[{"title":"Warren Buffett has the cash to buy Tesla, Starbucks, or McDonald's","description":"<a href="https://news.ycombinator.com/item?id=22717426">Comments</a>","link":"https://markets.businessinsider.com/news/stocks/warren-buffett-berkshire-hathaway-buy-tesla-starbucks-mcdonalds-coronavirus-selloff-2020-3-1029041432","comments":"https://news.ycombinator.com/item?id=22717426","updated_at":"2020-03-29T09:03:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22717426","link_host":"markets.businessinsider.com","from":"hackernews"},{"title":"Khan Academy requests for donations as their servers are at 250% normal load","description":"<a href="https://news.ycombinator.com/item?id=22717333">Comments</a>","link":"https://www.khanacademy.org/donate","comments":"https://news.ycombinator.com/item?id=22717333","updated_at":"2020-03-29T08:38:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22717333","link_host":"www.khanacademy.org","from":"hackernews"},{"title":"The U.S.'s $13B aircraft carrier has a toilet problem","description":"<a href="https://news.ycombinator.com/item?id=22717125">Comments</a>","link":"https://www.popularmechanics.com/military/navy-ships/a31929628/uss-ford-toilet/","comments":"https://news.ycombinator.com/item?id=22717125","updated_at":"2020-03-29T07:37:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22717125","link_host":"www.popularmechanics.com","from":"hackernews"},{"title":"Quick and simple image placeholder","description":"https://plchldr.co/","link":"https://www.designernews.co/stories/108221-quick-and-simple-image-placeholder","comments":"https://www.designernews.co/stories/108221-quick-and-simple-image-placeholder","updated_at":"2020-03-29T07:19:29+00:00","link_to_comments":"https://www.designernews.co/stories/108221-quick-and-simple-image-placeholder","link_host":"plchldr.co","from":"designernews"},{"title":"Huawei is dividing Western nations","description":"<a href="https://news.ycombinator.com/item?id=22717029">Comments</a>","link":"https://techcrunch.com/2020/03/28/how-huawei-is-dividing-western-nations/","comments":"https://news.ycombinator.com/item?id=22717029","updated_at":"2020-03-29T07:13:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22717029","link_host":"techcrunch.com","from":"hackernews"},{"title":"Internet Archive’s National Emergency Library Harms Authors","description":"<a href="https://news.ycombinator.com/item?id=22716923">Comments</a>","link":"https://www.authorsguild.org/industry-advocacy/internet-archives-uncontrolled-digital-lending/","comments":"https://news.ycombinator.com/item?id=22716923","updated_at":"2020-03-29T06:45:15+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22716923","link_host":"www.authorsguild.org","from":"hackernews"},{"title":"A 19th Century Math Genius Taught Us the Best Way to Hold a Pizza Slice","description":"<a href="https://news.ycombinator.com/item?id=22716839">Comments</a>","link":"https://aatishb.com/2014/09/05/curvature-and-strength/","comments":"https://news.ycombinator.com/item?id=22716839","updated_at":"2020-03-29T06:21:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22716839","link_host":"aatishb.com","from":"hackernews"},{"title":"How TV Logos Were Made Before Computers (2017)","description":"<a href="https://news.ycombinator.com/item?id=22716767">Comments</a>","link":"https://www.fastcompany.com/90125752/the-ingenious-way-tv-logos-were-made-before-computers","comments":"https://news.ycombinator.com/item?id=22716767","updated_at":"2020-03-29T05:54:41+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22716767","link_host":"www.fastcompany.com","from":"hackernews"},{"title":"Retina: A regex-based recreational programming language","description":"<a href="https://news.ycombinator.com/item?id=22716200">Comments</a>","link":"https://github.com/m-ender/retina","comments":"https://news.ycombinator.com/item?id=22716200","updated_at":"2020-03-29T03:45:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22716200","link_host":"github.com","from":"hackernews"},{"title":"Show HN: Understanding the Monty Hall paradox through code","description":"<a href="https://news.ycombinator.com/item?id=22716105">Comments</a>","link":"https://github.com/DeegC/monty_hall_paradox","comments":"https://news.ycombinator.com/item?id=22716105","updated_at":"2020-03-29T03:24:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22716105","link_host":"github.com","from":"hackernews"},{"title":"Declarative Configuration for Gmail Filters","description":"<a href="https://news.ycombinator.com/item?id=22715982">Comments</a>","link":"https://github.com/mbrt/gmailctl","comments":"https://news.ycombinator.com/item?id=22715982","updated_at":"2020-03-29T02:56:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22715982","link_host":"github.com","from":"hackernews"},{"title":"JITs Are Un-Ergonomic","description":"<a href="https://news.ycombinator.com/item?id=22715947">Comments</a>","link":"https://abe-winter.github.io/2020/03/28/jitu-brutus.html","comments":"https://news.ycombinator.com/item?id=22715947","updated_at":"2020-03-29T02:47:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22715947","link_host":"abewinter.github.io","from":"hackernews"},{"title":"Log-log plot of new vs. total Covid-19 cases by country","description":"<a href="https://news.ycombinator.com/item?id=22715920">Comments</a>","link":"https://aatishb.com/covidtrends/","comments":"https://news.ycombinator.com/item?id=22715920","updated_at":"2020-03-29T02:39:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22715920","link_host":"aatishb.com","from":"hackernews"},{"title":"Delivery workers are keeping California fed. They say no one’s keeping them safe","description":"<a href="https://news.ycombinator.com/item?id=22715824">Comments</a>","link":"https://www.latimes.com/business/technology/story/2020-03-28/coronavirus-delivery-workers-sick-leave-protection","comments":"https://news.ycombinator.com/item?id=22715824","updated_at":"2020-03-29T02:15:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22715824","link_host":"www.latimes.com","from":"hackernews"},{"title":"Stacks