[{"title":"Streak (Google Partner of the Year) Is Hiring in Vancouver","description":"<a href="https://news.ycombinator.com/item?id=19697520">Comments</a>","link":"https://www.streak.com/offices/vancouver","comments":"https://news.ycombinator.com/item?id=19697520","updated_at":"2019-04-19T06:34:45+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19697520","link_host":"www.streak.com","from":"hackernews"},{"title":"Ruby3 Will Have Types","description":"<a href="https://news.ycombinator.com/item?id=19697405">Comments</a>","link":"https://twitter.com/darkdimius/status/1119115657776209920","comments":"https://news.ycombinator.com/item?id=19697405","updated_at":"2019-04-19T06:00:59+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19697405","link_host":"twitter.com","from":"hackernews"},{"title":"Bangka Island: The WW2 massacre and a 'truth too awful to speak'","description":"<a href="https://news.ycombinator.com/item?id=19697145">Comments</a>","link":"https://www.bbc.com/news/world-australia-47796046","comments":"https://news.ycombinator.com/item?id=19697145","updated_at":"2019-04-19T04:40:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19697145","link_host":"www.bbc.com","from":"hackernews"},{"title":"Uber’s self-driving unit gets $1B investment from SoftBank","description":"<a href="https://news.ycombinator.com/item?id=19697072">Comments</a>","link":"https://www.theverge.com/2019/4/18/18507049/uber-atg-self-driving-autonomous-car-investment-softbank-toyota-denso","comments":"https://news.ycombinator.com/item?id=19697072","updated_at":"2019-04-19T04:19:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19697072","link_host":"www.theverge.com","from":"hackernews"},{"title":"Instagram hides Like counts in leaked design prototype","description":"<a href="https://news.ycombinator.com/item?id=19696968">Comments</a>","link":"https://techcrunch.com/2019/04/18/instagram-no-like-counter/","comments":"https://news.ycombinator.com/item?id=19696968","updated_at":"2019-04-19T03:51:46+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19696968","link_host":"techcrunch.com","from":"hackernews"},{"title":"Sorbet: A fast, powerful type checker designed for Ruby","description":"<a href="https://news.ycombinator.com/item?id=19696669">Comments</a>","link":"https://sorbet.org/","comments":"https://news.ycombinator.com/item?id=19696669","updated_at":"2019-04-19T02:43:03+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19696669","link_host":"sorbet.org","from":"hackernews"},{"title":"Ikonate – fully customisable and accessible vector icons","description":"<a href="https://news.ycombinator.com/item?id=19696604">Comments</a>","link":"https://www.ikonate.com","comments":"https://news.ycombinator.com/item?id=19696604","updated_at":"2019-04-19T02:28:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19696604","link_host":"www.ikonate.com","from":"hackernews"},{"title":"After a $14B Upgrade, New Orleans’ Levees Are Sinking","description":"<a href="https://news.ycombinator.com/item?id=19696096">Comments</a>","link":"https://www.scientificamerican.com/article/after-a-14-billion-upgrade-new-orleans-levees-are-sinking/","comments":"https://news.ycombinator.com/item?id=19696096","updated_at":"2019-04-19T00:43:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19696096","link_host":"www.scientificamerican.com","from":"hackernews"},{"title":"Refused U.S. visa eight times, Zoom CEO is now a billionaire","description":"<a href="https://news.ycombinator.com/item?id=19696026">Comments</a>","link":"https://www.bloomberg.com/news/articles/2019-04-18/u-s-refused-his-visa-eight-times-now-zoom-ceo-is-a-billionaire","comments":"https://news.ycombinator.com/item?id=19696026","updated_at":"2019-04-19T00:29:36+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19696026","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"Mozilla WebThings","description":"<a href="https://news.ycombinator.com/item?id=19695595">Comments</a>","link":"https://hacks.mozilla.org/2019/04/introducing-mozilla-webthings/","comments":"https://news.ycombinator.com/item?id=19695595","updated_at":"2019-04-18T23:11:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19695595","link_host":"hacks.mozilla.org","from":"hackernews"},{"title":"Another ZFS Port on Linux","description":"<a href="https://news.ycombinator.com/item?id=19695425">Comments</a>","link":"https://www.crossmeta.io/another-zfs-port-on-linux/","comments":"https://news.ycombinator.com/item?id=19695425","updated_at":"2019-04-18T22:40:34+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19695425","link_host":"www.crossmeta.io","from":"hackernews"},{"title":"Two Winning Pwn2Own JIT Vulnerabilities in Mozilla Firefox","description":"<a href="https://news.ycombinator.com/item?id=19695347">Comments</a>","link":"https://www.zerodayinitiative.com/blog/2019/4/18/the-story-of-two-winning-pwn2own-jit-vulnerabilities-in-mozilla-firefox","comments":"https://news.ycombinator.com/item?id=19695347","updated_at":"2019-04-18T22:26:56+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19695347","link_host":"www.zerodayinitiative.com","from":"hackernews"},{"title":"Designing a Full-Time Human Habitat on the Moon","description":"<a href="https://news.ycombinator.com/item?id=19695255">Comments</a>","link":"https://www.citylab.com/design/2019/04/moon-village-som-mit-esa-space-urbanism-planning-habitat/587482/","comments":"https://news.ycombinator.com/item?id=19695255","updated_at":"2019-04-18T22:11:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19695255","link_host":"www.citylab.com","from":"hackernews"},{"title":"Super Mario Bros. has been released for the Commodore 64","description":"<a href="https://news.ycombinator.com/item?id=19695114">Comments</a>","link":"https://www.lemon64.com/forum/viewtopic.php?t=71262","comments":"https://news.ycombinator.com/item?id=19695114","updated_at":"2019-04-18T21:51:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19695114","link_host":"www.lemon64.com","from":"hackernews"},{"title":"‘Our Lying Eyes’: Inaccurate eyewitness identifications and wrongful convictions","description":"<a href="https://news.ycombinator.com/item?id=19694356">Comments</a>","link":"https://www.nybooks.com/articles/2019/04/18/our-lying-eyes/","comments":"https://news.ycombinator.com/item?id=19694356","updated_at":"2019-04-18T20:11:00+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19694356","link_host":"www.nybooks.com","from":"hackernews"},{"title":"How the Boeing 737 Max disaster looks to a software Developer","description":"<a href="https://news.ycombinator.com/item?id=19694207">Comments</a>","link":"https://spectrum.ieee.org/aerospace/aviation/how-the-boeing-737-max-disaster-looks-to-a-software-developer","comments":"https://news.ycombinator.com/item?id=19694207","updated_at":"2019-04-18T19:51:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19694207","link_host":"spectrum.ieee.org","from":"hackernews"},{"title":"Mercury – Banking built for startups","description":"<a href="https://news.ycombinator.com/item?id=19694077">Comments</a>","link":"https://mercury.co/#","comments":"https://news.ycombinator.com/item?id=19694077","updated_at":"2019-04-18T19:32:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19694077","link_host":"mercury.co","from":"hackernews"},{"title":"Facebook Stored Millions of Instagram Users' Passwords in Plaintext ","description":"Facebook late last month revealed that the social media company mistakenly stored passwords for "hundreds of millions" of Facebook users in plaintext, including "tens of thousands" passwords of its Instagram users as well.