[{"title":"I’m a Heart Doctor. Here’s Why I’m Wary of the New Apple Watch","description":"<a href="https://news.ycombinator.com/item?id=18047537">Comments</a>","link":"https://medium.com/s/story/im-a-heart-doctor-heres-why-im-wary-of-the-new-apple-watch-2b1999f2d942?mbid=social_fb","comments":"https://news.ycombinator.com/item?id=18047537","updated_at":"2018-09-22T19:18:28+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18047537","link_host":"medium.com","from":"hackernews"},{"title":"3D engine entirely made of MS Excel formulae","description":"<a href="https://news.ycombinator.com/item?id=18047059">Comments</a>","link":"https://www.gamasutra.com/blogs/CBel/20180213/308549/3D_engine_entirely_made_of_MS_Excel_formulae__Enjoy_this_Doomxls_file_.php","comments":"https://news.ycombinator.com/item?id=18047059","updated_at":"2018-09-22T17:54:58+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18047059","link_host":"www.gamasutra.com","from":"hackernews"},{"title":"Smarking (YC W15) Is Hiring Back End Engineers in SF","description":"<a href="https://news.ycombinator.com/item?id=18046771">Comments</a>","link":"https://www.smarking.com/careers","comments":"https://news.ycombinator.com/item?id=18046771","updated_at":"2018-09-22T16:59:59+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046771","link_host":"www.smarking.com","from":"hackernews"},{"title":"The Little Typer","description":"<a href="https://news.ycombinator.com/item?id=18046745">Comments</a>","link":"https://mitpress.mit.edu/books/little-typer","comments":"https://news.ycombinator.com/item?id=18046745","updated_at":"2018-09-22T16:52:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046745","link_host":"mitpress.mit.edu","from":"hackernews"},{"title":"What are some things that only someone who has been programming 20 years knows?","description":"<a href="https://news.ycombinator.com/item?id=18046722">Comments</a>","link":"https://www.quora.com/What-are-some-things-that-only-someone-who-has-been-programming-20-50-years-would-know/answer/John-Byrd-2?share=1","comments":"https://news.ycombinator.com/item?id=18046722","updated_at":"2018-09-22T16:48:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046722","link_host":"www.quora.com","from":"hackernews"},{"title":"Mathematical Patterns That Eventually Fail","description":"<a href="https://news.ycombinator.com/item?id=18046696">Comments</a>","link":"https://johncarlosbaez.wordpress.com/2018/09/20/patterns-that-eventually-fail/","comments":"https://news.ycombinator.com/item?id=18046696","updated_at":"2018-09-22T16:43:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046696","link_host":"johncarlosbaez.wordpress.com","from":"hackernews"},{"title":"The hierarchy of countries winning Nobels in the sciences is shifting","description":"<a href="https://news.ycombinator.com/item?id=18046605">Comments</a>","link":"https://www.economist.com/graphic-detail/2018/05/10/the-hierarchy-of-countries-winning-nobels-in-the-sciences-is-shifting","comments":"https://news.ycombinator.com/item?id=18046605","updated_at":"2018-09-22T16:25:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046605","link_host":"www.economist.com","from":"hackernews"},{"title":"The sunk cost fallacy","description":"<a href="https://news.ycombinator.com/item?id=18046573">Comments</a>","link":"http://www.bbc.com/capital/story/20180914-the-trick-to-learning-when-to-cut-your-losses","comments":"https://news.ycombinator.com/item?id=18046573","updated_at":"2018-09-22T16:19:20+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046573","link_host":"www.bbc.com","from":"hackernews"},{"title":"Workplace Wellness Plans Offer Big Incentives, but May Cost Your Privacy","description":"<a href="https://news.ycombinator.com/item?id=18046431">Comments</a>","link":"https://www.npr.org/sections/health-shots/2018/09/22/649664555/workplace-wellness-plans-offer-big-incentives-but-may-cost-your-privacy","comments":"https://news.ycombinator.com/item?id=18046431","updated_at":"2018-09-22T15:44:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046431","link_host":"www.npr.org","from":"hackernews"},{"title":"Ytdl-webserver: Webserver for downloading YouTube videos","description":"<a href="https://news.ycombinator.com/item?id=18046413">Comments</a>","link":"https://github.com/Algram/ytdl-webserver","comments":"https://news.ycombinator.com/item?id=18046413","updated_at":"2018-09-22T15:40:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046413","link_host":"github.com","from":"hackernews"},{"title":"The Mathematics of Quantum Mechanics [pdf]","description":"<a href="https://news.ycombinator.com/item?id=18046343">Comments</a>","link":"https://uwaterloo.ca/institute-for-quantum-computing/sites/ca.institute-for-quantum-computing/files/uploads/files/mathematics_qm_v21.pdf","comments":"https://news.ycombinator.com/item?id=18046343","updated_at":"2018-09-22T15:26:10+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046343","link_host":"uwaterloo.ca","from":"hackernews"},{"title":"Hayabusa2 Now","description":"<a href="https://news.ycombinator.com/item?id=18046274">Comments</a>","link":"http://haya2now.jp/en.html","comments":"https://news.ycombinator.com/item?id=18046274","updated_at":"2018-09-22T15:10:20+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046274","link_host":"haya2now.jp","from":"hackernews"},{"title":"Praying mantis seen hunting for fish in wild for first time","description":"<a href="https://news.ycombinator.com/item?id=18046253">Comments</a>","link":"https://www.independent.co.uk/news/science/praying-mantis-eats-fish-discovered-india-a8548981.html","comments":"https://news.ycombinator.com/item?id=18046253","updated_at":"2018-09-22T15:05:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046253","link_host":"www.independent.co.uk","from":"hackernews"},{"title":"MINERVA-II1: Successful image capture, landing on Ryugu and hop","description":"<a href="https://news.ycombinator.com/item?id=18046190">Comments</a>","link":"http://www.hayabusa2.jaxa.jp/en/topics/20180922e/","comments":"https://news.ycombinator.com/item?id=18046190","updated_at":"2018-09-22T14:51:59+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046190","link_host":"www.hayabusa2.jaxa.jp","from":"hackernews"},{"title":"Storage access policy: Block cookies from trackers","description":"<a href="https://news.ycombinator.com/item?id=18046164">Comments</a>","link":"https://developer.mozilla.org/en-US/docs/Mozilla/Firefox/Privacy/Storage_access_policy","comments":"https://news.ycombinator.com/item?id=18046164","updated_at":"2018-09-22T14:45:03+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046164","link_host":"developer.mozilla.org","from":"hackernews"},{"title":"Inside the eight desperate weeks that saved SpaceX from ruin","description":"<a href="https://news.ycombinator.com/item?id=18046049">Comments</a>","link":"https://arstechnica.com/science/2018/09/inside-the-eight-desperate-weeks-that-saved-spacex-from-ruin/","comments":"https://news.ycombinator.com/item?id=18046049","updated_at":"2018-09-22T14:18:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046049","link_host":"arstechnica.com","from":"hackernews"},{"title":"What Could You Build with $10k?","description":"<a href="https://news.ycombinator.com/item?id=18046013">Comments</a>","link":"https://hackernoon.com/what-could-you-build-with-just-10-000-67e91f65dd4b","comments":"https://news.ycombinator.com/item?id=18046013","updated_at":"2018-09-22T14:09:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18046013","link_host":"hackernoon.com","from":"hackernews"},{"title":"Vbuild: “Compile” Vue components to standalone HTML/JS/CSS","description":"<a href="https://news.ycombinator.com/item?id=18045813">Comments</a>","link":"https://github.com/manatlan/vbuild","comments":"https://news.ycombinator.com/item?id=18045813","updated_at":"2018-09-22T13:02:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18045813","link_host":"github.com","from":"hackernews"},{"title":"Operator of VirusTotal Like Malware-Scanning Service Jailed for 14 Years","description":"A Latvian hacker behind the development and operation of counter antivirus service "Scan4You" has finally been sentenced to 14 years in prison.