[{"title":"ZeroCater (YC W11) Is Hiring a Principal Engineer in SF: Help Disrupt Lunch","description":"<a href="https://news.ycombinator.com/item?id=20207686">Comments</a>","link":"https://zerocater.com/about/careers/?gh_jid=1564864","comments":"https://news.ycombinator.com/item?id=20207686","updated_at":"2019-06-17T21:44:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20207686","link_host":"zerocater.com","from":"hackernews"},{"title":"Mankind's Inner Ant","description":"<a href="https://news.ycombinator.com/item?id=20207427">Comments</a>","link":"https://www.newstatesman.com/culture/books/2019/06/mankind-s-inner-ant-why-humans-swarm-together","comments":"https://news.ycombinator.com/item?id=20207427","updated_at":"2019-06-17T21:12:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20207427","link_host":"www.newstatesman.com","from":"hackernews"},{"title":"Google and Netflix Turning Real Estate Market in LA into the Bay Area","description":"<a href="https://news.ycombinator.com/item?id=20207370">Comments</a>","link":"https://www.latimes.com/business/la-fi-google-amazon-netflix-land-grab-20190616-story.html","comments":"https://news.ycombinator.com/item?id=20207370","updated_at":"2019-06-17T21:05:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20207370","link_host":"www.latimes.com","from":"hackernews"},{"title":"The Rascal Metaprogramming Language","description":"<a href="https://news.ycombinator.com/item?id=20207347">Comments</a>","link":"http://www.rascal-mpl.org/","comments":"https://news.ycombinator.com/item?id=20207347","updated_at":"2019-06-17T21:01:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20207347","link_host":"www.rascalmpl.org","from":"hackernews"},{"title":"As a Product Designer, what are your essential tools?","description":"There are countless lists and roundup articles about the **"Top XX UI/UX Design Tools"** and while Product Design can often encompass other roles such as UX design, I'd love to hear specifically from fellow Product Designers about the tools and apps you use in your day to day.","link":"https://www.designernews.co/stories/102977-as-a-product-designer-what-are-your-essential-tools","comments":"https://www.designernews.co/stories/102977-as-a-product-designer-what-are-your-essential-tools","updated_at":"2019-06-17T20:26:18+00:00","link_to_comments":"https://www.designernews.co/stories/102977-as-a-product-designer-what-are-your-essential-tools","link_host":null,"from":"designernews"},{"title":"Ultimate Guide to Website Design Cost in 2019","description":"https://mlsdev.com/blog/website-design-cost","link":"https://www.designernews.co/stories/102976-ultimate-guide-to-website-design-cost-in-2019","comments":"https://www.designernews.co/stories/102976-ultimate-guide-to-website-design-cost-in-2019","updated_at":"2019-06-17T20:17:20+00:00","link_to_comments":"https://www.designernews.co/stories/102976-ultimate-guide-to-website-design-cost-in-2019","link_host":"mlsdev.com","from":"designernews"},{"title":"The CIA Spied on People Through Their Smart TVs, Leaked Documents Reveal (2017)","description":"<a href="https://news.ycombinator.com/item?id=20206536">Comments</a>","link":"https://www.vice.com/en_us/article/8qbq5x/the-cia-spied-on-people-through-their-smart-tvs-leaked-documents-reveal","comments":"https://news.ycombinator.com/item?id=20206536","updated_at":"2019-06-17T19:37:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20206536","link_host":"www.vice.com","from":"hackernews"},{"title":"Google Is Taking Charge of the RCS Rollout","description":"<a href="https://news.ycombinator.com/item?id=20206412">Comments</a>","link":"https://www.theverge.com/2019/6/17/18681573/google-rcs-chat-android-texting-carriers-imessage-encryption","comments":"https://news.ycombinator.com/item?id=20206412","updated_at":"2019-06-17T19:21:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20206412","link_host":"www.theverge.com","from":"hackernews"},{"title":"Demon Core","description":"<a href="https://news.ycombinator.com/item?id=20205876">Comments</a>","link":"https://en.wikipedia.org/wiki/Demon_core","comments":"https://news.ycombinator.com/item?id=20205876","updated_at":"2019-06-17T18:17:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20205876","link_host":"en.wikipedia.org","from":"hackernews"},{"title":"Classes vs. Data Structures","description":"<a href="https://news.ycombinator.com/item?id=20205694">Comments</a>","link":"http://blog.cleancoder.com/uncle-bob/2019/06/16/ObjectsAndDataStructures.html","comments":"https://news.ycombinator.com/item?id=20205694","updated_at":"2019-06-17T18:01:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20205694","link_host":"blog.cleancoder.com","from":"hackernews"},{"title":"How