\n\nNow it appears that the incident is far worse than first reported.\n&lt;!-- adsense --&gt;\nFacebook today quietly updated its March press release, adding that the actual number of<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/mUy061Tk7sY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/mUy061Tk7sY/instagram-password-plaintext.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mUy061Tk7sY/instagram-password-plaintext.html","updated_at":"2019-04-18T19:29:52+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mUy061Tk7sY/instagram-password-plaintext.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Wipro Intruders Targeted Other Major IT Firms","description":"<a href="https://news.ycombinator.com/item?id=19693726">Comments</a>","link":"https://krebsonsecurity.com/2019/04/wipro-intruders-targeted-other-major-it-firms/","comments":"https://news.ycombinator.com/item?id=19693726","updated_at":"2019-04-18T18:48:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19693726","link_host":"krebsonsecurity.com","from":"hackernews"},{"title":"AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption","description":"<a href="https://news.ycombinator.com/item?id=19693434">Comments</a>","link":"https://tools.ietf.org/html/rfc8452","comments":"https://news.ycombinator.com/item?id=19693434","updated_at":"2019-04-18T18:20:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19693434","link_host":"tools.ietf.org","from":"hackernews"},{"title":"Keeping master green at scale","description":"<a href="https://news.ycombinator.com/item?id=19692820">Comments</a>","link":"https://eng.uber.com/research/keeping-master-green-at-scale/","comments":"https://news.ycombinator.com/item?id=19692820","updated_at":"2019-04-18T17:16:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19692820","link_host":"eng.uber.com","from":"hackernews"},{"title":"Modern Clowning in Los Angeles","description":"<a href="https://news.ycombinator.com/item?id=19692214">Comments</a>","link":"https://www.dorsia.io/cities/los-angeles/articles/clown-schools-los-angeles","comments":"https://news.ycombinator.com/item?id=19692214","updated_at":"2019-04-18T16:14:09+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19692214","link_host":"www.dorsia.io","from":"hackernews"},{"title":"The Healing Power of Gardens","description":"<a href="https://news.ycombinator.com/item?id=19691407">Comments</a>","link":"https://www.nytimes.com/2019/04/18/opinion/sunday/oliver-sacks-gardens.html","comments":"https://news.ycombinator.com/item?id=19691407","updated_at":"2019-04-18T14:50:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19691407","link_host":"www.nytimes.com","from":"hackernews"},{"title":"The Parker Vacumatic (2016)","description":"<a href="https://news.ycombinator.com/item?id=19690313">Comments</a>","link":"https://www.penaddict.com/blog/2016/7/28/the-parker-vacumatic","comments":"https://news.ycombinator.com/item?id=19690313","updated_at":"2019-04-18T11:59:10+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19690313","link_host":"www.penaddict.com","from":"hackernews"},{"title":"Elusive molecule, first in Universe, detected in space","description":"<a href="https://news.ycombinator.com/item?id=19690167">Comments</a>","link":"https://phys.org/news/2019-04-elusive-molecule-universe-space.html","comments":"https://news.ycombinator.com/item?id=19690167","updated_at":"2019-04-18T11:21:05+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19690167","link_host":"phys.org","from":"hackernews"},{"title":"Facebook Collected Contacts from 1.5 Million Email Accounts Without Users' Permission","description":"Not a week goes without a new Facebook blunder.\n\nRemember the most recent revelation of Facebook being caught asking users new to the social network platform for their email account passwords to verify their identity?\n\nAt the time, it was suspected that Facebook might be using access to users' email accounts to unauthorizedly and secretly gather a copy of their saved contacts.\n\nNow it turns<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Vah18iz39jU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Vah18iz39jU/facebook-email-database.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Vah18iz39jU/facebook-email-database.html","updated_at":"2019-04-18T11:00:24+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Vah18iz39jU/facebook-email-database.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"A Pragmatic Introduction to Secure Multi-Party Computation","description":"<a href="https://news.ycombinator.com/item?id=19689995">Comments</a>","link":"https://securecomputation.org/","comments":"https://news.ycombinator.com/item?id=19689995","updated_at":"2019-04-18T10:29:45+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19689995","link_host":"securecomputation.org","from":"hackernews"},{"title":"First Japan-Built Airliner in 50 Years Takes on Boeing and Airbus","description":"<a href="https://news.ycombinator.com/item?id=19689946">Comments</a>","link":"https://www.bloomberg.com/news/articles/2019-04-17/first-japan-built-airliner-in-50-years-takes-on-boeing-airbus","comments":"https://news.ycombinator.com/item?id=19689946","updated_at":"2019-04-18T10:18:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19689946","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"World's tallest tropical tree discovered and climbed in Malaysian Borneo","description":"<a href="https://news.ycombinator.com/item?id=19689910">Comments</a>","link":"https://www.nationalgeographic.com/environment/2019/04/worlds-tallest-tropical-tree-discovered-climbed-borneo/","comments":"https://news.ycombinator.com/item?id=19689910","updated_at":"2019-04-18T10:08:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19689910","link_host":"www.nationalgeographic.com","from":"hackernews"},{"title":"Former student destroys 59 university computers using USB Killer device","description":"<a href="https://news.ycombinator.com/item?id=19689601">Comments</a>","link":"https://www.zdnet.com/article/former-student-destroys-59-university-computers-using-usb-killer-device/","comments":"https://news.ycombinator.com/item?id=19689601","updated_at":"2019-04-18T08:30:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19689601","link_host":"www.zdnet.com","from":"hackernews"},{"title":"Utah Bans Police from Searching Digital Data Without a Warrant, Closes Loophole","description":"<a href="https://news.ycombinator.com/item?id=19689319">Comments</a>","link":"https://www.forbes.com/sites/nicksibilla/2019/04/16/utah-bans-police-from-searching-digital-data-without-a-warrant-closes-fourth-amendment-loophole/","comments":"https://news.ycombinator.com/item?id=19689319","updated_at":"2019-04-18T07:17:36+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19689319","link_host":"www.forbes.com","from":"hackernews"},{"title":"IMGBIN - Resource of millions of free transparent PNG images","description":"https://imgbin.com/","link":"https://www.designernews.co/stories/101980-imgbin--resource-of-millions-of-free-transparent-png-images","comments":"https://www.designernews.co/stories/101980-imgbin--resource-of-millions-of-free-transparent-png-images","updated_at":"2019-04-18T05:36:42+00:00","link_to_comments":"https://www.designernews.co/stories/101980-imgbin--resource-of-millions-of-free-transparent-png-images","link_host":"imgbin.com","from":"designernews"},{"title":"Drupal Releases Core CMS Updates to Patch Several Vulnerabilities","description":"Drupal, the popular open-source content management system, has released security updates to address multiple "moderately critical" vulnerabilities in Drupal Core that could allow remote attackers to compromise the security of hundreds of thousands of websites.