\n\n37-year-old Ruslans Bondars, described as a Latvian "non-citizen" or "citizen of the former USSR who had been residing in Riga, Latvia," was found guilty on May 16 in federal court in Alexandria, during which a co-conspirator revealed he had worked<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=3VUXEcuSqV0:trixIxFypOc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/3VUXEcuSqV0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/3VUXEcuSqV0/scan4you-malware-scanner.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3VUXEcuSqV0/scan4you-malware-scanner.html","updated_at":"2018-09-22T12:05:59+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3VUXEcuSqV0/scan4you-malware-scanner.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"GraphQL editor – Visual node editor for GraphQL","description":"<a href="https://news.ycombinator.com/item?id=18045532">Comments</a>","link":"https://github.com/slothking-online/graphql-editor","comments":"https://news.ycombinator.com/item?id=18045532","updated_at":"2018-09-22T11:18:28+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18045532","link_host":"github.com","from":"hackernews"},{"title":"Create QR codes in Excel","description":"<a href="https://news.ycombinator.com/item?id=18045528">Comments</a>","link":"http://blog.ambor.com/2013/03/create-qr-codes-in-excel-or-any.html","comments":"https://news.ycombinator.com/item?id=18045528","updated_at":"2018-09-22T11:16:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18045528","link_host":"blog.ambor.com","from":"hackernews"},{"title":"Minih264 – Minimalistic, single-header library for encoding H264/SVC","description":"<a href="https://news.ycombinator.com/item?id=18045494">Comments</a>","link":"https://github.com/lieff/minih264","comments":"https://news.ycombinator.com/item?id=18045494","updated_at":"2018-09-22T11:04:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18045494","link_host":"github.com","from":"hackernews"},{"title":"Twitter API Flaw Exposed Users Messages to Wrong Developers For Over a Year","description":"The security and privacy issues with APIs and third-party app developers are something that's not just Facebook is dealing with.\n\nA bug in Twitter's API inadvertently exposed some users' direct messages (DMs) and protected tweets to unauthorized third-party app developers who weren't supposed to get them, Twitter disclosed in its Developer Blog on Friday.\n\n\nWhat Happened?\n\nTwitter found a bug<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Qw3yWF95uvs:ANDgGdn20Xk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Qw3yWF95uvs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Qw3yWF95uvs/twitter-direct-message-api.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Qw3yWF95uvs/twitter-direct-message-api.html","updated_at":"2018-09-22T10:46:48+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Qw3yWF95uvs/twitter-direct-message-api.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"For Hackers, Anonymity Was Once Critical. That’s Changing","description":"<a href="https://news.ycombinator.com/item?id=18045339">Comments</a>","link":"https://www.nytimes.com/2018/09/22/technology/defcon-hackers-privacy-anonymity.html","comments":"https://news.ycombinator.com/item?id=18045339","updated_at":"2018-09-22T10:05:07+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18045339","link_host":"www.nytimes.com","from":"hackernews"},{"title":"Basic security precautions for non-profits and journalists (2017)","description":"<a href="https://news.ycombinator.com/item?id=18045267">Comments</a>","link":"https://techsolidarity.org/resources/basic_security.htm","comments":"https://news.ycombinator.com/item?id=18045267","updated_at":"2018-09-22T09:35:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18045267","link_host":"techsolidarity.org","from":"hackernews"},{"title":"A Programming Language Underdog","description":"<a href="https://news.ycombinator.com/item?id=18045259">Comments</a>","link":"https://totallywearingpants.com/posts/nim-underdog/","comments":"https://news.ycombinator.com/item?id=18045259","updated_at":"2018-09-22T09:34:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18045259","link_host":"totallywearingpants.com","from":"hackernews"},{"title":"The Complexity of Songs (1977) [pdf]","description":"<a href="https://news.ycombinator.com/item?id=18044603">Comments</a>","link":"http://fivedots.coe.psu.ac.th/Software.coe/242-535_ADA/Background/Readings/knuth_song_complexity.pdf","comments":"https://news.ycombinator.com/item?id=18044603","updated_at":"2018-09-22T05:21:34+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18044603","link_host":"fivedots.coe.psu.ac.th","from":"hackernews"},{"title":"The Couple Who Helped Decode Dyslexia","description":"<a href="https://news.ycombinator.com/item?id=18044331">Comments</a>","link":"https://www.nytimes.com/2018/09/21/health/dyslexia-shaywitz-yale.html","comments":"https://news.ycombinator.com/item?id=18044331","updated_at":"2018-09-22T03:46:03+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18044331","link_host":"www.nytimes.com","from":"hackernews"},{"title":"OpenBSD netcat demystified","description":"<a href="https://news.ycombinator.com/item?id=18044192">Comments</a>","link":"https://nanxiao.gitbooks.io/openbsd-netcat-demystified/","comments":"https://news.ycombinator.com/item?id=18044192","updated_at":"2018-09-22T02:54:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18044192","link_host":"nanxiao.gitbooks.io","from":"hackernews"},{"title":"How to learn calligraphy efficiently.","description":"https://www.mojotech.com/blog/learn-calligraphy/","link":"https://www.designernews.co/stories/97424-how-to-learn-calligraphy-efficiently","comments":"https://www.designernews.co/stories/97424-how-to-learn-calligraphy-efficiently","updated_at":"2018-09-21T20:23:41+00:00","link_to_comments":"https://www.designernews.co/stories/97424-how-to-learn-calligraphy-efficiently","link_host":"www.mojotech.com","from":"designernews"},{"title":"Sponsor: With 2,500,000 visits every month, We Work Remotely is the world's #1 online community for finding qualified remote workers! Go remote! ","description":"https://weworkremotely.com/remote-jobs/new?utm_source=DN3","link":"https://www.designernews.co/stories/97423-sponsor-with-2500000-visits-every-month-we-work-remotely-is-the-worlds-1-online-community-for-finding-qualified-remote-workers-go-remote-","comments":"https://www.designernews.co/stories/97423-sponsor-with-2500000-visits-every-month-we-work-remotely-is-the-worlds-1-online-community-for-finding-qualified-remote-workers-go-remote-","updated_at":"2018-09-21T19:04:10+00:00","link_to_comments":"https://www.designernews.co/stories/97423-sponsor-with-2500000-visits-every-month-we-work-remotely-is-the-worlds-1-online-community-for-finding-qualified-remote-workers-go-remote-","link_host":"weworkremotely.com","from":"designernews"},{"title":"Researcher Discloses New Zero-Day Affecting All Versions of Windows","description":"A security researcher has publicly disclosed an unpatched zero-day vulnerability in all supported versions of Microsoft Windows operating system (including server editions) after the company failed to patch a responsibly disclosed bug within the 120-days deadline.