much are professors paid?","description":"<a href="https://news.ycombinator.com/item?id=20205594">Comments</a>","link":"https://www.ifweassume.com/2019/06/how-much-are-professors-paid.html","comments":"https://news.ycombinator.com/item?id=20205594","updated_at":"2019-06-17T17:51:58+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20205594","link_host":"www.ifweassume.com","from":"hackernews"},{"title":"SACK Panic – Multiple TCP-based remote denial-of-service issues","description":"<a href="https://news.ycombinator.com/item?id=20205566">Comments</a>","link":"https://access.redhat.com/security/vulnerabilities/tcpsack","comments":"https://news.ycombinator.com/item?id=20205566","updated_at":"2019-06-17T17:50:32+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20205566","link_host":"access.redhat.com","from":"hackernews"},{"title":"Samsung TVs should be regularly virus-checked, the company says","description":"<a href="https://news.ycombinator.com/item?id=20205131">Comments</a>","link":"https://www.bbc.co.uk/news/technology-48664251","comments":"https://news.ycombinator.com/item?id=20205131","updated_at":"2019-06-17T17:15:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20205131","link_host":"www.bbc.co.uk","from":"hackernews"},{"title":"Presenting the Eshell","description":"<a href="https://news.ycombinator.com/item?id=20205103">Comments</a>","link":"http://www.howardism.org/Technical/Emacs/eshell-present.html","comments":"https://news.ycombinator.com/item?id=20205103","updated_at":"2019-06-17T17:12:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20205103","link_host":"www.howardism.org","from":"hackernews"},{"title":"Interview with the creators of levels.fyi","description":"<a href="https://news.ycombinator.com/item?id=20205088">Comments</a>","link":"https://www.cnbc.com/2019/06/14/how-much-google-facebook-other-tech-giants-pay-software-engineers.html","comments":"https://news.ycombinator.com/item?id=20205088","updated_at":"2019-06-17T17:10:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20205088","link_host":"www.cnbc.com","from":"hackernews"},{"title":"Minnesota court decision means doctors can be sued by patients they don't treat","description":"<a href="https://news.ycombinator.com/item?id=20204643">Comments</a>","link":"https://thedeductible.com/2019/06/10/why-did-susan-warren-die/","comments":"https://news.ycombinator.com/item?id=20204643","updated_at":"2019-06-17T16:33:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20204643","link_host":"thedeductible.com","from":"hackernews"},{"title":"iOS UI inspiration - design patterns gallery","description":"https://setproduct.com/patterns/ios","link":"https://www.designernews.co/stories/102972-ios-ui-inspiration--design-patterns-gallery","comments":"https://www.designernews.co/stories/102972-ios-ui-inspiration--design-patterns-gallery","updated_at":"2019-06-17T16:32:15+00:00","link_to_comments":"https://www.designernews.co/stories/102972-ios-ui-inspiration--design-patterns-gallery","link_host":"setproduct.com","from":"designernews"},{"title":"Building a Web-Based Motion Graphics Editor","description":"<a href="https://news.ycombinator.com/item?id=20204258">Comments</a>","link":"https://medium.com/women-make/building-a-web-based-motion-graphics-editor-bd070f8db795","comments":"https://news.ycombinator.com/item?id=20204258","updated_at":"2019-06-17T15:57:20+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20204258","link_host":"medium.com","from":"hackernews"},{"title":"Building & designing a web-based motion graphics editor","description":"https://medium.com/women-make/building-a-web-based-motion-graphics-editor-bd070f8db795","link":"https://www.designernews.co/stories/102970-building--designing-a-webbased-motion-graphics-editor","comments":"https://www.designernews.co/stories/102970-building--designing-a-webbased-motion-graphics-editor","updated_at":"2019-06-17T15:54:55+00:00","link_to_comments":"https://www.designernews.co/stories/102970-building--designing-a-webbased-motion-graphics-editor","link_host":"medium.com","from":"designernews"},{"title":"Facebook’s Libra cryptocurrency: Privacy and stability concerns","description":"<a href="https://news.ycombinator.com/item?id=20203850">Comments</a>","link":"https://www.bloomberg.com/opinion/articles/2019-06-17/facebook-libra-crypto-currency-is-another-zuckerberg-threat","comments":"https://news.ycombinator.com/item?id=20203850","updated_at":"2019-06-17T15:22:33+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20203850","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"C++11 lock-free command buffers for multi-thread rendering","description":"<a