of Urns in Wuhan Prompt New Questions of Virus’s Toll","description":"<a href="https://news.ycombinator.com/item?id=22715549">Comments</a>","link":"https://www.bloomberg.com/news/articles/2020-03-27/stacks-of-urns-in-wuhan-prompt-new-questions-of-virus-s-toll","comments":"https://news.ycombinator.com/item?id=22715549","updated_at":"2020-03-29T01:09:43+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22715549","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"Building a Raspberry Pi GPS Speedometer","description":"<a href="https://news.ycombinator.com/item?id=22715198">Comments</a>","link":"https://gleslie.com/rpi/raspberry/pi/dashboard/2020/03/28/building-a-rpi-vehicle-dashboard.html","comments":"https://news.ycombinator.com/item?id=22715198","updated_at":"2020-03-28T23:48:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22715198","link_host":"gleslie.com","from":"hackernews"},{"title":"I had to build a web scraper to buy groceries","description":"<a href="https://news.ycombinator.com/item?id=22715031">Comments</a>","link":"https://utkuufuk.com/2020/03/28/grocery-scraping/","comments":"https://news.ycombinator.com/item?id=22715031","updated_at":"2020-03-28T23:15:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22715031","link_host":"utkuufuk.com","from":"hackernews"},{"title":"National Emergency Library","description":"<a href="https://news.ycombinator.com/item?id=22715009">Comments</a>","link":"https://archive.org/details/nationalemergencylibrary","comments":"https://news.ycombinator.com/item?id=22715009","updated_at":"2020-03-28T23:12:08+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22715009","link_host":"archive.org","from":"hackernews"},{"title":"Maltego – open-source intelligence and graphical link analysis tool","description":"<a href="https://news.ycombinator.com/item?id=22714981">Comments</a>","link":"https://www.maltego.com/","comments":"https://news.ycombinator.com/item?id=22714981","updated_at":"2020-03-28T23:06:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22714981","link_host":"www.maltego.com","from":"hackernews"},{"title":"Everybody Can Make DeepFakes Now [video]","description":"<a href="https://news.ycombinator.com/item?id=22714805">Comments</a>","link":"https://www.youtube.com/watch?v=mUfJOQKdtAk","comments":"https://news.ycombinator.com/item?id=22714805","updated_at":"2020-03-28T22:32:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22714805","link_host":"www.youtube.com","from":"hackernews"},{"title":"Show HN: SpicyPass – A free and open-source minimalist password manager","description":"<a href="https://news.ycombinator.com/item?id=22714744">Comments</a>","link":"https://github.com/JFreegman/SpicyPass","comments":"https://news.ycombinator.com/item?id=22714744","updated_at":"2020-03-28T22:18:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22714744","link_host":"github.com","from":"hackernews"},{"title":"Pi-hole Remote Code Execution","description":"<a href="https://news.ycombinator.com/item?id=22714661">Comments</a>","link":"https://natedotred.wordpress.com/2020/03/28/cve-2020-8816-pi-hole-remote-code-execution/","comments":"https://news.ycombinator.com/item?id=22714661","updated_at":"2020-03-28T22:02:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22714661","link_host":"natedotred.wordpress.com","from":"hackernews"},{"title":"NYC Subway Turnstile Data","description":"<a href="https://news.ycombinator.com/item?id=22714572">Comments</a>","link":"https://github.com/toddwschneider/nyc-subway-turnstile-data","comments":"https://news.ycombinator.com/item?id=22714572","updated_at":"2020-03-28T21:49:08+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22714572","link_host":"github.com","from":"hackernews"},{"title":"A Practical Guide to Memory Leaks in Node.js","description":"<a href="https://news.ycombinator.com/item?id=22714200">Comments</a>","link":"https://www.arbazsiddiqui.me/a-practical-guide-to-memory-leaks-in-nodejs/","comments":"https://news.ycombinator.com/item?id=22714200","updated_at":"2020-03-28T20:47:34+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22714200","link_host":"www.arbazsiddiqui.me","from":"hackernews"},{"title":"ComputeDRAM: In-Memory Compute Using Off-the-Shelf DRAMs (2019) [pdf]","description":"<a href="https://news.ycombinator.com/item?id=22712811">Comments</a>","link":"https://parallel.princeton.edu/papers/micro19-gao.pdf","comments":"https://news.ycombinator.com/item?id=22712811","updated_at":"2020-03-28T17:44:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22712811","link_host":"parallel.princeton.edu","from":"hackernews"},{"title":"Smell helps the brain form memories during sleep","description":"<a href="https://news.ycombinator.com/item?id=22712491">Comments</a>","link":"https://www.medicalnewstoday.com/articles/smell-helps-the-brain-form-memories-during-sleep#Sleep-and-memory","comments":"https://news.ycombinator.com/item?id=22712491","updated_at":"2020-03-28T17:10:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22712491","link_host":"www.medicalnewstoday.com","from":"hackernews"},{"title":"Bootstrap 5 dropping IE 10 & 11 browser support","description":"https://themesberg.com/blog/bootstrap/bootstrap-5-ie-11-browser-support","link":"https://www.designernews.co/stories/108218-bootstrap-5-dropping-ie-10--11-browser-support","comments":"https://www.designernews.co/stories/108218-bootstrap-5-dropping-ie-10--11-browser-support","updated_at":"2020-03-28T15:35:14+00:00","link_to_comments":"https://www.designernews.co/stories/108218-bootstrap-5-dropping-ie-10--11-browser-support","link_host":"themesberg.com","from":"designernews"},{"title":"From Spain to Germany, farmers warn of fresh food shortages","description":"<a href="https://news.ycombinator.com/item?id=22711661">Comments</a>","link":"https://www.bloomberg.com/news/articles/2020-03-27/from-spain-to-germany-farmers-warn-of-fresh-food-shortages","comments":"https://news.ycombinator.com/item?id=22711661","updated_at":"2020-03-28T15:24:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22711661","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"Static