\n\nDiscovered by Lucas Leong of the Trend Micro Security Research team, the zero-day vulnerability resides in Microsoft Jet Database<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=mzdt9d4S3as:vJa8kX6ZhqE:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/mzdt9d4S3as" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/mzdt9d4S3as/windows-zero-day-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mzdt9d4S3as/windows-zero-day-vulnerability.html","updated_at":"2018-09-21T17:36:27+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mzdt9d4S3as/windows-zero-day-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Guaranteed results of design internships and how to get them","description":"https://uxplanet.org/guaranteed-results-of-design-internships-and-how-to-get-them-26a1b217195b","link":"https://www.designernews.co/stories/97420-guaranteed-results-of-design-internships-and-how-to-get-them","comments":"https://www.designernews.co/stories/97420-guaranteed-results-of-design-internships-and-how-to-get-them","updated_at":"2018-09-21T16:37:35+00:00","link_to_comments":"https://www.designernews.co/stories/97420-guaranteed-results-of-design-internships-and-how-to-get-them","link_host":"uxplanet.org","from":"designernews"},{"title":"Framer X Tips","description":"Hey DN,\n\nI've put together a [page](https://learnreact.design/framerx-tips) with Framer X tips.\n\nRight now it's just a simple page stuffed with my tweets, but I'll improve it if people find it useful (adding search, categories etc.)\n\nContribution of tips welcome!\n\n\nThanks,\n\nLinton","link":"https://www.designernews.co/stories/97413-framer-x-tips","comments":"https://www.designernews.co/stories/97413-framer-x-tips","updated_at":"2018-09-21T14:03:59+00:00","link_to_comments":"https://www.designernews.co/stories/97413-framer-x-tips","link_host":"learnreact.design","from":"designernews"},{"title":"The game industry of Iran (2016)","description":"<a href="https://news.ycombinator.com/item?id=18039056">Comments</a>","link":"https://www.polygon.com/features/2016/1/14/10757460/the-game-industry-of-iran","comments":"https://news.ycombinator.com/item?id=18039056","updated_at":"2018-09-21T12:06:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18039056","link_host":"www.polygon.com","from":"hackernews"},{"title":"Oracles, or why smart contracts still haven’t changed the world","description":"<a href="https://news.ycombinator.com/item?id=18038966">Comments</a>","link":"https://blog.smartdec.net/oracles-or-why-smart-contracts-still-havent-changed-the-world-69464999e1d3","comments":"https://news.ycombinator.com/item?id=18038966","updated_at":"2018-09-21T11:47:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18038966","link_host":"blog.smartdec.net","from":"hackernews"},{"title":"Denys Loveiko Portfolio","description":"https://loveiko.com/","link":"https://www.designernews.co/stories/97406-denys-loveiko-portfolio","comments":"https://www.designernews.co/stories/97406-denys-loveiko-portfolio","updated_at":"2018-09-21T10:29:58+00:00","link_to_comments":"https://www.designernews.co/stories/97406-denys-loveiko-portfolio","link_host":"loveiko.com","from":"designernews"},{"title":"Flaw in 4GEE WiFi Modem Could Leave Your Computer Vulnerable","description":"A high-severity vulnerability has been discovered in 4G-based wireless 4GEE Mini modem sold by mobile operator EE that could allow an attacker to run a malicious program on a targeted computer with the highest level of privileges in the system.\n\nThe vulnerability—discovered by 20-year-old Osanda Malith, a Sri Lankan security researcher at ZeroDayLab—can be exploited by a low privileged user<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=G2rTdXCVny8:14iCaYFEXqA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/G2rTdXCVny8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/G2rTdXCVny8/4g-ee-wifi-modem-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/G2rTdXCVny8/4g-ee-wifi-modem-hack.html","updated_at":"2018-09-21T08:45:25+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/G2rTdXCVny8/4g-ee-wifi-modem-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Nvidia Vid2vid: High-resolution photorealistic video-to-video translation","description":"<a href="https://news.ycombinator.com/item?id=18038084">Comments</a>","link":"https://github.com/NVIDIA/vid2vid","comments":"https://news.ycombinator.com/item?id=18038084","updated_at":"2018-09-21T08:29:19+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18038084","link_host":"github.com","from":"hackernews"},{"title":"Huge update for Haiku","description":"https://haiku.ai","link":"https://www.designernews.co/stories/97399-huge-update-for-haiku","comments":"https://www.designernews.co/stories/97399-huge-update-for-haiku","updated_at":"2018-09-20T17:35:22+00:00","link_to_comments":"https://www.designernews.co/stories/97399-huge-update-for-haiku","link_host":"haiku.ai","from":"designernews"},{"title":"UK Regulator Fines Equifax £500,000 Over 2017 Data Breach","description":"Atlanta-based consumer credit reporting agency Equifax has been issued a £500,000 fine by the UK's privacy watchdog for its last year's massive data breach that exposed personal and financial data of hundreds of millions of its customers.\n\nYes, £500,000—that's the maximum fine allowed by the UK's Data Protection Act 1998, though the penalty is apparently a small figure for a $16 billion<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=PEV3Xb3I_wM:hbm93N8tSao:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/PEV3Xb3I_wM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/PEV3Xb3I_wM/equifax-credit-reporting-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PEV3Xb3I_wM/equifax-credit-reporting-breach.html","updated_at":"2018-09-20T13:54:52+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PEV3Xb3I_wM/equifax-credit-reporting-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Eagle - Organizing your digital assets","description":"https://en.eagle.cool/","link":"https://www.designernews.co/stories/97392-eagle--organizing-your-digital-assets","comments":"https://www.designernews.co/stories/97392-eagle--organizing-your-digital-assets","updated_at":"2018-09-20T10:52:23+00:00","link_to_comments":"https://www.designernews.co/stories/97392-eagle--organizing-your-digital-assets","link_host":"en.eagle.cool","from":"designernews"},{"title":"Design Tools: When do we get stateful components?","description":"This is one the most important things missing in most design tools. \n\nSometimes you just want to show some simple interactions on one page. In pretty much all leading tools, you then need to duplicate the artboards multiple times to show each state. Then connect these artboards in prototyping.\n\nChaos and redundancy ensues.\n\nIt would be so much easier to access different states of one component/symbol.\n\n![test](https://image.ibb.co/jy6V4z/Bildschirmfoto_2018_09_20_um_11_32_02.png)","link":"https://www.designernews.co/stories/97390-design-tools-when-do-we-get-stateful-components","comments":"https://www.designernews.co/stories/97390-design-tools-when-do-we-get-stateful-components","updated_at":"2018-09-20T09:45:12+00:00","link_to_comments":"https://www.designernews.co/stories/97390-design-tools-when-do-we-get-stateful-components","link_host":null,"from":"designernews"},{"title":"I Miss Dann Petty","description":"I miss Dann's weekly design breakdown/news videos, the dude seems super busy these days so i guess they're dead now. \nWhat do other people watch in the same guise?