href="https://news.ycombinator.com/item?id=20203820">Comments</a>","link":"http://alinloghin.com/articles/command_buffer.html","comments":"https://news.ycombinator.com/item?id=20203820","updated_at":"2019-06-17T15:19:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20203820","link_host":"alinloghin.com","from":"hackernews"},{"title":"Mathematician Disproves Hedetniemi’s Graph Theory Conjecture","description":"<a href="https://news.ycombinator.com/item?id=20203707">Comments</a>","link":"https://www.quantamagazine.org/mathematician-disproves-hedetniemis-graph-theory-conjecture-20190617/","comments":"https://news.ycombinator.com/item?id=20203707","updated_at":"2019-06-17T15:08:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20203707","link_host":"www.quantamagazine.org","from":"hackernews"},{"title":"The student loan crisis is really an underemployment catastrophe","description":"<a href="https://news.ycombinator.com/item?id=20203530">Comments</a>","link":"https://medium.com/@eric_seufert/the-student-loan-crisis-is-really-an-underemployment-catastrophe-96181e937a10","comments":"https://news.ycombinator.com/item?id=20203530","updated_at":"2019-06-17T14:48:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20203530","link_host":"medium.com","from":"hackernews"},{"title":"Asian countries take a stand against the rich world’s plastic waste","description":"<a href="https://news.ycombinator.com/item?id=20203497">Comments</a>","link":"https://www.latimes.com/world/la-fg-asia-plastic-waste-20190617-story.html","comments":"https://news.ycombinator.com/item?id=20203497","updated_at":"2019-06-17T14:46:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20203497","link_host":"www.latimes.com","from":"hackernews"},{"title":"Clockwise — tool for teams to get more time for focus — launches with Accel + Greylock","description":"https://techcrunch.com/2019/06/17/clockwise-nabs-11m-series-a-to-make-your-calendar-smarter/","link":"https://www.designernews.co/stories/102969-clockwise--tool-for-teams-to-get-more-time-for-focus--launches-with-accel--greylock","comments":"https://www.designernews.co/stories/102969-clockwise--tool-for-teams-to-get-more-time-for-focus--launches-with-accel--greylock","updated_at":"2019-06-17T14:31:13+00:00","link_to_comments":"https://www.designernews.co/stories/102969-clockwise--tool-for-teams-to-get-more-time-for-focus--launches-with-accel--greylock","link_host":"techcrunch.com","from":"designernews"},{"title":"How to Use Customer Interviews to Find Your Unmet Needs, Decide What to Build, and Refine Your Product","description":"https://leanb2bbook.com/blog/customer-discovery-startup-guide/","link":"https://www.designernews.co/stories/102968-how-to-use-customer-interviews-to-find-your-unmet-needs-decide-what-to-build-and-refine-your-product","comments":"https://www.designernews.co/stories/102968-how-to-use-customer-interviews-to-find-your-unmet-needs-decide-what-to-build-and-refine-your-product","updated_at":"2019-06-17T14:28:30+00:00","link_to_comments":"https://www.designernews.co/stories/102968-how-to-use-customer-interviews-to-find-your-unmet-needs-decide-what-to-build-and-refine-your-product","link_host":"leanb2bbook.com","from":"designernews"},{"title":"UX Design Portfolio: Best Practices","description":"https://uxplanet.org/ux-design-portfolios-best-practices-8676e6a72ab","link":"https://www.designernews.co/stories/102966-ux-design-portfolio-best-practices","comments":"https://www.designernews.co/stories/102966-ux-design-portfolio-best-practices","updated_at":"2019-06-17T13:49:03+00:00","link_to_comments":"https://www.designernews.co/stories/102966-ux-design-portfolio-best-practices","link_host":"uxplanet.org","from":"designernews"},{"title":"The Future of Docker Desktop for Windows","description":"<a href="https://news.ycombinator.com/item?id=20202869">Comments</a>","link":"https://engineering.docker.com/2019/06/docker-hearts-wsl-2/","comments":"https://news.ycombinator.com/item?id=20202869","updated_at":"2019-06-17T13:47:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20202869","link_host":"engineering.docker.com","from":"hackernews"},{"title":"New Hampshire installs historical marker to honor the creation of BASIC","description":"<a href="https://news.ycombinator.com/item?id=20202213">Comments</a>","link":"https://www.concordmonitor.com/BASIC-Dartmouth-Kemeny-time-sharing-historical-26164409","comments":"https://news.ycombinator.com/item?id=20202213","updated_at":"2019-06-17T12:32:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20202213","link_host":"www.concordmonitor.com","from":"hackernews"},{"title":"Massimo Issue #25: Studio Dumbar — Todojunto — Diano Kitanovski — AFOM — Studio de