Analysis in GCC 10","description":"<a href="https://news.ycombinator.com/item?id=22711391">Comments</a>","link":"https://developers.redhat.com/blog/2020/03/26/static-analysis-in-gcc-10/","comments":"https://news.ycombinator.com/item?id=22711391","updated_at":"2020-03-28T14:42:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22711391","link_host":"developers.redhat.com","from":"hackernews"},{"title":"Coronavirus 3d (MIT License)","description":"https://spline.design/coronavirus3d/","link":"https://www.designernews.co/stories/108214-coronavirus-3d-mit-license","comments":"https://www.designernews.co/stories/108214-coronavirus-3d-mit-license","updated_at":"2020-03-28T13:14:02+00:00","link_to_comments":"https://www.designernews.co/stories/108214-coronavirus-3d-mit-license","link_host":"spline.design","from":"designernews"},{"title":"New Nissan Logo joins the flat design party","description":"https://www.creativebloq.com/news/new-nissan-logo?utm_content=buffer4c1a3&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer_cbloqtw","link":"https://www.designernews.co/stories/108213-new-nissan-logo-joins-the-flat-design-party","comments":"https://www.designernews.co/stories/108213-new-nissan-logo-joins-the-flat-design-party","updated_at":"2020-03-28T10:05:49+00:00","link_to_comments":"https://www.designernews.co/stories/108213-new-nissan-logo-joins-the-flat-design-party","link_host":"www.creativebloq.com","from":"designernews"},{"title":"Boids","description":"<a href="https://news.ycombinator.com/item?id=22709780">Comments</a>","link":"https://en.wikipedia.org/wiki/Boids","comments":"https://news.ycombinator.com/item?id=22709780","updated_at":"2020-03-28T07:30:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22709780","link_host":"en.wikipedia.org","from":"hackernews"},{"title":"New Grad vs. Senior Dev","description":"<a href="https://news.ycombinator.com/item?id=22708094">Comments</a>","link":"https://ericlippert.com/2020/03/27/new-grad-vs-senior-dev/","comments":"https://news.ycombinator.com/item?id=22708094","updated_at":"2020-03-28T00:20:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22708094","link_host":"ericlippert.com","from":"hackernews"},{"title":"Hackers Exploit Zero-Day Bugs in Draytek Devices to Target Enterprise Networks","description":"Cybersecurity researchers with Qihoo 360's NetLab today unveiled details of two recently spotted zero-day cyberattack campaigns in the wild targeting enterprise-grade networking devices manufactured by Taiwan-based DrayTek.\n\nAccording to the report, at least two separate groups of hackers exploited two critical remote command injection vulnerabilities (CVE-2020-8515) affecting DrayTek Vigor<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/wBKlnnST2Zo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/wBKlnnST2Zo/draytek-network-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wBKlnnST2Zo/draytek-network-hacking.html","updated_at":"2020-03-27T21:22:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wBKlnnST2Zo/draytek-network-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"When the state shifted to e-learning, a rural school shifted to the copy machine","description":"<a href="https://news.ycombinator.com/item?id=22706164">Comments</a>","link":"https://www.propublica.org/article/coronavirus-schools-illinois-trico-district-176-superintendent-larry-lovel","comments":"https://news.ycombinator.com/item?id=22706164","updated_at":"2020-03-27T19:49:07+00:00","link_to_comments":"https://news.ycombinator.com/item?id=22706164","link_host":"www.propublica.org","from":"hackernews"},{"title":"#SupportNYCDTC - An interactive, shoppable map of New York City","description":"https://air.inc/blog/supportnycdtc","link":"https://www.designernews.co/stories/108209-supportnycdtc--an-interactive-shoppable-map-of-new-york-city","comments":"https://www.designernews.co/stories/108209-supportnycdtc--an-interactive-shoppable-map-of-new-york-city","updated_at":"2020-03-27T19:33:00+00:00","link_to_comments":"https://www.designernews.co/stories/108209-supportnycdtc--an-interactive-shoppable-map-of-new-york-city","link_host":"air.inc","from":"designernews"},{"title":"Free Virtual Conference Webflow Clonable Template for you all","description":"https://webflow.com/website/virtual-register?s=virtual-register","link":"https://www.designernews.co/stories/108207-free-virtual-conference-webflow-clonable-template-for-you-all","comments":"https://www.designernews.co/stories/108207-free-virtual-conference-webflow-clonable-template-for-you-all","updated_at":"2020-03-27T19:28:47+00:00","link_to_comments":"https://www.designernews.co/stories/108207-free-virtual-conference-webflow-clonable-template-for-you-all","link_host":"webflow.com","from":"designernews"},{"title":"A tech blog with definitive tutorials","description":"https://www.widebinary.org","link":"https://www.designernews.co/stories/108203-a-tech-blog-with-definitive-tutorials","comments":"https://www.designernews.co/stories/108203-a-tech-blog-with-definitive-tutorials","updated_at":"2020-03-27T17:38:56+00:00","link_to_comments":"https://www.designernews.co/stories/108203-a-tech-blog-with-definitive-tutorials","link_host":"www.widebinary.org","from":"designernews"},{"title":"Crowdsourced list of discounts due to COVID-19","description":"https://aidtable.com/","link":"https://www.designernews.co/stories/108200-crowdsourced-list-of-discounts-due-to-covid19","comments":"https://www.designernews.co/stories/108200-crowdsourced-list-of-discounts-due-to-covid19","updated_at":"2020-03-27T14:20:45+00:00","link_to_comments":"https://www.designernews.co/stories/108200-crowdsourced-list-of-discounts-due-to-covid19","link_host":"aidtable.com","from":"designernews"},{"title":"The Absolute Must-Know UI Trends For 2020","description":"https://vectornator.io/ui-trends-2020/","link":"https://www.designernews.co/stories/108197-the-absolute-mustknow-ui-trends-for-2020","comments":"https://www.designernews.co/stories/108197-the-absolute-mustknow-ui-trends-for-2020","updated_at":"2020-03-27T14:06:26+00:00","link_to_comments":"https://www.designernews.co/stories/108197-the-absolute-mustknow-ui-trends-for-2020","link_host":"vectornator.io","from":"designernews"},{"title":"Color Push","description":"https://colorpush.wetransfer.com/","link":"https://www.designernews.co/stories/108196-color-push","comments":"https://www.designernews.co/stories/108196-color-push","updated_at":"2020-03-27T13:36:32+00:00","link_to_comments":"https://www.designernews.co/stories/108196-color-push","link_host":"colorpush.wetransfer.com","from":"designernews"},{"title":"Hackers Used Local News Sites to Install Spyware On iPhones","description":"A newly discovered watering-hole campaign is targeting Apple iPhone users in Hong Kong by using malicious website links as a lure to install spyware on the devices.