\n\nhttps://www.youtube.com/user/dannpetty","link":"https://www.designernews.co/stories/97388-i-miss-dann-petty","comments":"https://www.designernews.co/stories/97388-i-miss-dann-petty","updated_at":"2018-09-20T08:45:02+00:00","link_to_comments":"https://www.designernews.co/stories/97388-i-miss-dann-petty","link_host":null,"from":"designernews"},{"title":"Latinxs Who Design","description":"https://www.producthunt.com/posts/latinxs-who-design/","link":"https://www.designernews.co/stories/97384-latinxs-who-design","comments":"https://www.designernews.co/stories/97384-latinxs-who-design","updated_at":"2018-09-20T07:12:37+00:00","link_to_comments":"https://www.designernews.co/stories/97384-latinxs-who-design","link_host":"www.producthunt.com","from":"designernews"},{"title":"Content First, Design Second: Prototyping with Words and Adobe XD","description":"https://blog.prototypr.io/content-first-design-second-prototyping-with-words-and-adobe-xd-c4c07cac21ef?scid=294eab88-ed7d-4a10-b5a6-e6d912c9b214&mv=social&mv2=owned_social","link":"https://www.designernews.co/stories/97383-content-first-design-second-prototyping-with-words-and-adobe-xd","comments":"https://www.designernews.co/stories/97383-content-first-design-second-prototyping-with-words-and-adobe-xd","updated_at":"2018-09-20T07:00:18+00:00","link_to_comments":"https://www.designernews.co/stories/97383-content-first-design-second-prototyping-with-words-and-adobe-xd","link_host":"blog.prototypr.io","from":"designernews"},{"title":"Western Digital's My Cloud NAS Devices Turn Out to Be Easily Hacked","description":"Security researchers have discovered an authentication bypass vulnerability in Western Digital's My Cloud NAS devices that potentially allows an unauthenticated attacker to gain admin-level control to the affected devices.\n\nWestern Digital's My Cloud (WD My Cloud) is one of the most popular network-attached storage (NAS) devices which is being used by businesses and individuals to host their<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=P_x5p6jY0lU:uBZ1VTG8ksk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/P_x5p6jY0lU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/P_x5p6jY0lU/wd-my-cloud-nas-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/P_x5p6jY0lU/wd-my-cloud-nas-hacking.html","updated_at":"2018-09-19T20:28:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/P_x5p6jY0lU/wd-my-cloud-nas-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Steal Customers' Credit Cards From Newegg Electronics Retailer","description":"The notorious hacking group behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.\n\nMagecart hacking group managed to infiltrate the Newegg website and steal the credit card details of all customers who entered their payment card information between August 14 and September 18, 2018, according to a joint<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ITMDOowtcNA:OzDdibZ3QqU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ITMDOowtcNA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ITMDOowtcNA/newegg-credit-card-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ITMDOowtcNA/newegg-credit-card-hack.html","updated_at":"2018-09-19T19:45:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ITMDOowtcNA/newegg-credit-card-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"My new portfolio is a single page, a single case study.","description":"https://kow.fm/portfolio/","link":"https://www.designernews.co/stories/97378-my-new-portfolio-is-a-single-page-a-single-case-study","comments":"https://www.designernews.co/stories/97378-my-new-portfolio-is-a-single-page-a-single-case-study","updated_at":"2018-09-19T16:38:17+00:00","link_to_comments":"https://www.designernews.co/stories/97378-my-new-portfolio-is-a-single-page-a-single-case-study","link_host":"kow.fm","from":"designernews"},{"title":"New Malware Combines Ransomware, Coin Mining and Botnet Features in One","description":"Windows and Linux users need to beware, as an all-in-one, destructive malware strain has been discovered in the wild that features multiple malware capabilities including ransomware, cryptocurrency miner, botnet, and self-propagating worm targeting Linux and Windows systems.\n\nDubbed XBash, the new malware, believed to be tied to the Iron Group, a.k.a. Rocke—the Chinese speaking APT threat<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=iFLqVteKMZE:fI5m8dR0oEQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/iFLqVteKMZE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/iFLqVteKMZE/ransomware-coinmining-botnet.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/iFLqVteKMZE/ransomware-coinmining-botnet.html","updated_at":"2018-09-19T15:32:57+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/iFLqVteKMZE/ransomware-coinmining-botnet.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Vmware Clarity components for Figma","description":"![Vmware Clarity components for Figma](https://cdn-images-1.medium.com/max/720/1*O87VhFGPC9cSgpOqRNtmFA.png)\n\n\nHere is a beginning of my small story of re-creating real componetns of existing HTML/CSS framework as Figma components.\nI've started this story with a [components presentation](https://medium.com/@sergey_81667/clarity-design-system-for-figma-9778e11cf30f), where I'm writing about components architecture and complex components constructors.\n\n\nAnd I'm going to continue this topic with posting some thoughts and observations about using such components in real-world enterprise prototyping, about Figma, and about communication with developers.","link":"https://www.designernews.co/stories/97373-vmware-clarity-components-for-figma","comments":"https://www.designernews.co/stories/97373-vmware-clarity-components-for-figma","updated_at":"2018-09-19T15:01:56+00:00","link_to_comments":"https://www.designernews.co/stories/97373-vmware-clarity-components-for-figma","link_host":"cdnimages1.medium.com","from":"designernews"},{"title":"TakeShape, a Headless GraphQL CMS and SSG for Designers","description":"https://www.takeshape.io/","link":"https://www.designernews.co/stories/97372-takeshape-a-headless-graphql-cms-and-ssg-for-designers","comments":"https://www.designernews.co/stories/97372-takeshape-a-headless-graphql-cms-and-ssg-for-designers","updated_at":"2018-09-19T14:51:31+00:00","link_to_comments":"https://www.designernews.co/stories/97372-takeshape-a-headless-graphql-cms-and-ssg-for-designers","link_host":"www.takeshape.io","from":"designernews"},{"title":"Mirai Botnet Creators Helping FBI Fight Cybercrime to Stay Out of Jail","description":"Three young hackers who were sentenced late last year for creating and spreading the notorious Mirai botnet are now helping the FBI to investigate other "complex" cybercrime cases in return to avoid their lengthy prison terms.\n\nParas Jha, 21 from New Jersey, Josiah White, 20 from Washington, and Dalton Norman, 21 from Louisiana, plead guilty in December 2017 to multiple charges for their role<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=KYZ_WRIm8-0:fJl0cr544uk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/KYZ_WRIm8-0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/KYZ_WRIm8-0/mirai-botnet-fbi-cybercrime.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/KYZ_WRIm8-0/mirai-botnet-fbi-cybercrime.html","updated_at":"2018-09-19T14:07:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/KYZ_WRIm8-0/mirai-botnet-fbi-cybercrime.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"I took a computer scanner to a tropical garden, the results are amazing.","description":"At the weekend I visited the Barbican Conservatory in London. For those who have never been, the Barbican is an incredible arts centre in the heart of London, famous for its brutalist architecture style.\n\nThe Barbican Conservatory itself is home to exotic fish and over 2,000 species of tropical plants and trees. Instead to taking my camera with me, I thought it would be a nice idea to take a scanner with me instead.