\n\nAccording to the advisories published today by the Drupal developers, all security vulnerabilities Drupal patched this month reside in<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/JEWcwVUzRiU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/JEWcwVUzRiU/drupal-security-update.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JEWcwVUzRiU/drupal-security-update.html","updated_at":"2019-04-17T21:51:03+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JEWcwVUzRiU/drupal-security-update.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Researcher Hijacks a Microsoft Service Using Loophole in Azure Cloud Platform","description":"A cybersecurity professional today demonstrated a long-known unpatched weakness in Microsoft's Azure cloud service by exploiting it to take control over Windows Live Tiles, one of the key features Microsoft built into Windows 8 operating system.\n\nIntroduced in Windows 8, the Live tiles feature was designed to display content and notifications on the Start screen, allowing users to continuously<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ua7YL1rpNME" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ua7YL1rpNME/subdomain-microsoft-azure.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ua7YL1rpNME/subdomain-microsoft-azure.html","updated_at":"2019-04-17T20:16:10+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ua7YL1rpNME/subdomain-microsoft-azure.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Lessons Learned Using Craft CMS to Build our Website","description":"https://onesignal.com/blog/craft-cms/","link":"https://www.designernews.co/stories/101968-lessons-learned-using-craft-cms-to-build-our-website","comments":"https://www.designernews.co/stories/101968-lessons-learned-using-craft-cms-to-build-our-website","updated_at":"2019-04-17T17:37:56+00:00","link_to_comments":"https://www.designernews.co/stories/101968-lessons-learned-using-craft-cms-to-build-our-website","link_host":"onesignal.com","from":"designernews"},{"title":"Framer - Announcing Framer Bridge","description":"https://www.framer.com/blog/posts/announcing-framer-bridge/","link":"https://www.designernews.co/stories/101967-framer--announcing-framer-bridge","comments":"https://www.designernews.co/stories/101967-framer--announcing-framer-bridge","updated_at":"2019-04-17T16:48:20+00:00","link_to_comments":"https://www.designernews.co/stories/101967-framer--announcing-framer-bridge","link_host":"www.framer.com","from":"designernews"},{"title":"14 designers helped us make sense of data from 6M design files","description":"Hello everyone,\n\nI’m thrilled to introduce the “always late but worth the wait" 4th Design report based on data from 6,354,110 designs uploaded to Avocode in 2018.\n\nDesign tools are something we’ve been observing and making use of ourselves at Avocode for a long time now. Rather than making boring data analysis, we decided to collaborate with world’s class illustrators to celebrate creativity by creating gorgeous visuals for each section. \n\nOn top of that, if you download the full report, you’ll find insights from the best design leaders with diverse backgrounds. Here’s a quick look at who you can expect:\n\n- Mike from Creative Mints, One of the top designers on Dribbble\n- Linzi Berry, Design System Lead at Lyft\n- Nathan Riley, Design Director & Co-Founder at Green Chameleon\n\nOur team has put a lot of work into this, so check it out and let me know your thoughts. https://avocode.com/design-report-2018\n\nThanks.","link":"https://www.designernews.co/stories/101950-14-designers-helped-us-make-sense-of-data-from-6m-design-files","comments":"https://www.designernews.co/stories/101950-14-designers-helped-us-make-sense-of-data-from-6m-design-files","updated_at":"2019-04-17T15:14:44+00:00","link_to_comments":"https://www.designernews.co/stories/101950-14-designers-helped-us-make-sense-of-data-from-6m-design-files","link_host":null,"from":"designernews"},{"title":"Figma Keyboard Stickers","description":"https://sketchkeys.com","link":"https://www.designernews.co/stories/101948-figma-keyboard-stickers","comments":"https://www.designernews.co/stories/101948-figma-keyboard-stickers","updated_at":"2019-04-17T14:54:06+00:00","link_to_comments":"https://www.designernews.co/stories/101948-figma-keyboard-stickers","link_host":"sketchkeys.com","from":"designernews"},{"title":"Tolkien was right: Scholars conclude Beowulf likely the work of single author","description":"<a href="https://news.ycombinator.com/item?id=19681765">Comments</a>","link":"https://arstechnica.com/science/2019/04/tolkien-was-right-scholars-conclude-beowulf-likely-the-work-of-single-author/","comments":"https://news.ycombinator.com/item?id=19681765","updated_at":"2019-04-17T12:04:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=19681765","link_host":"arstechnica.com","from":"hackernews"},{"title":"What do sound designers do all day?","description":"https://medium.com/zajnocrew/sounds-like-fun-how-audio-production-sets-the-mood-2621a364d016","link":"https://www.designernews.co/stories/101946-what-do-sound-designers-do-all-day","comments":"https://www.designernews.co/stories/101946-what-do-sound-designers-do-all-day","updated_at":"2019-04-17T11:41:26+00:00","link_to_comments":"https://www.designernews.co/stories/101946-what-do-sound-designers-do-all-day","link_host":"medium.com","from":"designernews"},{"title":"Over 100 Million JustDial Users' Personal Data Found Exposed On the Internet","description":"An unprotected database belonging to JustDial, India's largest local search service, is leaking personally identifiable information of its every customer in real-time who accessed the service via its website, mobile app, or even by calling on its fancy "88888 88888" customer care number, The Hacker News has learned and independently verified.\n\nFounded over two decades ago, JustDial (JD) is the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/G3EfPRNZqjQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/G3EfPRNZqjQ/justdial-hacked-data-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/G3EfPRNZqjQ/justdial-hacked-data-breach.html","updated_at":"2019-04-17T08:47:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/G3EfPRNZqjQ/justdial-hacked-data-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"[April 2019] Who's Hiring?","description":"Mid-way through the month, but never too late.