Ronners","description":"http://massimo.brandpad.io/issues/25","link":"https://www.designernews.co/stories/102960-massimo-issue-25-studio-dumbar--todojunto--diano-kitanovski--afom--studio-de-ronners","comments":"https://www.designernews.co/stories/102960-massimo-issue-25-studio-dumbar--todojunto--diano-kitanovski--afom--studio-de-ronners","updated_at":"2019-06-17T11:22:56+00:00","link_to_comments":"https://www.designernews.co/stories/102960-massimo-issue-25-studio-dumbar--todojunto--diano-kitanovski--afom--studio-de-ronners","link_host":"massimo.brandpad.io","from":"designernews"},{"title":"Malaysia Airlines Flight MH370: Where Is It?","description":"<a href="https://news.ycombinator.com/item?id=20201557">Comments</a>","link":"https://www.theatlantic.com/magazine/archive/2019/07/mh370-malaysia-airlines/590653/","comments":"https://news.ycombinator.com/item?id=20201557","updated_at":"2019-06-17T10:31:50+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20201557","link_host":"www.theatlantic.com","from":"hackernews"},{"title":"The Outsider's Guide to the Social World","description":"<a href="https://news.ycombinator.com/item?id=20201148">Comments</a>","link":"https://academyofideas.com/2019/05/outsiders-guide-social-world/","comments":"https://news.ycombinator.com/item?id=20201148","updated_at":"2019-06-17T09:12:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20201148","link_host":"academyofideas.com","from":"hackernews"},{"title":"Fun comic website design for JotForm Mobile App","description":"https://www.jotform.com/products/mobile-forms/","link":"https://www.designernews.co/stories/102955-fun-comic-website-design-for-jotform-mobile-app","comments":"https://www.designernews.co/stories/102955-fun-comic-website-design-for-jotform-mobile-app","updated_at":"2019-06-17T07:59:31+00:00","link_to_comments":"https://www.designernews.co/stories/102955-fun-comic-website-design-for-jotform-mobile-app","link_host":"www.jotform.com","from":"designernews"},{"title":"Death Of IE; Its Aftermath On Cross Browser Compatibility","description":"https://www.lambdatest.com/blog/death-of-ie/?utm_source=designernews&utm_medium=blog&utm_campaign=AB-080419&utm_term=organicPosting","link":"https://www.designernews.co/stories/102954-death-of-ie-its-aftermath-on-cross-browser-compatibility","comments":"https://www.designernews.co/stories/102954-death-of-ie-its-aftermath-on-cross-browser-compatibility","updated_at":"2019-06-17T07:48:03+00:00","link_to_comments":"https://www.designernews.co/stories/102954-death-of-ie-its-aftermath-on-cross-browser-compatibility","link_host":"www.lambdatest.com","from":"designernews"},{"title":"Mazda is purging touchscreens from its vehicles","description":"<a href="https://news.ycombinator.com/item?id=20200335">Comments</a>","link":"https://www.motorauthority.com/news/1121372_why-mazda-is-purging-touchscreens-from-its-vehicles","comments":"https://news.ycombinator.com/item?id=20200335","updated_at":"2019-06-17T06:11:43+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20200335","link_host":"www.motorauthority.com","from":"hackernews"},{"title":"Get NASA's Media Library of Videos and Images For Free","description":"https://www.minicreo.com/news/free-get-nasas-media-library-of-videos-and-images.html","link":"https://www.designernews.co/stories/102952-get-nasas-media-library-of-videos-and-images-for-free","comments":"https://www.designernews.co/stories/102952-get-nasas-media-library-of-videos-and-images-for-free","updated_at":"2019-06-17T03:31:19+00:00","link_to_comments":"https://www.designernews.co/stories/102952-get-nasas-media-library-of-videos-and-images-for-free","link_host":"www.minicreo.com","from":"designernews"},{"title":"VisiCalc's Spreadsheets Changed the World","description":"<a href="https://news.ycombinator.com/item?id=20197060">Comments</a>","link":"https://thenewstack.io/how-visicalcs-spreadsheets-changed-the-world/","comments":"https://news.ycombinator.com/item?id=20197060","updated_at":"2019-06-16T18:24:46+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20197060","link_host":"thenewstack.io","from":"hackernews"},{"title":"What are the most important things you need to know about a company before applying for a remote design position with them?","description":"I'm curious about the most important things you feel you need to know about a company before you would go ahead and apply for a remote design position with them? - tooling, process, design team size