\n\nI experimented with different ways of capturing the subjects. I worked out that the scanner as a really small depth of field and was extremely sensitive to light. Eventually, I found the best results where when the scanner was face down on the plants with limited light. I think with some modifications to the scanner, I can achieve some really interesting compositions. Such as adding lenses, applying coloured film and making physical modifications. Check out the link, it is a collection of some of the best scans from the day.\n\nhttp://www.sabbakeynejad.co.uk/blog/scanner_ar","link":"https://www.designernews.co/stories/97366-i-took-a-computer-scanner-to-a-tropical-garden-the-results-are-amazing","comments":"https://www.designernews.co/stories/97366-i-took-a-computer-scanner-to-a-tropical-garden-the-results-are-amazing","updated_at":"2018-09-19T12:40:55+00:00","link_to_comments":"https://www.designernews.co/stories/97366-i-took-a-computer-scanner-to-a-tropical-garden-the-results-are-amazing","link_host":"www.sabbakeynejad.co.uk","from":"designernews"},{"title":"I miss ffffound","description":"That's it.","link":"https://www.designernews.co/stories/97350-i-miss-ffffound","comments":"https://www.designernews.co/stories/97350-i-miss-ffffound","updated_at":"2018-09-18T21:45:21+00:00","link_to_comments":"https://www.designernews.co/stories/97350-i-miss-ffffound","link_host":null,"from":"designernews"},{"title":"Sketch 52 quick review","description":"https://twitter.com/tmgrhm/status/1042081675726016512","link":"https://www.designernews.co/stories/97343-sketch-52-quick-review","comments":"https://www.designernews.co/stories/97343-sketch-52-quick-review","updated_at":"2018-09-18T17:35:45+00:00","link_to_comments":"https://www.designernews.co/stories/97343-sketch-52-quick-review","link_host":"twitter.com","from":"designernews"},{"title":"The Sketch Update We’ve All Been Waiting For: STYLE OVERRIDES","description":"https://medium.com/ux-power-tools/the-sketch-update-weve-all-been-waiting-for-plus-a-brand-new-ux-power-tools-72c405fd490d","link":"https://www.designernews.co/stories/97339-the-sketch-update-weve-all-been-waiting-for-style-overrides","comments":"https://www.designernews.co/stories/97339-the-sketch-update-weve-all-been-waiting-for-style-overrides","updated_at":"2018-09-18T16:47:10+00:00","link_to_comments":"https://www.designernews.co/stories/97339-the-sketch-update-weve-all-been-waiting-for-style-overrides","link_host":"medium.com","from":"designernews"},{"title":"Adobe XD September release is out","description":"Hi Everyone,\n\nAs follow up to the [XD August release](https://theblog.adobe.com/august-2018-release-of-adobe-xd-reorder-assets-asset-extraction-and-more/), we are pleased to give you the [latest update to XD](https://adobe.ly/2Nhz5Bk) with the following [requested features] (https://adobexd.uservoice.com/) from the community:\n\n- [Responsive Resize](https://youtu.be/zzIta6GIS90)\n- [Timed Transitions](https://youtu.be/Hsa_f-xdzHM)\n- [Spell Check](https://youtu.be/ZDsLJbg7mZ0)\n- [Web Prototype Full Screen Viewing ](https://youtu.be/mMoIIJ64cWY)\n\nTo get the details on what’s new, check out the release post [here](https://adobe.ly/2Nhz5Bk) . We’d love to hear what you think about this update! Please leave questions, comments, or suggestions below.\n\nThank you,\n\n Meenal from Adobe XD Team","link":"https://www.designernews.co/stories/97335-adobe-xd-september-release-is-out","comments":"https://www.designernews.co/stories/97335-adobe-xd-september-release-is-out","updated_at":"2018-09-18T16:02:04+00:00","link_to_comments":"https://www.designernews.co/stories/97335-adobe-xd-september-release-is-out","link_host":"theblog.adobe.com","from":"designernews"},{"title":"Sketch 52 Beta with new UI and Darkmode","description":"https://www.sketchapp.com/beta","link":"https://www.designernews.co/stories/97333-sketch-52-beta-with-new-ui-and-darkmode","comments":"https://www.designernews.co/stories/97333-sketch-52-beta-with-new-ui-and-darkmode","updated_at":"2018-09-18T15:38:11+00:00","link_to_comments":"https://www.designernews.co/stories/97333-sketch-52-beta-with-new-ui-and-darkmode","link_host":"www.sketchapp.com","from":"designernews"},{"title":"Just Launched: Framer X, the world’s most advanced tool for interactive design","description":"https://framer.com/?utm_source=designer_news&utm_medium=launch_post&utm_campaign=FR-owned-framer_x","link":"https://www.designernews.co/stories/97332-just-launched-framer-x-the-worlds-most-advanced-tool-for-interactive-design","comments":"https://www.designernews.co/stories/97332-just-launched-framer-x-the-worlds-most-advanced-tool-for-interactive-design","updated_at":"2018-09-18T15:34:03+00:00","link_to_comments":"https://www.designernews.co/stories/97332-just-launched-framer-x-the-worlds-most-advanced-tool-for-interactive-design","link_host":"framer.com","from":"designernews"},{"title":"Powerful Android and iOS Spyware Found Deployed in 45 Countries","description":"One of the world's most dangerous Android and iPhone spyware program has been found deployed against targets across 45 countries around the world over the last two years, a new report from Citizen Lab revealed.\n\nThe infamous spyware, dubbed Pegasus, is developed by NSO Group—an Israeli company which is mostly known for selling high-tech surveillance tools capable of remotely cracking into<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=cHM0chlVNPM:sqx0y8OyDxM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/cHM0chlVNPM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/cHM0chlVNPM/android-ios-hacking-tool.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/cHM0chlVNPM/android-ios-hacking-tool.html","updated_at":"2018-09-18T15:05:55+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/cHM0chlVNPM/android-ios-hacking-tool.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"#dearMoon","description":"https://dearmoon.earth/","link":"https://www.designernews.co/stories/97329-dearmoon","comments":"https://www.designernews.co/stories/97329-dearmoon","updated_at":"2018-09-18T13:42:26+00:00","link_to_comments":"https://www.designernews.co/stories/97329-dearmoon","link_host":"dearmoon.earth","from":"designernews"},{"title":"New on DesignBetter.Co, Enterprise Design Sprints: The guide to sparking collaborative design at any company.","description":"https://www.designbetter.co/enterprise-design-sprints","link":"https://www.designernews.co/stories/97327-new-on-designbetterco-enterprise-design-sprints-the-guide-to-sparking-collaborative-design-at-any-company","comments":"https://www.designernews.co/stories/97327-new-on-designbetterco-enterprise-design-sprints-the-guide-to-sparking-collaborative-design-at-any-company","updated_at":"2018-09-18T11:51:39+00:00","link_to_comments":"https://www.designernews.co/stories/97327-new-on-designbetterco-enterprise-design-sprints-the-guide-to-sparking-collaborative-design-at-any-company","link_host":"www.designbetter.co","from":"designernews"},{"title":"Linus Torvalds Apologizes For His Rude Behavior—Takes Time Off","description":"What just happened would definitely gonna surprise you.\n\nLinus Torvalds—father of the Linux open-source operating system—finally admitted his behavior towards other developers in the Linux community was hurting people and Linux.\n\nIn a surprising move this weekend, Torvalds apologized for insulting and abusing other developers for almost three decades and took a break from the open-source<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=GxBpBTpz6YE:NCiFYCPveNo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/GxBpBTpz6YE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/GxBpBTpz6YE/linus-torvalds-jerk.