\n\nAccording to research published by Trend Micro and Kaspersky, the "Operation Poisoned News" attack leverages a remote iOS exploit chain to deploy a feature-rich implant called 'LightSpy' through links to local news websites, which<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/hiuBLzRe-2k" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/hiuBLzRe-2k/iphone-iOS-spyware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hiuBLzRe-2k/iphone-iOS-spyware.html","updated_at":"2020-03-27T11:32:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hiuBLzRe-2k/iphone-iOS-spyware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Watch Out: Android Apps in Google Play Store Capitalizing on Coronavirus Outbreak","description":"Preying on public fears, the ongoing coronavirus outbreak is proving to be a goldmine of opportunity for attackers to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps.\n\nNow in a fresh twist, third-party Android app developers too have begun to take advantage of the situation to use coronavirus-related keywords in their app names,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/s4ej0ch0JFs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/s4ej0ch0JFs/coronavirus-covid-apps-android.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/s4ej0ch0JFs/coronavirus-covid-apps-android.html","updated_at":"2020-03-27T10:42:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/s4ej0ch0JFs/coronavirus-covid-apps-android.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Corona News Reader by Panda ","description":"http://coronareader.com","link":"https://www.designernews.co/stories/108189-corona-news-reader-by-panda-","comments":"https://www.designernews.co/stories/108189-corona-news-reader-by-panda-","updated_at":"2020-03-27T09:09:03+00:00","link_to_comments":"https://www.designernews.co/stories/108189-corona-news-reader-by-panda-","link_host":"coronareader.com","from":"designernews"},{"title":"A love letter to Affinity Designer","description":"https://design.infinum.com/case/affinity-designer-a-love-story","link":"https://www.designernews.co/stories/108187-a-love-letter-to-affinity-designer","comments":"https://www.designernews.co/stories/108187-a-love-letter-to-affinity-designer","updated_at":"2020-03-27T08:14:33+00:00","link_to_comments":"https://www.designernews.co/stories/108187-a-love-letter-to-affinity-designer","link_host":"design.infinum.com","from":"designernews"},{"title":"Color Palette Generator","description":"https://hexcolor.co/palette-generator","link":"https://www.designernews.co/stories/108182-color-palette-generator","comments":"https://www.designernews.co/stories/108182-color-palette-generator","updated_at":"2020-03-27T07:23:35+00:00","link_to_comments":"https://www.designernews.co/stories/108182-color-palette-generator","link_host":"hexcolor.co","from":"designernews"},{"title":"I've made a better mockup finding website. ","description":"Hey designers! I'm a digital design student.\nI've made better, cleaner, prettier mockup finding experience. \nEvery ad is handpicked by me and my fellow design students.\nNo ads, no timed redirects, no bullshit.\nIt's called Malli, (which means model or design).\n\nhttps://malli.graphics \n\nI'd love any feedback you guys can give me to make it even better.","link":"https://www.designernews.co/stories/108178-ive-made-a-better-mockup-finding-website-","comments":"https://www.designernews.co/stories/108178-ive-made-a-better-mockup-finding-website-","updated_at":"2020-03-26T18:31:54+00:00","link_to_comments":"https://www.designernews.co/stories/108178-ive-made-a-better-mockup-finding-website-","link_host":"malli.graphicsIdloveanyfeedbackyouguyscangivemetomakeitevenbetter.","from":"designernews"},{"title":"Is there bias between dark mode vs light based on Gender?","description":"Let me know your thoughts on this trend? Is there any research I can reference to learn more?","link":"https://www.designernews.co/stories/108177-is-there-bias-between-dark-mode-vs-light-based-on-gender","comments":"https://www.designernews.co/stories/108177-is-there-bias-between-dark-mode-vs-light-based-on-gender","updated_at":"2020-03-26T17:26:00+00:00","link_to_comments":"https://www.designernews.co/stories/108177-is-there-bias-between-dark-mode-vs-light-based-on-gender","link_host":null,"from":"designernews"},{"title":"New Bravo Vision Launch in Product Hunt!","description":"https://www.producthunt.com/posts/bravo-vision","link":"https://www.designernews.co/stories/108175-new-bravo-vision-launch-in-product-hunt","comments":"https://www.designernews.co/stories/108175-new-bravo-vision-launch-in-product-hunt","updated_at":"2020-03-26T16:56:32+00:00","link_to_comments":"https://www.designernews.co/stories/108175-new-bravo-vision-launch-in-product-hunt","link_host":"www.producthunt.com","from":"designernews"},{"title":"The Easiest Guide to Webflow for Beginners","description":"https://medium.com/@JanLosert/webflow-uncovered-the-easiest-guide-for-beginners-45358aa5839d?source=friends_link&sk=a46932ee91c9e0cc2d212f15063cadb4","link":"https://www.designernews.co/stories/108173-the-easiest-guide-to-webflow-for-beginners","comments":"https://www.designernews.co/stories/108173-the-easiest-guide-to-webflow-for-beginners","updated_at":"2020-03-26T14:32:23+00:00","link_to_comments":"https://www.designernews.co/stories/108173-the-easiest-guide-to-webflow-for-beginners","link_host":"medium.com","from":"designernews"},{"title":"Best