etc","link":"https://www.designernews.co/stories/102950-what-are-the-most-important-things-you-need-to-know-about-a-company-before-applying-for-a-remote-design-position-with-them","comments":"https://www.designernews.co/stories/102950-what-are-the-most-important-things-you-need-to-know-about-a-company-before-applying-for-a-remote-design-position-with-them","updated_at":"2019-06-16T16:24:58+00:00","link_to_comments":"https://www.designernews.co/stories/102950-what-are-the-most-important-things-you-need-to-know-about-a-company-before-applying-for-a-remote-design-position-with-them","link_host":null,"from":"designernews"},{"title":"Calculators for Contractors, Builders, Remodelers, Carpenters, Woodworkers","description":"<a href="https://news.ycombinator.com/item?id=20189404">Comments</a>","link":"https://www.blocklayer.com/","comments":"https://news.ycombinator.com/item?id=20189404","updated_at":"2019-06-15T10:59:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20189404","link_host":"www.blocklayer.com","from":"hackernews"},{"title":"Self-Driving Cars Have a Problem: Safer Human-Driven Ones","description":"<a href="https://news.ycombinator.com/item?id=20189336">Comments</a>","link":"https://www.wsj.com/articles/self-driving-cars-have-a-problem-safer-human-driven-ones-11560571203?mod=rsswn","comments":"https://news.ycombinator.com/item?id=20189336","updated_at":"2019-06-15T10:38:58+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20189336","link_host":"www.wsj.com","from":"hackernews"},{"title":"Receiving Dead Satellites with the RTL-SDR (2014)","description":"<a href="https://news.ycombinator.com/item?id=20185711">Comments</a>","link":"https://www.rtl-sdr.com/receiving-dead-satellites-rtl-sdr/","comments":"https://news.ycombinator.com/item?id=20185711","updated_at":"2019-06-14T19:00:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20185711","link_host":"www.rtlsdr.com","from":"hackernews"},{"title":"Sketch for Teams, Smart Layout and More Coming Soon","description":"https://blog.sketchapp.com/sketch-for-teams-smart-layout-and-more-announcements-from-layers-eed45e3fa0fd","link":"https://www.designernews.co/stories/102942-sketch-for-teams-smart-layout-and-more-coming-soon","comments":"https://www.designernews.co/stories/102942-sketch-for-teams-smart-layout-and-more-coming-soon","updated_at":"2019-06-14T16:33:25+00:00","link_to_comments":"https://www.designernews.co/stories/102942-sketch-for-teams-smart-layout-and-more-coming-soon","link_host":"blog.sketchapp.com","from":"designernews"},{"title":"Psychology in design ","description":"https://uxplanet.org/the-psychology-principles-every-ui-ux-designer-needs-to-know-24116fd65778?source=---------2------------------&gi=925d86f52719","link":"https://www.designernews.co/stories/102935-psychology-in-design-","comments":"https://www.designernews.co/stories/102935-psychology-in-design-","updated_at":"2019-06-14T09:48:18+00:00","link_to_comments":"https://www.designernews.co/stories/102935-psychology-in-design-","link_host":"uxplanet.org","from":"designernews"},{"title":"Google Game Builder","description":"https://www.blog.google/technology/area-120/create-3d-games-friends-no-experience-required/","link":"https://www.designernews.co/stories/102934-google-game-builder","comments":"https://www.designernews.co/stories/102934-google-game-builder","updated_at":"2019-06-14T03:59:22+00:00","link_to_comments":"https://www.designernews.co/stories/102934-google-game-builder","link_host":"www.blog.google","from":"designernews"},{"title":"What Contract Design Work is Still In Demand?","description":"I've been collecting and [hand-screening hundreds of contract design jobs](https://folyo.me) from places like Dribbble, Behance, AngelList, WWR and more since 2013 - and have definitely noticed fluctuations in demand during that time. \n\nSo I'm curious what the design community here thinks about the current market for contract design work?\n\nHave you noticed a shift in the design skills that are needed?\n\nI'd say currently the bulk of the work is in 3 main categories:\n\n- [Website Design](https://folyo.me/job_type/remote-web-design-jobs/) (full websites for small to mid-sized businesses and non-profits)\n- [Product UI/UX](https://folyo.me/job_type/remote-product-ui-ux-design-jobs/) (mostly startups and agencies)\n- [Visual / Graphic Design](https://folyo.me/job_type/remote-graphic-design-jobs/) (for all of the above, startups, agencies, non-profits, and small businesses)\n\nThey're all pretty close in terms of volume but if I had to rank them, I'd put them in this order\n\nCurious if anyone wants specific stats for any of this, I have [a database of thousands of design contracts](https://folyo.me) and would be happy to share what I can.