitive information directly from the processor., The bugs are reminiscent of Meltdown and Spectre, which exploited a weakness in speculative execution, an important part of how modern processors work. Speculative execution helps processors predict to […]

WhatsApp exploit let attackers install government-grade spyware on phones

WhatsApp just fixed a vulnerability that allowed malicious actors to remotely install spyware on affected phones, and an unknown number reportedly did so with a commercial-grade snooping package usually sold to nation-states. The vulnerability (documented here) was discovered by the Facebook-owned WhatsApp in early May, the company confirmed to TechCrunch. It apparently leveraged a bug […]

Keyword research in 2019: Modern tactics for growing targeted search traffic

Glen Allsopp Contributor Glen Allsopp is the founder of Detailed.com, an SEO consultancy and newsletter focused on actionable tactics to grow search traffic. He also tracks successful online startups at Gaps.com. In 2019, it’s estimated that every minute there are 150 new websites coming online. While many of these won’t be long-term ventures, a large […]

The new new web

How old web technologies are being replaced by scalable and simpler new technology stacks Jon Evans @rezendi / 13 hours Over the last five years, almost everything about web development has changed. Oh, the old tech still works, your WordPress and Ruby On Rails sites still function just fine — but they’re increasingly being supplanted […]

What you missed in cybersecurity this week

It’s been a busy week — it’s tough to keep up with all the cybersecurity news. We’ve collected some of the biggest cybersecurity stories from the week — from TechCrunch and afar — to keep you up to date with the latest hacks, privacy breaches and security stories you need to know. Facebook now says […]

How do you hire a great growth marketer?

Julian Shapiro Contributor Julian Shapiro is the founder of BellCurve.com, a growth marketing agency that trains you to become a marketing professional. He also writes at Julian.com. More posts by this contributor How do startups actually get their content marketing to work? What’s the cost of buying users from Facebook and 13 other ad networks? […]

Working backwards to uncover key success factors

Ed Byrne Contributor Ed Byrne is an entrepreneur, investor and co-founder of Scaleworks. More posts by this contributor Netflix is still too cheap Don’t fear the big company ‘kill zones’ If you’re a SaaS business,  you’re likely overwhelmed with data and an ever-growing list of acronyms that purport to unlock secret keys to your success. […]

The different playbooks of D2C brands

Ashwin Ramasamy Contributor Ashwin Ramasamy is the cofounder of PipeCandy that provides algorithm-generated insights and predictions about eCommerce and D2C companies. His company helps investors, banks, tech firms and governments understand the global eCommerce landscape. @Ashwinizer More posts by this contributor Waiting for the right professional network It’s the end of “euphoric times” for custom […]

What business leaders can learn from Jeff Bezos’ leaked texts

Joel Wallenstrom Contributor Joel Wallenstrom is president and chief executive of Wickr, a secure communications company. Before Wickr, Joel co-founded iSEC Partners, one of the world’s leading information security research teams, later acquired by NCC Group, and served as Director for Strategic Alliances at @stake, one of the very first computer security companies in the […]