Practices for Design Teams that use Sketch","description":"https://get.plantapp.io/best_practices/","link":"https://www.designernews.co/stories/108169-best-practices-for-design-teams-that-use-sketch","comments":"https://www.designernews.co/stories/108169-best-practices-for-design-teams-that-use-sketch","updated_at":"2020-03-26T07:59:44+00:00","link_to_comments":"https://www.designernews.co/stories/108169-best-practices-for-design-teams-that-use-sketch","link_host":"get.plantapp.io","from":"designernews"},{"title":"Free COVID-19 Animations for Awareness","description":"https://lottiefiles.com/coronavirus-animations","link":"https://www.designernews.co/stories/108168-free-covid19-animations-for-awareness","comments":"https://www.designernews.co/stories/108168-free-covid19-animations-for-awareness","updated_at":"2020-03-26T03:58:28+00:00","link_to_comments":"https://www.designernews.co/stories/108168-free-covid19-animations-for-awareness","link_host":"lottiefiles.com","from":"designernews"},{"title":"How are UK companies reacting to Covid-19?","description":"https://covidreactions.com/","link":"https://www.designernews.co/stories/108167-how-are-uk-companies-reacting-to-covid19","comments":"https://www.designernews.co/stories/108167-how-are-uk-companies-reacting-to-covid19","updated_at":"2020-03-25T23:57:31+00:00","link_to_comments":"https://www.designernews.co/stories/108167-how-are-uk-companies-reacting-to-covid19","link_host":"covidreactions.com","from":"designernews"},{"title":"Firefox Browser UI Kit on Figma","description":"https://www.figma.com/community/file/821030761095584353/Firefox-Browser-UI-Kit","link":"https://www.designernews.co/stories/108164-firefox-browser-ui-kit-on-figma","comments":"https://www.designernews.co/stories/108164-firefox-browser-ui-kit-on-figma","updated_at":"2020-03-25T20:19:58+00:00","link_to_comments":"https://www.designernews.co/stories/108164-firefox-browser-ui-kit-on-figma","link_host":"www.figma.com","from":"designernews"},{"title":"Word As Image","description":"https://www.wordasimage.page/","link":"https://www.designernews.co/stories/108163-word-as-image","comments":"https://www.designernews.co/stories/108163-word-as-image","updated_at":"2020-03-25T20:11:07+00:00","link_to_comments":"https://www.designernews.co/stories/108163-word-as-image","link_host":"www.wordasimage.page","from":"designernews"},{"title":"Why Radio Buttons and Checkboxes Can’t Co-Exist","description":"https://uxmovement.com/forms/why-radio-buttons-and-checkboxes-cant-co-exist/","link":"https://www.designernews.co/stories/108160-why-radio-buttons-and-checkboxes-cant-coexist","comments":"https://www.designernews.co/stories/108160-why-radio-buttons-and-checkboxes-cant-coexist","updated_at":"2020-03-25T18:31:50+00:00","link_to_comments":"https://www.designernews.co/stories/108160-why-radio-buttons-and-checkboxes-cant-coexist","link_host":"uxmovement.com","from":"designernews"},{"title":"TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services","description":"The malware authors behind TrickBot banking Trojan have developed a new Android app that can intercept one-time authorization codes sent to Internet banking customers via SMS or relatively more secure push notifications, and complete fraudulent transactions.\n\nThe Android app, called "TrickMo" by IBM X-Force researchers, is under active development and has exclusively targeted German users<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/fFWdOn3AYCs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/fFWdOn3AYCs/trickbot-two-factor-mobile-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fFWdOn3AYCs/trickbot-two-factor-mobile-malware.html","updated_at":"2020-03-25T15:53:40+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fFWdOn3AYCs/trickbot-two-factor-mobile-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Dozens of Android Apps for Kids on Google Play Store Caught in Ad Fraud Scheme","description":"More than 50 Android apps on the Google Play Store—most of which were designed for kids and had racked up almost 1 million downloads between them—have been caught using a new trick to secretly click on ads without the knowledge of smartphone users. \n\nDubbed "Tekya," the malware in the apps imitated users' actions to click ads from advertising networks such as Google's AdMob, AppLovin',<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/IAheiFn_tvw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/IAheiFn_tvw/android-apps-ad-fraud.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/IAheiFn_tvw/android-apps-ad-fraud.html","updated_at":"2020-03-25T11:19:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/IAheiFn_tvw/android-apps-ad-fraud.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Brand New: New logo for Los Angeles Rams by Nike GIG","description":"https://www.underconsideration.com/brandnew/archives/new_logos_for_los_angeles_rams_by_nike_gig.php","link":"https://www.designernews.co/stories/108151-brand-new-new-logo-for-los-angeles-rams-by-nike-gig","comments":"https://www.designernews.co/stories/108151-brand-new-new-logo-for-los-angeles-rams-by-nike-gig","updated_at":"2020-03-25T11:15:27+00:00","link_to_comments":"https://www.designernews.co/stories/108151-brand-new-new-logo-for-los-angeles-rams-by-nike-gig","link_host":"www.underconsideration.com","from":"designernews"},{"title":"We are launching Minty 3.0 for hiring artist for remote. What do you think?","description":"https://www.producthunt.com/posts/minty-3-0","link":"https://www.designernews.co/stories/108150-we-are-launching-minty-30-for-hiring-artist-for-remote-what-do-you-think","comments":"https://www.designernews.co/stories/108150-we-are-launching-minty-30-for-hiring-artist-for-remote-what-do-you-think","updated_at":"2020-03-25T11:02:41+00:00","link_to_comments":"https://www.designernews.co/stories/108150-we-are-launching-minty-30-for-hiring-artist-for-remote-what-do-you-think","link_host":"www.producthunt.com","from":"designernews"},{"title":"Critical RCE Bug Affects Millions of OpenWrt-based Network Devices","description":"A cybersecurity researcher today disclosed technical details and proof-of-concept of a critical remote code execution vulnerability affecting OpenWrt, a widely used Linux-based operating system for routers, residential gateways, and other embedded devices that route network traffic.