\n\nWhat do you feel is currently in demand?","link":"https://www.designernews.co/stories/102930-what-contract-design-work-is-still-in-demand","comments":"https://www.designernews.co/stories/102930-what-contract-design-work-is-still-in-demand","updated_at":"2019-06-13T17:19:14+00:00","link_to_comments":"https://www.designernews.co/stories/102930-what-contract-design-work-is-still-in-demand","link_host":"woops, can't parse","from":"designernews"},{"title":"When Time is of the Essence – Testing Controls Against the Latest Threats Faster","description":"A new threat has hit head the headlines (Robinhood anyone?), and you need to know if you're protected right now. What do you do? \n\nTraditionally, you would have to go with one of the options below.\n\nOption 1 – Manually check that IoCs have been updated across your security controls. \n\nThis would require checking that security controls such as your email gateway, web gateway, and endpoint<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Cj3DSu2dZtI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Cj3DSu2dZtI/breach-attack-simulation.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Cj3DSu2dZtI/breach-attack-simulation.html","updated_at":"2019-06-13T15:11:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Cj3DSu2dZtI/breach-attack-simulation.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Roast my startup's website design","description":"https://scriby.ai?ref=dn","link":"https://www.designernews.co/stories/102926-roast-my-startups-website-design","comments":"https://www.designernews.co/stories/102926-roast-my-startups-website-design","updated_at":"2019-06-13T14:18:54+00:00","link_to_comments":"https://www.designernews.co/stories/102926-roast-my-startups-website-design","link_host":"scriby.airefdn","from":"designernews"},{"title":"Critical Flaw Reported in Popular Evernote Extension for Chrome Users","description":"Cybersecurity researchers discover a critical flaw in the popular Evernote Chrome extension that could have allowed hackers to hijack your browser and steal sensitive information from any website you accessed.\n\nEvernote is a popular service that helps people taking notes and organize their to-do task lists, and over 4,610,000 users have been using its Evernote Web Clipper Extension for Chrome<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/i4hPrmGSfPc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/i4hPrmGSfPc/evernote-extension-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/i4hPrmGSfPc/evernote-extension-hacking.html","updated_at":"2019-06-13T13:11:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/i4hPrmGSfPc/evernote-extension-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Telegram Suffers 'Powerful DDoS Attack' From China During Hong Kong Protests","description":"Telegram, one of the most popular encrypted messaging app, briefly went offline yesterday for hundreds of thousands of users worldwide after a powerful distributed denial-of-service (DDoS) attack hit its servers.\n\nTelegram founder Pavel Durov later revealed that the attack was mainly coming from the IP addresses located in China, suggesting the Chinese government could be behind it to sabotage<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/OOgib_yXGeQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/OOgib_yXGeQ/telegram-ddos-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/OOgib_yXGeQ/telegram-ddos-attack.html","updated_at":"2019-06-13T10:42:13+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/OOgib_yXGeQ/telegram-ddos-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Rich Energy May Have To Change Its Logo After Losing A Copyright Claim","description":"https://wtf1.com/post/rich-energy-may-have-to-change-its-logo-after-losing-a-copyright-claim/","link":"https://www.designernews.co/stories/102923-rich-energy-may-have-to-change-its-logo-after-losing-a-copyright-claim","comments":"https://www.designernews.co/stories/102923-rich-energy-may-have-to-change-its-logo-after-losing-a-copyright-claim","updated_at":"2019-06-13T09:39:44+00:00","link_to_comments":"https://www.designernews.co/stories/102923-rich-energy-may-have-to-change-its-logo-after-losing-a-copyright-claim","link_host":"wtf1.com","from":"designernews"},{"title":"The New Wilderness","description":"<a href="https://news.ycombinator.com/item?id=20172745">Comments</a>","link":"https://idlewords.com/2019/06/the_new_wilderness.htm","comments":"https://news.ycombinator.com/item?id=20172745","updated_at":"2019-06-13T08:23:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=20172745","link_host":"idlewords.com","from":"hackernews"},{"title":"The State of CSS 2019","description":"https://2019.stateofcss.com/","link":"https://www.designernews.co/stories/102919-the-state-of-css-2019","comments":"https://www.designernews.co/stories/102919-the-state-of-css-2019","updated_at":"2019-06-13T03:48:04+00:00","link_to_comments":"https://www.designernews.co/stories/102919-the-state-of-css-2019","link_host":"2019.stateofcss.com","from":"designernews"},{"title":"Clarity 