\n\n## Who's hiring?","link":"https://www.designernews.co/stories/101932-april-2019-whos-hiring","comments":"https://www.designernews.co/stories/101932-april-2019-whos-hiring","updated_at":"2019-04-16T15:27:12+00:00","link_to_comments":"https://www.designernews.co/stories/101932-april-2019-whos-hiring","link_host":null,"from":"designernews"},{"title":"Rollie – Spending Tracker","description":"https://rollie.co","link":"https://www.designernews.co/stories/101931-rollie--spending-tracker","comments":"https://www.designernews.co/stories/101931-rollie--spending-tracker","updated_at":"2019-04-16T15:21:16+00:00","link_to_comments":"https://www.designernews.co/stories/101931-rollie--spending-tracker","link_host":"rollie.co","from":"designernews"},{"title":"Online creative portfolio designed in Google Sheets","description":"https://itsjakub.com/","link":"https://www.designernews.co/stories/101928-online-creative-portfolio-designed-in-google-sheets","comments":"https://www.designernews.co/stories/101928-online-creative-portfolio-designed-in-google-sheets","updated_at":"2019-04-16T14:18:24+00:00","link_to_comments":"https://www.designernews.co/stories/101928-online-creative-portfolio-designed-in-google-sheets","link_host":"itsjakub.com","from":"designernews"},{"title":"Diagonal Containers in CSS","description":"https://codyhouse.co/blog/post/css-diagonal-containers","link":"https://www.designernews.co/stories/101926-diagonal-containers-in-css","comments":"https://www.designernews.co/stories/101926-diagonal-containers-in-css","updated_at":"2019-04-16T13:42:28+00:00","link_to_comments":"https://www.designernews.co/stories/101926-diagonal-containers-in-css","link_host":"codyhouse.co","from":"designernews"},{"title":"Google Makes it Tough for Rogue App Developers Get Back on Android Play Store","description":"Even after Google's security oversight over its already-huge Android ecosystem has evolved over the years, malware apps still keep coming back to Google Play Store.\n\nSometimes just reposting an already detected malware app from a newly created Play Store account, or using other developers' existing accounts, is enough for 'bad-faith' developers to trick the Play Store into distributing unsafe<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/lnh6UoV0a0w" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/lnh6UoV0a0w/android-google-play-store.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/lnh6UoV0a0w/android-google-play-store.html","updated_at":"2019-04-16T12:05:38+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/lnh6UoV0a0w/android-google-play-store.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Insights from designing one graph a hundred times","description":"https://medium.com/@william.bengtsson/learnings-from-designing-graphs-9033e9034ca0","link":"https://www.designernews.co/stories/101920-insights-from-designing-one-graph-a-hundred-times","comments":"https://www.designernews.co/stories/101920-insights-from-designing-one-graph-a-hundred-times","updated_at":"2019-04-16T11:14:55+00:00","link_to_comments":"https://www.designernews.co/stories/101920-insights-from-designing-one-graph-a-hundred-times","link_host":"medium.com","from":"designernews"},{"title":"Ways to add perspective in design","description":"https://uxdesign.cc/ways-to-add-perspective-in-design-8cae9852c36a","link":"https://www.designernews.co/stories/101916-ways-to-add-perspective-in-design","comments":"https://www.designernews.co/stories/101916-ways-to-add-perspective-in-design","updated_at":"2019-04-16T10:03:11+00:00","link_to_comments":"https://www.designernews.co/stories/101916-ways-to-add-perspective-in-design","link_host":"uxdesign.cc","from":"designernews"},{"title":"Scranos: New Rapidly Evolving Rootkit-Enabled Spyware Discovered","description":"A new powerful rootkit-enabled spyware operation has been discovered wherein hackers are distributing multifunctional malware disguised as cracked software or trojanized app posing as legitimate software like video players, drivers and even anti-virus products.\n\nWhile the rootkit malware—dubbed Scranos—which was first discovered late last year, still appears to be a work in progress, it is<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Hcpo58lIOf8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Hcpo58lIOf8/scranos-rootkit-spyware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Hcpo58lIOf8/scranos-rootkit-spyware.html","updated_at":"2019-04-16T08:45:56+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Hcpo58lIOf8/scranos-rootkit-spyware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Apache Tomcat Patches Important Remote Code Execution Flaw","description":"The Apache Software Foundation (ASF) has released new versions of its Tomcat application server to address an important security vulnerability that could allow a remote attacker to execute malicious code and take control of an affected server.\n\nDeveloped by ASF, Apache Tomcat is an open source web server and servlet system, which uses several Java EE specifications such as Java Servlet,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Nk_FJlNrCzU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Nk_FJlNrCzU/apache-tomcat-security-flaw.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Nk_FJlNrCzU/apache-tomcat-security-flaw.html","updated_at":"2019-04-16T05:58:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Nk_FJlNrCzU/apache-tomcat-security-flaw.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Creating a masonry layout with CSS only","description":"http://tobiasahlin.com/blog/masonry-with-css/","link":"https://www.designernews.co/stories/101908-creating-a-masonry-layout-with-css-only","comments":"https://www.designernews.co/stories/101908-creating-a-masonry-layout-with-css-only","updated_at":"2019-04-15T17:53:52+00:00","link_to_comments":"https://www.designernews.co/stories/101908-creating-a-masonry-layout-with-css-only","link_host":"tobiasahlin.com","from":"designernews"},{"title":"DesignSystems.com 2.0","description":"https://www.designsystems.com/","link":"https://www.designernews.co/stories/101907-designsystemscom-20","comments":"https://www.designernews.co/stories/101907-designsystemscom-20","updated_at":"2019-04-15T17:01:14+00:00","link_to_comments":"https://www.designernews.co/stories/101907-designsystemscom-20","link_host":"www.designsystems.com","from":"designernews"},{"title":"Sponsor: Transform the healthcare experience through design with Parsons at Open Campus.","description":"https://synd.co/2Fmv0WT","link":"https://www.designernews.co/stories/101905-sponsor-transform-the-healthcare-experience-through-design-with-parsons-at-open-campus","comments":"https://www.designernews.co/stories/101905-sponsor-transform-the-healthcare-experience-through-design-with-parsons-at-open-campus","updated_at":"2019-04-15T16:26:50+00:00","link_to_comments":"https://www.designernews.co/stories/101905-sponsor-transform-the-healthcare-experience-through-design-with-parsons-at-open-campus","link_host":"synd.co","from":"designernews"},{"title":"Hackers could read non-corporate Outlook.com, Hotmail for six months","description":"Hackers and Microsoft seem to disagree on key details of the hack.","link":"https://arstechnica.com/?p=1491071","comments":"https://arstechnica.com/?p=1491071","updated_at":"2019-04-15T15:14:19+00:00","link_to_comments":"https://arstechnica.com/?p=1491071","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google Helps Police Identify Devices Close to Crime Scenes Using Location Data","description":"It's no secret that Google tracks you everywhere, even when you keep Google's Location History feature disabled.