\n\nTracked as CVE-2020-7982, the vulnerability resides in the OPKG package manager of OpenWrt that exists in the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-KB-_DdjYXE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-KB-_DdjYXE/openwrt-rce-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-KB-_DdjYXE/openwrt-rce-vulnerability.html","updated_at":"2020-03-24T20:06:59+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-KB-_DdjYXE/openwrt-rce-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How to Provide Remote Incident Response During the Coronavirus Times","description":"While the Coronavirus pandemic continues to strike chaos across the global economies, threat actors keep on launching cyberattacks on organizations from all sizes and verticals.\n\nIR providers face a unique challenge when approached by these organizations since, due to the Coronavirus mass quarantine, conducting incident response engagements by arriving physically to the customers' offices is<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/x3IrZEOsHzc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/x3IrZEOsHzc/remote-incident-response.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/x3IrZEOsHzc/remote-incident-response.html","updated_at":"2020-03-24T13:12:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/x3IrZEOsHzc/remote-incident-response.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Warning — Two Unpatched Critical 0-Day RCE Flaws Affect All Windows Versions","description":"Microsoft today issued a new security advisory warning billions of Windows users of two new critical, unpatched zero-day vulnerabilities that could let hackers remotely take complete control over targeted computers.\n\nAccording to Microsoft, both unpatched flaws are being used in limited, targeted attacks and impact all supported versions of the Windows operating system—including Windows 10, 8.1<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/d9OPQJ-_SF8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/d9OPQJ-_SF8/windows-adobe-font-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/d9OPQJ-_SF8/windows-adobe-font-vulnerability.html","updated_at":"2020-03-23T19:18:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/d9OPQJ-_SF8/windows-adobe-font-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"User Survey 2020 Report Shows Rapid Growth In Apache Pulsar Adoption","description":"For the first time ever, the Apache Pulsar PMC team is publishing a user survey report. The 2020 Apache Pulsar User Survey Report reveals Pulsar's accelerating rate of global adoption, details how organizations are leveraging Pulsar to build real-time streaming applications, and highlights key features on Pulsar's product roadmap.\n\nApache Pulsar is a cloud-native, distributed open source<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/doKQeE_qUDI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/doKQeE_qUDI/apache-pulsar-application.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/doKQeE_qUDI/apache-pulsar-application.html","updated_at":"2020-03-23T09:10:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/doKQeE_qUDI/apache-pulsar-application.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Android Cookie-Stealing Malware Found Hijacking Facebook Accounts","description":"A new simple but dangerous strain of Android malware has been found in the wild that steals users' authentication cookies from the web browsing and other apps, including Chrome and Facebook, installed on the compromised devices.\n\nDubbed "Cookiethief" by Kaspersky researchers, the Trojan works by acquiring superuser root rights on the target device, and subsequently, transfer stolen cookies to<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/DPnBSkkgybA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/DPnBSkkgybA/android-cookies-malware-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/DPnBSkkgybA/android-cookies-malware-hacking.html","updated_at":"2020-03-21T18:43:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/DPnBSkkgybA/android-cookies-malware-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Mukashi: A New Mirai IoT Botnet Variant Targeting Zyxel NAS Devices","description":"A new version of the infamous Mirai botnet is exploiting a recently uncovered critical vulnerability in network-attached storage (NAS) devices in an attempt to remotely infect and control vulnerable machines.\n\nCalled "Mukashi," the new variant of the malware employs brute-force attacks using different combinations of default credentials to log into Zyxel NAS, UTM, ATP, and VPN firewall<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/HrG2O-6pj04" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/HrG2O-6pj04/zyxel-mukashi-mirai-iot-botnet.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/HrG2O-6pj04/zyxel-mukashi-mirai-iot-botnet.html","updated_at":"2020-03-21T08:45:43+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/HrG2O-6pj04/zyxel-mukashi-mirai-iot-botnet.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Multiple DDoS Botnets Exploited 0-Day Flaws in LILIN DVR Surveillance Systems","description":"Multiple zero-day vulnerabilities in digital video recorders (DVRs) for surveillance systems manufactured by Taiwan-based LILIN have been exploited by botnet operators to infect and co-opt vulnerable devices into a family of denial-of-service bots.