2.0 is now available with major new components & patterns, support for Figma, Angular 8.0, and more","description":"https://medium.com/claritydesignsystem/clarity-2-0-is-now-available-832dbb1e8a23","link":"https://www.designernews.co/stories/102916-clarity-20-is-now-available-with-major-new-components--patterns-support-for-figma-angular-80-and-more","comments":"https://www.designernews.co/stories/102916-clarity-20-is-now-available-with-major-new-components--patterns-support-for-figma-angular-80-and-more","updated_at":"2019-06-12T20:52:54+00:00","link_to_comments":"https://www.designernews.co/stories/102916-clarity-20-is-now-available-with-major-new-components--patterns-support-for-figma-angular-80-and-more","link_host":"medium.com","from":"designernews"},{"title":"Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities","description":"Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organizations are struggling with—from conventional asset inventory reporting to proactive elimination of exposed attack surfaces.\n\nHowever, gaining such visibility is often highly resource consuming and entails manual integration of various feeds.\n\nCynet is now<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/6zdn2mNkFY8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/6zdn2mNkFY8/cynet-free-visibility-tool.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/6zdn2mNkFY8/cynet-free-visibility-tool.html","updated_at":"2019-06-12T17:52:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/6zdn2mNkFY8/cynet-free-visibility-tool.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Android's Built-in Security Key Now Works With iOS Devices For Secure Login","description":"In April this year, a software update from Google overnight turned all Android phones, running Android 7.0 Nougat and up, into a FIDO-certified hardware security key as part of a push to encourage two-step verification.\n\nThe feature made it possible for users to confirm their identity when logging into a Google account more effortless and secure, without separately managing and plugging-in a<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/t6IZHBzD25k" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/t6IZHBzD25k/android-security-key-ios.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/t6IZHBzD25k/android-security-key-ios.html","updated_at":"2019-06-12T17:31:47+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/t6IZHBzD25k/android-security-key-ios.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Easy way to implement 3D and AR to a website","description":"https://www.awwwards.com/how-to-implement-3d-and-ar-to-your-website-with-vectary.html","link":"https://www.designernews.co/stories/102915-easy-way-to-implement-3d-and-ar-to-a-website","comments":"https://www.designernews.co/stories/102915-easy-way-to-implement-3d-and-ar-to-a-website","updated_at":"2019-06-12T17:21:41+00:00","link_to_comments":"https://www.designernews.co/stories/102915-easy-way-to-implement-3d-and-ar-to-a-website","link_host":"www.awwwards.com","from":"designernews"},{"title":"Listen Together - Collaborative Listening Concept for Spotify","description":"Hi guys! Posting here today because probably like most of you, I constantly share music. Some times with friends who are far away. I got fed up with how impractical the state of sharing music was, and realized there’s been little change in social for music streaming. \n\nI thought it’d be cool if there was a way for my friends and I to listen to our favorite jams simultaneously, in real time. Add to the queue, react to our picks, reintroduce the experience of bonding over music with friends, but in the digital space. \n\nMy hope is that Listen Together can start a conversation on collaborative listening, and see where music streaming can be pushed further! \n\nWhat do you guys think? Would you like to see something like this exist?