\n\nAs revealed by an Associated Press investigation in 2018, other Google apps like Maps or daily weather update service on Android allows the tech giant to continuously collect your precise latitude and longitude.\n\nAccording to Google, the company uses this location-tracking<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Mf_aFF5fhuo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Mf_aFF5fhuo/google-location-tracking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Mf_aFF5fhuo/google-location-tracking.html","updated_at":"2019-04-15T12:06:39+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Mf_aFF5fhuo/google-location-tracking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Icons: avoid temptation and start with user needs (NHS digital)","description":"https://digital.nhs.uk/blog/transformation-blog/2019/icons-avoid-temptation-and-start-with-user-needs","link":"https://www.designernews.co/stories/101901-icons-avoid-temptation-and-start-with-user-needs-nhs-digital","comments":"https://www.designernews.co/stories/101901-icons-avoid-temptation-and-start-with-user-needs-nhs-digital","updated_at":"2019-04-15T11:31:33+00:00","link_to_comments":"https://www.designernews.co/stories/101901-icons-avoid-temptation-and-start-with-user-needs-nhs-digital","link_host":"digital.nhs.uk","from":"designernews"},{"title":"Interaction Design Inspiration – Apr 2019","description":"https://blog.productdisrupt.com/best-of-interaction-design-apr-2019-5e142298b35f?source=friends_link&sk=004555021e50e41b5f44093dc46a9146","link":"https://www.designernews.co/stories/101899-interaction-design-inspiration--apr-2019","comments":"https://www.designernews.co/stories/101899-interaction-design-inspiration--apr-2019","updated_at":"2019-04-15T10:59:02+00:00","link_to_comments":"https://www.designernews.co/stories/101899-interaction-design-inspiration--apr-2019","link_host":"blog.productdisrupt.com","from":"designernews"},{"title":"Sophisticated 'TajMahal APT Framework' Remained Undetected for 5 Years","description":"Cybersecurity researchers yesterday unveiled the existence of a highly sophisticated spyware framework that has been in operation for at least last 5 years—but remained undetected until recently.\n\nDubbed TajMahal by researchers at Kaspersky Lab, the APT framework is a high-tech modular-based malware toolkit that not only supports a vast number of malicious plugins for distinct espionage<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/t4K6SqP9PfU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/t4K6SqP9PfU/apt-malware-framework.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/t4K6SqP9PfU/apt-malware-framework.html","updated_at":"2019-04-15T06:15:24+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/t4K6SqP9PfU/apt-malware-framework.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Security Flaws in WPA3 Protocol Let Attackers Hack WiFi Password","description":"🔥 Breaking — It has been close to just one year since the launch of next-generation Wi-Fi security standard WPA3 and researchers have unveiled several serious vulnerabilities in the wireless security protocol that could allow attackers to recover the password of the Wi-Fi network.\n\nWPA, or Wi-Fi Protected Access, is a standard designed to authenticate wireless devices using the Advanced<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/GXjR0g2O0MM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/GXjR0g2O0MM/wpa3-hack-wifi-password.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GXjR0g2O0MM/wpa3-hack-wifi-password.html","updated_at":"2019-04-15T06:02:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GXjR0g2O0MM/wpa3-hack-wifi-password.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Compromise Microsoft Support Agent to Access Outlook Email Accounts","description":"If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by an unknown hacker or group of hackers, Microsoft confirmed The Hacker News.\n\nEarlier this year, hackers managed to breach Microsoft's customer support portal and access information related to some email accounts registered with the company's Outlook service.<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/sSnS82RCyn4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/sSnS82RCyn4/microsoft-outlook-email-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sSnS82RCyn4/microsoft-outlook-email-hack.html","updated_at":"2019-04-13T19:19:26+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sSnS82RCyn4/microsoft-outlook-email-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Encrypted Messaging Project \"Matrix\" Suffers Extensive Cyber Attack","description":"Matrix—the organization behind an open source project that offers a protocol for secure and decentralized real-time communication—has suffered a massive cyber attack after unknown attackers gained access to the servers hosting its official website and data.\n\nHackers defaced Matrix's website, and also stole unencrypted private messages, password hashes, access tokens, as well as GPG keys the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/k_goDyx7pJs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/k_goDyx7pJs/encrypted-messenger-cyberattack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/k_goDyx7pJs/encrypted-messenger-cyberattack.html","updated_at":"2019-04-13T09:55:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/k_goDyx7pJs/encrypted-messenger-cyberattack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Please critique: Framer UI Motion - Toggle","description":"http://learnreact.design/framer-ui-motion-toggle","link":"https://www.designernews.co/stories/101886-please-critique-framer-ui-motion--toggle","comments":"https://www.designernews.co/stories/101886-please-critique-framer-ui-motion--toggle","updated_at":"2019-04-12T18:05:00+00:00","link_to_comments":"https://www.designernews.co/stories/101886-please-critique-framer-ui-motion--toggle","link_host":"learnreact.design","from":"designernews"},{"title":"Russia Fines Facebook $47 Over Citizens' Data Privacy Dispute","description":"Yes, you read that right!\n\nRussia has fined Facebook with 3,000 rubles, roughly $47, for not complying with the country's controversial Data Localization law.\n\nIt's bizarre and unbelievable, but true.\n&lt;!-- adsense --&gt;\nIn December last year, Russian Internet watchdog Roskomnadzor sent notifications to Twitter and Facebook asking them to provide information about the location of servers that<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/o-9TaFVtTQM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/o-9TaFVtTQM/russia-data-localization.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/o-9TaFVtTQM/russia-data-localization.html","updated_at":"2019-04-12T17:54:27+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/o-9TaFVtTQM/russia-data-localization.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"AEUX not working in Sketch 54","description":"Just a public service announcement if you depend on AEUX for getting your work from Sketch into After Effects, don't update to Sketch 54 yet.