\n\nThe findings come from Chinese security firm Qihoo 360's Netlab team, who say different attack groups have been using LILIN DVR zero-day<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/TrfteovCQsw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/TrfteovCQsw/ddos-botnets-lilin-dvr.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TrfteovCQsw/ddos-botnets-lilin-dvr.html","updated_at":"2020-03-21T08:39:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TrfteovCQsw/ddos-botnets-lilin-dvr.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait","description":"As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors, who've taken advantage of the opportunity to target victims with scams or malware campaigns.\n\nNow, according to a new report published by Check Point Research today and shared with The Hacker News, hackers are exploiting the COVID-19 outbreak to spread their own<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/hoEVIeJ6sCw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/hoEVIeJ6sCw/covid-19-coronavirus-hacker-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hoEVIeJ6sCw/covid-19-coronavirus-hacker-malware.html","updated_at":"2020-03-19T13:01:56+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hoEVIeJ6sCw/covid-19-coronavirus-hacker-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How CISOs Should Prepare for Coronavirus Related Cybersecurity Threats","description":"The Coronavirus is hitting hard on the world's economy, creating a high volume of uncertainty within organizations.\n\nCybersecurity firm Cynet today revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors.\n\nIn light of these insights, Cynet has also shared a few ways to best prepare for the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8ub8woGLdps" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/8ub8woGLdps/coronavirus-cybersecurity-ciso.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8ub8woGLdps/coronavirus-cybersecurity-ciso.html","updated_at":"2020-03-18T17:04:20+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8ub8woGLdps/coronavirus-cybersecurity-ciso.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Adobe Releases Critical Patches for Acrobat Reader, Photoshop, Bridge, ColdFusion","description":"Though it's not Patch Tuesday, Adobe today released a massive batch of out-of-band software updates for six of its products to patch a total of 41 new security vulnerabilities.\n\nAdobe last week made a pre-announcement to inform its users of an upcoming security update for Acrobat and Reader, but the company today unveiled bugs in a total of 6 widely-used software, including:\n\n\nAdobe Genuine<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ipcnUJ_NrBs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ipcnUJ_NrBs/adobe-software-update.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ipcnUJ_NrBs/adobe-software-update.html","updated_at":"2020-03-18T09:37:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ipcnUJ_NrBs/adobe-software-update.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"TrickBot Now Exploits Infected PCs to Launch RDP Brute Force Attacks","description":"A new module for TrickBot banking Trojan has recently been discovered in the wild that lets attackers leverage compromised systems to launch brute-force attacks against selected Windows systems running a Remote Desktop Protocol (RDP) connection exposed to the Internet.\n\nThe module, dubbed "rdpScanDll," was discovered on January 30 and is said to be still in development, said cybersecurity firm<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1qXOqDBT0VU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1qXOqDBT0VU/trickbot-malware-rdp-bruteforce.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1qXOqDBT0VU/trickbot-malware-rdp-bruteforce.html","updated_at":"2020-03-18T08:39:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1qXOqDBT0VU/trickbot-malware-rdp-bruteforce.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"TrueFire Guitar Tutoring Website Suffers Magecart-style Credit Card Breach","description":"Online guitar tutoring website TrueFire has apparently suffered a 'Magecart' style data breach incident that may have potentially led to the exposure of its customers' personal information and payment card information.\n\nTrueFire is one of the popular guitar tutoring websites with over 1 million users, where wanna-be-guitarists pay online to access a massive library of over 900 courses and<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/B8W1_RehYUE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/B8W1_RehYUE/truefire-guitar-tutoring-data-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/B8W1_RehYUE/truefire-guitar-tutoring-data-breach.html","updated_at":"2020-03-17T19:41:33+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/B8W1_RehYUE/truefire-guitar-tutoring-data-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Researchers Uncover a Nigerian Hacker's Pursuit of his Million Dollar Dream","description":"Social engineering-driven malware threats continue to be a big threat, but new research details how cybercriminals profit off such schemes to launder hundreds of thousands of dollars from stolen credit cards of unsuspecting victims.\n\nCybersecurity firm Check Point Research, in a report shared with The Hacker news, uncovered the digital trail of a Nigerian cybercriminal, who went by the name of<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/DOIyjfUjsuQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/DOIyjfUjsuQ/nigerian-hacker-million-dollars.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/DOIyjfUjsuQ/nigerian-hacker-million-dollars.html","updated_at":"2020-03-17T11:57:42+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/DOIyjfUjsuQ/nigerian-hacker-million-dollars.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Europol Arrests 26 SIM Swapping Fraudsters For Stealing Over $3 Million","description":"Europol, along with the Spanish and the Romanian national police, has arrested 26 individuals in connection with the theft of over €3.5 million ($3.9 million) by hijacking people's phone numbers via SIM swapping attacks.