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GxBpBTpz6YE/linus-torvalds-jerk.html","updated_at":"2018-09-18T09:39:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GxBpBTpz6YE/linus-torvalds-jerk.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"This is my collection of books about UX, design, and architecture. Show me yours!","description":"https://ownetic.com/collections/01CB4GG9BVGCR4D50X5RF1C7QK/books","link":"https://www.designernews.co/stories/97308-this-is-my-collection-of-books-about-ux-design-and-architecture-show-me-yours","comments":"https://www.designernews.co/stories/97308-this-is-my-collection-of-books-about-ux-design-and-architecture-show-me-yours","updated_at":"2018-09-18T06:18:13+00:00","link_to_comments":"https://www.designernews.co/stories/97308-this-is-my-collection-of-books-about-ux-design-and-architecture-show-me-yours","link_host":"ownetic.com","from":"designernews"},{"title":"How Trello’s One-Man Email Team Manages to Make Email Magic","description":"https://explore.reallygoodemails.com/how-trellos-one-man-email-team-manages-to-make-email-magic-b9bad2fdae2c","link":"https://www.designernews.co/stories/97307-how-trellos-oneman-email-team-manages-to-make-email-magic","comments":"https://www.designernews.co/stories/97307-how-trellos-oneman-email-team-manages-to-make-email-magic","updated_at":"2018-09-18T04:51:46+00:00","link_to_comments":"https://www.designernews.co/stories/97307-how-trellos-oneman-email-team-manages-to-make-email-magic","link_host":"explore.reallygoodemails.com","from":"designernews"},{"title":"Learn Ethical Hacking Online – A to Z Online Training Pack","description":"Good news for you is that this week's THN Deals brings Ethical Hacking A to Z Bundle that let you get started regardless of your experience level.\n\nThe Ethical Hacking A to Z Bundle will walk you through the very basic skills you need to start your journey towards becoming a professional ethical hacker.\n\nThe 45 hours of course that includes total 384 in-depth lectures, usually cost $1,273, but<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=1-k0FwbNDHA:d0ebpv1nvFE:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1-k0FwbNDHA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1-k0FwbNDHA/learn-hacking-training.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1-k0FwbNDHA/learn-hacking-training.html","updated_at":"2018-09-17T13:01:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1-k0FwbNDHA/learn-hacking-training.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ransomware Attack Takes Down Bristol Airport's Flight Display Screens","description":"Bristol Airport has blamed a ransomware attack for causing a blackout of flight information screens for two days over the weekend.\n\nThe airport said that the attack started Friday morning, taking out several computers over the airport network, including its in-house display screens which provide details about the arrival and departure information of flights.\n&lt;!-- adsense --&gt;\nThe attack forced<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=UQJ2yMFaJLE:XeZWW-53meo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/UQJ2yMFaJLE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/UQJ2yMFaJLE/cyberattack-bristol-airport.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/UQJ2yMFaJLE/cyberattack-bristol-airport.html","updated_at":"2018-09-17T13:01:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/UQJ2yMFaJLE/cyberattack-bristol-airport.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Greece U-Turns — Now Approves Mr. Bitcoin's Extradition To Russia","description":"Greece just took another U-turn.\n\nMr. Bitcoin a.k.a. Alexander Vinnik is not going to France nor to the United States; instead, he is now possibly going to his homeland Russia.\n\nThe Supreme Civil and Criminal Court of Greece on Friday has overruled previous decisions and approved to extradite the alleged owner of the now-defunct Bitcoin cryptocurrency exchange BTC-e Vinnik to Russia.\n\nSeveral<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=B2vbZH3UXB8:D3M8Lyl8rwk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/B2vbZH3UXB8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/B2vbZH3UXB8/bitcoin-extradition-alexander-vinnik.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/B2vbZH3UXB8/bitcoin-extradition-alexander-vinnik.html","updated_at":"2018-09-17T10:38:08+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/B2vbZH3UXB8/bitcoin-extradition-alexander-vinnik.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Watch Out! This New Web Exploit Can Crash and Restart Your iPhone","description":"It's 2018, and just a few lines of code can crash and restart any iPhone or iPad and can cause a Mac computer to freeze.\n\nSabri Haddouche, a security researcher at encrypted instant messaging app Wire, revealed a proof-of-concept (PoC) web page containing an exploit that uses only a few lines of specially crafted CSS &amp; HTML code.\n\nBeyond just a simple crash, the web page, if visited, causes a<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=rYQ_3KTx3iw:67fBZgJ72qE:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/rYQ_3KTx3iw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/rYQ_3KTx3iw/iphone-crash-exploit.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rYQ_3KTx3iw/iphone-crash-exploit.html","updated_at":"2018-09-17T09:36:59+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rYQ_3KTx3iw/iphone-crash-exploit.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New modification of the old cold boot attack leaves most systems vulnerable","description":"The defenses put in place to thwart the 2008 attack turn out to be very weak.","link":"https://arstechnica.com/?p=1374349","comments":"https://arstechnica.com/?p=1374349","updated_at":"2018-09-13T20:26:02+00:00","link_to_comments":"https://arstechnica.com/?p=1374349","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Russian Hacker Pleads Guilty to Operating Kelihos Botnet","description":"The Russian man who was accused of operating the infamous Kelihos botnet has finally pleaded guilty in a U.S. federal court.\n\nPeter Yuryevich Levashov, 38, of St. Petersburg, Russia, pleaded guilty on Wednesday in U.S. federal court in Connecticut to computer crime, wire fraud, conspiracy and identity theft charges.\n\nLevashov, also known by many online aliases including Peter Severa, Petr<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=n17r6qKuNx0:hmOQYx2h5Sk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/n17r6qKuNx0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/n17r6qKuNx0/kelihos-botnet-Peter-Severa.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/n17r6qKuNx0/kelihos-botnet-Peter-Severa.html","updated_at":"2018-09-13T13:47:44+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/n17r6qKuNx0/kelihos-botnet-Peter-Severa.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How To Check If Your Twitter Account Has Been Hacked","description":"Did you ever wonder if your Twitter account has been hacked and who had managed to gain access and when it happened?\n\nTwitter now lets you know this.\n\nAfter Google and Facebook, Twitter now lets you see all the devices—laptop, phone, tablet, and otherwise—logged into your Twitter account.\n\nTwitter has recently rolled out a new security feature for its users, dubbed Apps and Sessions, allowing<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=PYNpo6Z33Zc:ahJUiA8pRAU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/PYNpo6Z33Zc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/PYNpo6Z33Zc/twitter-account-hacked.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PYNpo6Z33Zc/twitter-account-hacked.html","updated_at":"2018-09-13T13:15:43+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PYNpo6Z33Zc/twitter-account-hacked.