\n\nI emailed the team, and reverted back to Sketch 53.2 and all is well in the world again. Just wanted to give a headsup. I don't know what I'd do without this essential plugin.","link":"https://www.designernews.co/stories/101873-aeux-not-working-in-sketch-54","comments":"https://www.designernews.co/stories/101873-aeux-not-working-in-sketch-54","updated_at":"2019-04-11T17:00:14+00:00","link_to_comments":"https://www.designernews.co/stories/101873-aeux-not-working-in-sketch-54","link_host":null,"from":"designernews"},{"title":"Making Photospheres for AR the Easy Way","description":"https://www.torch.app/blog/use-blender-to-make-photospheres-for-ar","link":"https://www.designernews.co/stories/101871-making-photospheres-for-ar-the-easy-way","comments":"https://www.designernews.co/stories/101871-making-photospheres-for-ar-the-easy-way","updated_at":"2019-04-11T16:22:50+00:00","link_to_comments":"https://www.designernews.co/stories/101871-making-photospheres-for-ar-the-easy-way","link_host":"www.torch.app","from":"designernews"},{"title":"Popular Video Editing Software Website Hacked to Spread Banking Trojan","description":"If you have downloaded the VSDC multimedia editing software between late February to late March this year, there are high chances that your computer has been infected with a banking trojan and an information stealer.\n\nThe official website of the VSDC software — one of the most popular, free video editing and converting app with over 1.3 million monthly visitors — was hacked, unfortunately once<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Oa6QxALEDA8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Oa6QxALEDA8/free-video-editing-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Oa6QxALEDA8/free-video-editing-malware.html","updated_at":"2019-04-11T15:50:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Oa6QxALEDA8/free-video-editing-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Practice presenting your design work, receive *real* feedback","description":"Hey DN,\n\nI believe that most of you will agree with me that presenting our work is an essential skill for any designer — freelancer/full time employee/job seeker.\n\nAfter chatting with many readers of my book I realised that there is no resources for practicing presenting design work, receiving and providing *real* feedback *(that is beyond "Great colors bro" ©)*\n\nTo change that I'm **matching between designers so they can connect for 1:1 video-calls, present their work and provide/receive feedback** to like-minded colleagues.\n\nI already organised (and guided myself) 5 calls like that. Since they were valuable for participants, I'm looking to expand this pilot and match between more designers in order to learn how such resource could be scaled :)\n\nIf you'd like to participate — please reach out over email hvoostik@gmail.com or DM on [Twitter](https://twitter.com/hvost) or leave your details in the comment and I'll send you more details!\n\nThanks!","link":"https://www.designernews.co/stories/101868-practice-presenting-your-design-work-receive-real-feedback","comments":"https://www.designernews.co/stories/101868-practice-presenting-your-design-work-receive-real-feedback","updated_at":"2019-04-11T15:39:51+00:00","link_to_comments":"https://www.designernews.co/stories/101868-practice-presenting-your-design-work-receive-real-feedback","link_host":null,"from":"designernews"},{"title":"Looking after a calendar to print","description":"Gooood Moooorning DesignerNews Community!\n\nI'm looking after a good looking minimalistic calendar to print every week in order to write down my day-to-day priorities, "do not forget", to-do's, etc. Any idea?","link":"https://www.designernews.co/stories/101867-looking-after-a-calendar-to-print","comments":"https://www.designernews.co/stories/101867-looking-after-a-calendar-to-print","updated_at":"2019-04-11T15:35:02+00:00","link_to_comments":"https://www.designernews.co/stories/101867-looking-after-a-calendar-to-print","link_host":null,"from":"designernews"},{"title":"What technical skills do designers need in 2019?","description":"https://cvcompiler.com/blog/do-designers-dream-of-electric-sheep-the-most-demanded-design-tech-skills/","link":"https://www.designernews.co/stories/101865-what-technical-skills-do-designers-need-in-2019","comments":"https://www.designernews.co/stories/101865-what-technical-skills-do-designers-need-in-2019","updated_at":"2019-04-11T15:07:06+00:00","link_to_comments":"https://www.designernews.co/stories/101865-what-technical-skills-do-designers-need-in-2019","link_host":"cvcompiler.com","from":"designernews"},{"title":"WikiLeaks Founder Julian Assange Arrested After Ecuador Withdraws Asylum","description":"WikiLeaks founder Julian Assange has been arrested at the Ecuadorian Embassy in London—that's almost seven years after he took refuge in the embassy to avoid extradition to Sweden over a sexual assault case.\n\nAccording to a short note released by London's Metropolitan Police Service, Assange was arrested immediately after the Ecuadorian government today withdraws his political asylum.\n\nAssange<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/axZzEb6W_Ys" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/axZzEb6W_Ys/wikileaks-julian-assange-arrested.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/axZzEb6W_Ys/wikileaks-julian-assange-arrested.html","updated_at":"2019-04-11T14:03:36+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/axZzEb6W_Ys/wikileaks-julian-assange-arrested.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How to create a custom radio switch in CSS","description":"https://codyhouse.co/blog/post/how-to-accessible-radio-switch-in-css","link":"https://www.designernews.co/stories/101863-how-to-create-a-custom-radio-switch-in-css","comments":"https://www.designernews.co/stories/101863-how-to-create-a-custom-radio-switch-in-css","updated_at":"2019-04-11T13:27:30+00:00","link_to_comments":"https://www.designernews.co/stories/101863-how-to-create-a-custom-radio-switch-in-css","link_host":"codyhouse.co","from":"designernews"},{"title":"Collection of 500+ design tools - from wireframing and prototyping to animation, accessibility, AR, design systems and sound design.","description":"https://flawlessapp.io/designtools","link":"https://www.designernews.co/stories/101862-collection-of-500-design-tools--from-wireframing-and-prototyping-to-animation-accessibility-ar-design-systems-and-sound-design","comments":"https://www.designernews.co/stories/101862-collection-of-500-design-tools--from-wireframing-and-prototyping-to-animation-accessibility-ar-design-systems-and-sound-design","updated_at":"2019-04-11T12:49:30+00:00","link_to_comments":"https://www.designernews.co/stories/101862-collection-of-500-design-tools--from-wireframing-and-prototyping-to-animation-accessibility-ar-design-systems-and-sound-design","link_host":"flawlessapp.io","from":"designernews"},{"title":"Adobe Releases Security Patches for Flash, Acrobat Reader, Other Products","description":"Good morning readers, it's Patch Tuesday again—the day of the month when Adobe and Microsoft release security patches for their software.\n\nAdobe just released its monthly security updates to address a total of 40 security vulnerabilities in several of its products, including Flash Player, Adobe Acrobat and Reader, and Shockwave Player.