\n\nThe law enforcement agencies arrested 12 and 14 people in Spain and Romania, respectively, as part of a joint operation against two different groups of SIM swappers, Europol<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/L6pVoftN-co" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/L6pVoftN-co/sim-swapping-fraud-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/L6pVoftN-co/sim-swapping-fraud-hacking.html","updated_at":"2020-03-16T09:02:31+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/L6pVoftN-co/sim-swapping-fraud-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Critical Patch Released for 'Wormable' SMBv3 Vulnerability — Install It ASAP!","description":"Microsoft today finally released an emergency software update to patch the recently disclosed very dangerous vulnerability in SMBv3 protocol that could let attackers launch wormable malware, which can propagate itself from one vulnerable computer to another automatically.\n\nThe vulnerability, tracked as CVE-2020-0796, in question is a remote code execution flaw that impacts Windows 10 version<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/GMJQcPS83NM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/GMJQcPS83NM/patch-wormable-smb-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GMJQcPS83NM/patch-wormable-smb-vulnerability.html","updated_at":"2020-03-12T19:09:39+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GMJQcPS83NM/patch-wormable-smb-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords","description":"Cybercriminals will stop at nothing to exploit every chance to prey on internet users.\n\nEven the disastrous spread of SARS-COV-II (the virus), which causes COVID-19 (the disease), is becoming an opportunity for them to likewise spread malware or launch cyber attacks.\n\nReason Cybersecurity recently released a threat analysis report detailing a new attack that takes advantage of internet users'<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/eV1tKt-2FJY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/eV1tKt-2FJY/coronavirus-maps-covid-19.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eV1tKt-2FJY/coronavirus-maps-covid-19.html","updated_at":"2020-03-11T21:47:17+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eV1tKt-2FJY/coronavirus-maps-covid-19.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Use This Ultimate Template to Plan and Monitor Your Cybersecurity Budgets","description":"Sound security budget planning and execution are essential for CIO's/CISO's success.\n\nNow, for the first time, the Ultimate Security Budget Plan and Track Excel template (download here) provide security executives a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that security needs are addressed while maintaining the budgetary frame.\n\nThe dynamic nature of the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8OAD0UaL7HY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/8OAD0UaL7HY/cybersecurity-budget-template.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8OAD0UaL7HY/cybersecurity-budget-template.html","updated_at":"2020-03-11T13:50:10+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8OAD0UaL7HY/cybersecurity-budget-template.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Warning — Unpatched Critical 'Wormable' Windows SMBv3 Flaw Disclosed","description":"Shortly after releasing its monthly batch of security updates, Microsoft late yesterday separately issued an advisory warning billions of its Windows users of a new critical, unpatched, and wormable vulnerability affecting Server Message Block 3.0 (SMBv3) network communication protocol.\n\nIt appears Microsoft originally planned to fix the flaw as part of its March 2020 Patch Tuesday update only,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/FT9f_WS07qs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/FT9f_WS07qs/smbv3-wormable-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/FT9f_WS07qs/smbv3-wormable-vulnerability.html","updated_at":"2020-03-11T12:27:42+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/FT9f_WS07qs/smbv3-wormable-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Issues March 2020 Updates to Patch 115 Security Flaws","description":"Microsoft today released security updates to fix a total of 115 new security vulnerabilities in various versions of its Windows operating system and related software—making March 2020 edition the biggest ever Patch Tuesday in the company's history.\n\nOf the 115 bugs spanning its various products — Microsoft Windows, Edge browser, Internet Explorer, Exchange Server, Office, Azure, Windows<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/BAvF_P8CRHU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/BAvF_P8CRHU/microsoft-patch-tuesday-march-2020.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BAvF_P8CRHU/microsoft-patch-tuesday-march-2020.html","updated_at":"2020-03-11T08:31:20+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BAvF_P8CRHU/microsoft-patch-tuesday-march-2020.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"L1ght Looks to Protect Internet Users from Toxic and Predatory Behavior","description":"Cybersecurity has been regarded as a necessity for all computer users, especially today when data breaches and malware attacks have become rampant.\n\nHowever, one of the more overlooked aspects of cybersecurity is the prevention of other forms of cybercrime, such as the spread of harmful content and predatory behavior.\n\nMost current discussions on cybersecurity revolve around organizations<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/41wWhvbQ1L0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/41wWhvbQ1L0/prevent-online-hate-cyber-bullying.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/41wWhvbQ1L0/prevent-online-hate-cyber-bullying.html","updated_at":"2020-03-11T08:00:26+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/41wWhvbQ1L0/prevent-online-hate-cyber-bullying.html","link_host":"thehackernews.com","from":"thehackernews"}]