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs","description":"Security researchers have revealed a new attack to steal passwords, encryption keys and other sensitive information stored on most modern computers, even those with full disk encryption.\n\nThe attack is a new variation of a traditional Cold Boot Attack, which is around since 2008 and lets attackers steal information that briefly remains in the memory (RAM) after the computer is shut down.<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=MwcqmGS-LHY:nyxsiNCoqeo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/MwcqmGS-LHY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/MwcqmGS-LHY/cold-boot-attack-encryption.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/MwcqmGS-LHY/cold-boot-attack-encryption.html","updated_at":"2018-09-13T12:28:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/MwcqmGS-LHY/cold-boot-attack-encryption.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Tesla Model S Hack Could Let Thieves Clone Key Fobs to Steal Cars","description":"Despite having proper security measures in place to protect the driving systems of its cars against cyber attacks, a team of security researchers discovered a way to remotely hack a Tesla Model S luxury sedans in less than two seconds.\n\nYes, you heard that right.\n\nA team of researchers from the Computer Security and Industrial Cryptography (COSIC) group of the Department of Electrical<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=b4jMxNCaYsc:v3ubP7elBeI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/b4jMxNCaYsc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/b4jMxNCaYsc/tesla-model-s-remote-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/b4jMxNCaYsc/tesla-model-s-remote-hack.html","updated_at":"2018-09-12T13:48:01+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/b4jMxNCaYsc/tesla-model-s-remote-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Beware! Unpatched Safari Browser Hack Lets Attackers Spoof URLs","description":"A security researcher has discovered a serious vulnerability that could allow attackers to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS.\n\nWhile Microsoft fixed the address bar URL spoofing vulnerability last month as part of its monthly security updates, Safari is still unpatched, potentially leaving Apple users vulnerable to phishing attacks.<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=7hIrALHkpBM:_6UWAuIEV6o:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/7hIrALHkpBM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/7hIrALHkpBM/browser-address-spoofing-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/7hIrALHkpBM/browser-address-spoofing-vulnerability.html","updated_at":"2018-09-12T11:50:38+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/7hIrALHkpBM/browser-address-spoofing-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Georgia says switching back to all-paper voting is logistically impossible","description":"In <em>Curling v. Kemp</em>, both sides are set to duke it out in court on Wednesday.","link":"https://arstechnica.com/?p=1372123","comments":"https://arstechnica.com/?p=1372123","updated_at":"2018-09-12T08:30:35+00:00","link_to_comments":"https://arstechnica.com/?p=1372123","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft Issues Software Updates for 17 Critical Vulnerabilities","description":"Times to gear up your systems and software.\n\nJust a few minutes ago Microsoft released its latest monthly Patch Tuesday update for September 2018, patching a total of 61 security vulnerabilities, 17 of which are rated as critical, 43 are rated Important, and one Moderate in severity.\n\nThis month's security updates patch vulnerabilities in Microsoft Windows, Edge, Internet Explorer, MS Office,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=3ZbfgiFAioQ:Dt5O3jQq4-0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/3ZbfgiFAioQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/3ZbfgiFAioQ/microsoft-software-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3ZbfgiFAioQ/microsoft-software-updates.html","updated_at":"2018-09-11T18:36:23+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3ZbfgiFAioQ/microsoft-software-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Adobe Issues ColdFusion Software Update for 6 Critical Vulnerabilities","description":"Adobe has released September 2018 security patch updates for a total of 10 vulnerabilities in Flash Player and ColdFusion, six of which are rated as critical that affected ColdFusion and could allow attackers to remotely execute arbitrary code on a vulnerable server.\n\nWhat's the good news this month for Adobe users?\n\nThis month Adobe Acrobat and Reader applications did not receive any patch<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ri2CgnKSZM8:ndCOkFKGrik:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ri2CgnKSZM8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ri2CgnKSZM8/adobe-software-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ri2CgnKSZM8/adobe-software-updates.html","updated_at":"2018-09-11T17:25:25+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ri2CgnKSZM8/adobe-software-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Apple Removes Several Trend Micro Apps For Collecting MacOS Users' Data","description":"Apple has removed almost all popular security apps offered by well-known cyber-security vendor Trend Micro from its official Mac App Store after they were caught stealing users' sensitive data without their consent.\n\nThe controversial apps in question include Dr Cleaner, Dr Cleaner Pro, Dr Antivirus, Dr Unarchiver, App Uninstall, Dr. Battery, and Duplicate Finder for Mac computers.\n\nThe apps<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=9IQPRng33iw:efcnWkcxNk8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/9IQPRng33iw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/9IQPRng33iw/apple-trendmicro-macos-apps.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/9IQPRng33iw/apple-trendmicro-macos-apps.html","updated_at":"2018-09-11T15:52:16+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/9IQPRng33iw/apple-trendmicro-macos-apps.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Tor Browser Zero-Day Exploit Revealed Online – Patch Now","description":"Zerodium, the infamous exploit vendor that earlier this year offered $1 million for submitting a zero-day exploit for Tor Browser, today publicly revealed a critical zero-day flaw in the anonymous browsing software that could reveal your identity to the sites you visit.\n\nIn a Tweet, Zerodium shared a zero-day vulnerability that resides in the NoScript browser plugin comes pre-installed with<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=OBtfFRzko8c:MImLTl-tBcg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/OBtfFRzko8c" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/OBtfFRzko8c/tor-browser-zero-day-exploit.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/OBtfFRzko8c/tor-browser-zero-day-exploit.html","updated_at":"2018-09-10T19:07:26+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/OBtfFRzko8c/tor-browser-zero-day-exploit.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"No.1 Adware Removal Tool On Apple App Store Caught Spying On Mac Users","description":"A highly popular top-tier app in Apple's Mac App Store that's designed to protect its users from adware and malware threats has been, ironically, found surreptitiously stealing their browsing history without their consent, and sending it to a server in China.\n\nWhat's more concerning? Even after Apple was warned a month ago, the company did not take any action against the app.