\n\nAccording to an advisory, Adobe Acrobat and Reader<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/TyLp5DlySZ4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/TyLp5DlySZ4/adobe-security-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TyLp5DlySZ4/adobe-security-updates.html","updated_at":"2019-04-09T18:15:14+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TyLp5DlySZ4/adobe-security-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Releases April 2019 Security Updates — Two Flaws Under Active Attack","description":"Microsoft today released its April 2019 software updates to address a total of 74 CVE-listed vulnerabilities in its Windows operating systems and other products, 13 of which are rated critical and rest are rated Important in severity.\n\nApril 2019 security updates address flaws in Windows OS, Internet Explorer, Edge, MS Office, and MS Office Services and Web Apps, ChakraCore, Exchange Server, .<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/voeaS3FmfFQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/voeaS3FmfFQ/microsoft-patch-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/voeaS3FmfFQ/microsoft-patch-updates.html","updated_at":"2019-04-09T18:01:26+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/voeaS3FmfFQ/microsoft-patch-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Researcher Reveals Multiple Flaws in Verizon Fios Routers — PoC Released","description":"A cybersecurity researcher at Tenable has discovered multiple security vulnerabilities in Verizon Fios Quantum Gateway Wi-Fi routers that could allow remote attackers to take complete control over the affected routers, exposing every other device connected to it.\n\nCurrently used by millions of consumers in the United States, Verizon Fios Quantum Gateway Wi-Fi routers have been found vulnerable<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/6GQSEITAzp8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/6GQSEITAzp8/verizon-wifi-router-security.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/6GQSEITAzp8/verizon-wifi-router-security.html","updated_at":"2019-04-09T13:17:54+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/6GQSEITAzp8/verizon-wifi-router-security.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Unpatched Flaw in Xiaomi's Built-in Browser App Lets Hackers Spoof URLs","description":"EXCLUSIVE — Beware, if you are using a Xiaomi's Mi or Redmi smartphone, you should immediately update its built-in MI browser or the Mint browser available on Google Play Store for non-Xiaomi Android devices.\n\nThat's because both web browser apps created by Xiaomi are vulnerable to a critical vulnerability which has not yet been patched even after being privately reported to the company, a<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/nKUWe0PTv88" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/nKUWe0PTv88/xiaomi-browser-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/nKUWe0PTv88/xiaomi-browser-vulnerability.html","updated_at":"2019-04-09T09:50:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/nKUWe0PTv88/xiaomi-browser-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"'Exodus' Surveillance Malware Found Targeting Apple iOS Users","description":"Cybersecurity researchers have discovered an iOS version of the powerful mobile phone surveillance app that was initially targeting Android devices through apps on the official Google Play Store.\n\nDubbed Exodus, as the malware is called, the iOS version of the spyware was discovered by security researchers at LookOut during their analysis of its Android samples they had found last year.<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/UZ4bEIjCgHg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/UZ4bEIjCgHg/exodus-ios-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/UZ4bEIjCgHg/exodus-ios-malware.html","updated_at":"2019-04-09T07:19:48+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/UZ4bEIjCgHg/exodus-ios-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Releases First Preview Builds of Chromium-based Edge Browser","description":"Microsoft today finally released the first new reborn version of its Edge browser that the company rebuilds from scratch using Chromium engine, the same open-source web rendering engine that powers Google's Chrome browser.\n\nHowever, the Chromium-based Edge browser builds haven't yet entered the stable or even the beta release; instead, Microsoft has released two testing-purpose preview builds<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/SROx--hYj0Q" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/SROx--hYj0Q/chromium-edge-browser.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SROx--hYj0Q/chromium-edge-browser.html","updated_at":"2019-04-08T18:39:34+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SROx--hYj0Q/chromium-edge-browser.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Could Turn Pre-Installed Antivirus App on Xiaomi Phones Into Malware","description":"What could be worse than this, if the software that's meant to protect your devices leave backdoors open for hackers or turn into malware?\n\nResearchers today revealed that a security app that comes pre-installed on more than 150 million devices manufactured by Xiaomi, China's biggest and world's 4th largest smartphone company, was suffering from multiple issues that could have allowed remote<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/fTKNVNbpDV8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/fTKNVNbpDV8/xiaomi-antivirus-app.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fTKNVNbpDV8/xiaomi-antivirus-app.html","updated_at":"2019-04-04T19:07:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fTKNVNbpDV8/xiaomi-antivirus-app.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool","description":"Update (4/4/2019) — Great news.\n\nNSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available on its Github repository.\n\nGHIDRA is agency's home-grown classified software reverse engineering tool that agency experts have been using internally for over a decade to hunt down security bugs in software and applications.\n\nGHIDRA is a Java-based reverse<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/IRmgYVqr5gI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/IRmgYVqr5gI/ghidra-reverse-engineering-tool.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/IRmgYVqr5gI/ghidra-reverse-engineering-tool.html","updated_at":"2019-04-04T13:27:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/IRmgYVqr5gI/ghidra-reverse-engineering-tool.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"540 Million Facebook User Records Found On Unprotected Amazon Servers","description":"It's been a bad week for Facebook users.\n\nFirst, the social media company was caught asking some of its new users to share passwords for their registered email accounts and now…\n\n...the bad week gets worse with a new privacy breach.\n\nMore than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers.\n&lt;!-- adsense --&gt;\nThe exposed datasets<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_GY6GC5vRE0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_GY6GC5vRE0/facebook-app-database.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_GY6GC5vRE0/facebook-app-database.html","updated_at":"2019-04-03T19:41:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_GY6GC5vRE0/facebook-app-database.