\n\nThe app in<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=EjMaIIkERsE:vHT650SQbM0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/EjMaIIkERsE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/EjMaIIkERsE/mac-adware-removal-tool.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/EjMaIIkERsE/mac-adware-removal-tool.html","updated_at":"2018-09-07T19:04:33+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/EjMaIIkERsE/mac-adware-removal-tool.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Windows 10 support extended again: September releases now get 30 months","description":"And Microsoft is offering enterprises dedicated app compatibility support.","link":"https://arstechnica.com/?p=1369565","comments":"https://arstechnica.com/?p=1369565","updated_at":"2018-09-06T15:55:06+00:00","link_to_comments":"https://arstechnica.com/?p=1369565","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google wants to get rid of URLs but doesn’t know what to use instead","description":"Their complexity makes them a security hazard; their ubiquity makes replacement nigh impossible.","link":"https://arstechnica.com/?p=1368805","comments":"https://arstechnica.com/?p=1368805","updated_at":"2018-09-05T14:04:02+00:00","link_to_comments":"https://arstechnica.com/?p=1368805","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft obliquely acknowledges Windows 0-day bug published on Twitter","description":"Flaw allows a local user to obtain System privileges.","link":"https://arstechnica.com/?p=1365821","comments":"https://arstechnica.com/?p=1365821","updated_at":"2018-08-29T16:18:32+00:00","link_to_comments":"https://arstechnica.com/?p=1365821","link_host":"arstechnica.com","from":"arssecurity"},{"title":"The adventures of lab ED011—“Nobody would be able to duplicate what happened there”","description":"One Romanian campus computer lab both pentested the world and eventually helped protect it.","link":"https://arstechnica.com/?p=1352453","comments":"https://arstechnica.com/?p=1352453","updated_at":"2018-08-27T13:00:56+00:00","link_to_comments":"https://arstechnica.com/?p=1352453","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Chrome 69 will take the next step to killing Flash, roll out new design","description":"Flash will have to be enabled every time a site tries to use it.","link":"https://arstechnica.com/?p=1362157","comments":"https://arstechnica.com/?p=1362157","updated_at":"2018-08-21T17:26:03+00:00","link_to_comments":"https://arstechnica.com/?p=1362157","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel’s SGX blown wide open by, you guessed it, a speculative execution attack","description":"Speculative execution attacks truly are the gift that keeps on giving.","link":"https://arstechnica.com/?p=1358223","comments":"https://arstechnica.com/?p=1358223","updated_at":"2018-08-14T19:18:31+00:00","link_to_comments":"https://arstechnica.com/?p=1358223","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 to get disposable sandboxes for dodgy apps","description":"Apps will be run in a virtual machine that's discarded after use.","link":"https://arstechnica.com/?p=1356239","comments":"https://arstechnica.com/?p=1356239","updated_at":"2018-08-09T17:08:07+00:00","link_to_comments":"https://arstechnica.com/?p=1356239","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Heads-up: 2FA provider Duo Security to be acquired by Cisco (ugh)","description":"Both companies insist nothing will change, but this former Cisco customer has doubts.","link":"https://arstechnica.com/?p=1352469","comments":"https://arstechnica.com/?p=1352469","updated_at":"2018-08-02T22:08:27+00:00","link_to_comments":"https://arstechnica.com/?p=1352469","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New Spectre attack enables secrets to be leaked over a network","description":"It's no longer necessary to run attacker code on the victim system.","link":"https://arstechnica.com/?p=1349267","comments":"https://arstechnica.com/?p=1349267","updated_at":"2018-07-26T21:40:36+00:00","link_to_comments":"https://arstechnica.com/?p=1349267","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft offers extended support for Windows, SQL 2008—but with a catch","description":"An extra three years of patches are being offered to in-cloud users.","link":"https://arstechnica.com/?p=1342759","comments":"https://arstechnica.com/?p=1342759","updated_at":"2018-07-12T22:06:08+00:00","link_to_comments":"https://arstechnica.com/?p=1342759","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New Spectre-like attack uses speculative execution to overflow buffers","description":"Research is continuing to find new attack vectors.","link":"https://arstechnica.com/?p=1341201","comments":"https://arstechnica.com/?p=1341201","updated_at":"2018-07-10T21:00:18+00:00","link_to_comments":"https://arstechnica.com/?p=1341201","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Hyperthreading under scrutiny with new TLBleed crypto key leak","description":"A new attack prompted OpenBSD's developers to disable hyperthreading by default.","link":"https://arstechnica.com/?p=1336327","comments":"https://arstechnica.com/?p=1336327","updated_at":"2018-06-25T22:18:00+00:00","link_to_comments":"https://arstechnica.com/?p=1336327","link_host":"arstechnica.com","from":"arssecurity"},{"title":"A host of new security enhancements is coming to iOS and macOS","description":"Coming: FaceTime encryption, protected cam access, and, possibly, USB Restricted Mode.","link":"https://arstechnica.com/?p=1320893","comments":"https://arstechnica.com/?p=1320893","updated_at":"2018-06-05T00:10:07+00:00","link_to_comments":"https://arstechnica.com/?p=1320893","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New speculative-execution vulnerability strikes AMD, ARM, and Intel","description":"Fortunately, existing fixes should provide the protection we need.","link":"https://arstechnica.com/?p=1312715","comments":"https://arstechnica.com/?p=1312715","updated_at":"2018-05-22T16:24:09+00:00","link_to_comments":"https://arstechnica.com/?p=1312715","link_host":"arstechnica.com","from":"arssecurity"},{"title":"As the Web moves toward HTTPS by default, Chrome will remove “secure” indicator","description":"The browser is changing to flag the things that are dangerous, not the ones that are safe.","link":"https://arstechnica.com/?p=1310651","comments":"https://arstechnica.com/?p=1310651","updated_at":"2018-05-17T18:46:49+00:00","link_to_comments":"https://arstechnica.com/?p=1310651","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft claims to make Chrome safer with new extension","description":"A purported Edge advantage is now available in Chrome.","link":"https://arstechnica.com/?p=1295205","comments":"https://arstechnica.com/?p=1295205","updated_at":"2018-04-18T15:12:54+00:00","link_to_comments":"https://arstechnica.com/?p=1295205","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel, Microsoft to use GPU to scan memory for malware","description":"The company is also using its processors’ performance monitoring to detect malicious code.","link":"https://arstechnica.com/?p=1294013","comments":"https://arstechnica.com/?p=1294013","updated_at":"2018-04-17T03:00:10+00:00","link_to_comments":"https://arstechnica.com/?p=1294013","link_host":"arstechnica.com","from":"arssecurity"},{"title":"AMD systems gain Spectre protection with latest Windows fixes","description":"Systems will still need updated firmware to get the latest microcode, however.","link":"https://arstechnica.com/?p=1291707","comments":"https://arstechnica.com/?p=1291707","updated_at":"2018-04-11T16:32:56+00:00","link_to_comments":"https://arstechnica.com/?p=1291707","link_host":"arstechnica.com","from":"arssecurity"}]