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"To catch a drug thief, hospital secretly recorded births, women’s surgeries","description":"81 women claim their privacy was violated as hospital tried to trap a drug thief.","link":"https://arstechnica.com/?p=1485547","comments":"https://arstechnica.com/?p=1485547","updated_at":"2019-04-03T15:41:05+00:00","link_to_comments":"https://arstechnica.com/?p=1485547","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Woman from China, with malware in tow, illegally entered Trump’s Mar-a-Lago","description":"Event raises serious questions about security practices of the US Secret Service.","link":"https://arstechnica.com/?p=1485277","comments":"https://arstechnica.com/?p=1485277","updated_at":"2019-04-03T00:30:06+00:00","link_to_comments":"https://arstechnica.com/?p=1485277","link_host":"arstechnica.com","from":"arssecurity"},{"title":"How Microsoft found a Huawei driver that opened systems to attack","description":"Monitoring systems were looking for attacks using technique popularized by the NSA.","link":"https://arstechnica.com/?p=1481405","comments":"https://arstechnica.com/?p=1481405","updated_at":"2019-03-26T19:03:08+00:00","link_to_comments":"https://arstechnica.com/?p=1481405","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft ships antivirus for macOS as Windows Defender becomes Microsoft Defender","description":"Microsoft is expanding the reach of its device management services.","link":"https://arstechnica.com/?p=1477565","comments":"https://arstechnica.com/?p=1477565","updated_at":"2019-03-21T15:57:59+00:00","link_to_comments":"https://arstechnica.com/?p=1477565","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google, Microsoft work together for a year to figure out new type of Windows flaw","description":"Researcher finds building blocks for privilege escalation: Can they be assembled to create a flaw?","link":"https://arstechnica.com/?p=1475361","comments":"https://arstechnica.com/?p=1475361","updated_at":"2019-03-18T18:36:59+00:00","link_to_comments":"https://arstechnica.com/?p=1475361","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Epic says its Game Store is not spying on you","description":"But Sweeney says it will stop accessing Steam friends lists without permission.","link":"https://arstechnica.com/?p=1474647","comments":"https://arstechnica.com/?p=1474647","updated_at":"2019-03-15T16:43:12+00:00","link_to_comments":"https://arstechnica.com/?p=1474647","link_host":"arstechnica.com","from":"arssecurity"},{"title":"An email marketing company left 809 million records exposed online","description":"150GB database included mortgage amounts, info on credit ratings.","link":"https://arstechnica.com/?p=1471293","comments":"https://arstechnica.com/?p=1471293","updated_at":"2019-03-09T18:36:53+00:00","link_to_comments":"https://arstechnica.com/?p=1471293","link_host":"arstechnica.com","from":"arssecurity"},{"title":"The rise of tech-worker activism","description":"Video: Leigh Honeywell created Never Again pledge and a company devoted to tech-worker safety.","link":"https://arstechnica.com/?p=1464789","comments":"https://arstechnica.com/?p=1464789","updated_at":"2019-03-01T14:00:19+00:00","link_to_comments":"https://arstechnica.com/?p=1464789","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft’s latest security service uses human intelligence, not artificial","description":"Computers are good at processing vast amounts of data, but humans still have their uses.","link":"https://arstechnica.com/?p=1466151","comments":"https://arstechnica.com/?p=1466151","updated_at":"2019-02-28T17:21:26+00:00","link_to_comments":"https://arstechnica.com/?p=1466151","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google: Software is never going to be able to fix Spectre-type bugs","description":"Researchers also devise a Spectre-like attack with no known mitigation.","link":"https://arstechnica.com/?p=1462619","comments":"https://arstechnica.com/?p=1462619","updated_at":"2019-02-23T17:30:15+00:00","link_to_comments":"https://arstechnica.com/?p=1462619","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Mandatory update coming to Windows 7, 2008 to kill off weak update hashes","description":"Microsoft is phasing out SHA-1 hashes on its patches.","link":"https://arstechnica.com/?p=1459215","comments":"https://arstechnica.com/?p=1459215","updated_at":"2019-02-19T17:10:23+00:00","link_to_comments":"https://arstechnica.com/?p=1459215","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Researchers use Intel SGX to put malware beyond the reach of antivirus software","description":"Processor protects malware from attempts to inspect and analyze it.","link":"https://arstechnica.com/?p=1454551","comments":"https://arstechnica.com/?p=1454551","updated_at":"2019-02-12T20:54:37+00:00","link_to_comments":"https://arstechnica.com/?p=1454551","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 7 Extended Security Updates will double in price each year","description":"Three years of updates will be available.","link":"https://arstechnica.com/?p=1452401","comments":"https://arstechnica.com/?p=1452401","updated_at":"2019-02-06T21:31:13+00:00","link_to_comments":"https://arstechnica.com/?p=1452401","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 October 2018 Update is at last being pushed automatically","description":"The update is still rolling out at a snail's pace.","link":"https://arstechnica.com/?p=1442743","comments":"https://arstechnica.com/?p=1442743","updated_at":"2019-01-17T18:38:57+00:00","link_to_comments":"https://arstechnica.com/?p=1442743","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 7 enters its final year of free support","description":"Up to three years of paid support will be available after the cut-off.","link":"https://arstechnica.com/?p=1440851","comments":"https://arstechnica.com/?p=1440851","updated_at":"2019-01-14T18:50:01+00:00","link_to_comments":"https://arstechnica.com/?p=1440851","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New Windows 10 build silences Cortana, brings passwordless accounts","description":"Though as ever, Home users are special.","link":"https://arstechnica.com/?p=1436113","comments":"https://arstechnica.com/?p=1436113","updated_at":"2019-01-04T21:43:40+00:00","link_to_comments":"https://arstechnica.com/?p=1436113","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Bay Area: Join us 1/9 to talk about personal data security in 2019","description":"Researcher Ashkan Soltani will discuss what happens when companies sell your data.","link":"https://arstechnica.com/?p=1435603","comments":"https://arstechnica.com/?p=1435603","updated_at":"2019-01-03T18:08:26+00:00","link_to_comments":"https://arstechnica.com/?p=1435603","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Cryptography failure leads to easy hacking for PlayStation Classic","description":"Plug-and-play hardware lacks even basic functional security for crucial bootrom.","link":"https://arstechnica.com/?p=1425895","comments":"https://arstechnica.com/?p=1425895","updated_at":"2018-12-10T17:03:44+00:00","link_to_comments":"https://arstechnica.com/?p=1425895","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Marriott breach leaves 500 million exposed with passport, card numbers stolen","description":"Motivations of hackers are unclear, but proprietary Wi-Fi may have been a target.","link":"https://arstechnica.com/?p=1420655","comments":"https://arstechnica.com/?p=1420655","updated_at":"2018-11-30T18:32:08+00:00","link_to_comments":"https://arstechnica.com/?p=1420655","link_host":"arstechnica.com","from":"arssecurity"}]