\n\nCheck out the entire concept at <a href="https://www.listentogether.io/">listentogether.io</a>","link":"https://www.designernews.co/stories/102912-listen-together--collaborative-listening-concept-for-spotify","comments":"https://www.designernews.co/stories/102912-listen-together--collaborative-listening-concept-for-spotify","updated_at":"2019-06-12T15:02:05+00:00","link_to_comments":"https://www.designernews.co/stories/102912-listen-together--collaborative-listening-concept-for-spotify","link_host":"www.listentogether.io","from":"designernews"},{"title":"Updated Google Fonts website","description":"https://fonts.google.com/","link":"https://www.designernews.co/stories/102908-updated-google-fonts-website","comments":"https://www.designernews.co/stories/102908-updated-google-fonts-website","updated_at":"2019-06-12T13:34:40+00:00","link_to_comments":"https://www.designernews.co/stories/102908-updated-google-fonts-website","link_host":"fonts.google.com","from":"designernews"},{"title":"Appradius website design ","description":"https://appradius.co","link":"https://www.designernews.co/stories/102902-appradius-website-design-","comments":"https://www.designernews.co/stories/102902-appradius-website-design-","updated_at":"2019-06-12T10:49:43+00:00","link_to_comments":"https://www.designernews.co/stories/102902-appradius-website-design-","link_host":"appradius.co","from":"designernews"},{"title":"RAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory","description":"A team of cybersecurity researchers yesterday revealed details of a new side-channel attack on dynamic random-access memory (DRAM) that could allow malicious programs installed on a modern system to read sensitive memory data from other processes running on the same hardware.\n\nDubbed RAMBleed and identified as CVE-2019-0174, the new attack is based on a well-known class of DRAM side channel<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/pX4Oena3W04" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/pX4Oena3W04/rambleed-dram-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/pX4Oena3W04/rambleed-dram-attack.html","updated_at":"2019-06-12T10:16:20+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/pX4Oena3W04/rambleed-dram-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Firefox: The Evolution Of A Brand","description":"https://blog.mozilla.org/opendesign/firefox-the-evolution-of-a-brand/","link":"https://www.designernews.co/stories/102899-firefox-the-evolution-of-a-brand","comments":"https://www.designernews.co/stories/102899-firefox-the-evolution-of-a-brand","updated_at":"2019-06-12T08:40:38+00:00","link_to_comments":"https://www.designernews.co/stories/102899-firefox-the-evolution-of-a-brand","link_host":"blog.mozilla.org","from":"designernews"},{"title":"Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities","description":"After Adobe, the technology giant Microsoft today—on June 2019 Patch Tuesday—also released its monthly batch of software security updates for various supported versions of Windows operating systems and other Microsoft products.\n\nThis month's security updates include patches for a total of 88 vulnerabilities, 21 are rated Critical, 66 are Important, and one is rated Moderate in severity.\n\nThe<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/kn4CsLIzFLI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/kn4CsLIzFLI/windows-june-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/kn4CsLIzFLI/windows-june-updates.html","updated_at":"2019-06-11T18:49:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/kn4CsLIzFLI/windows-june-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Adobe Issues Critical Patches for ColdFusion, Flash Player, Campaign","description":"It's Patch Tuesday week!\n\nAdobe has just released the latest June 2019 software updates to address a total 11 security vulnerabilities in its three widely-used products Adobe ColdFusion, Flash Player, and Adobe Campaign.\n\nOut of these, three vulnerabilities affect Adobe ColdFusion, a commercial rapid web application development platform—all critical in severity—that could lead to arbitrary<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bkahzckFP7M" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bkahzckFP7M/adobe-patch-june.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bkahzckFP7M/adobe-patch-june.html","updated_at":"2019-06-11T18:45:36+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bkahzckFP7M/adobe-patch-june.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Flaw in WordPress Live Chat Plugin Lets Hackers Steal and Hijack Sessions","description":"Security researchers have been warning about a critical vulnerability they discovered in one of a popular WordPress Live Chat plugin, which, if exploited, could allow unauthorized remote attackers to steal chat logs or manipulate chat sessions.\n\nThe vulnerability, identified as CVE-2019-12498, resides in the "WP Live Chat Support" that is currently being used by over 50,000 businesses to<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Y8Olsb1YClg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y8Olsb1YClg/wordpress-live-chat-plugin.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y8Olsb1YClg/wordpress-live-chat-plugin.html","updated_at":"2019-06-11T10:41:22+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y8Olsb1YClg/wordpress-live-chat-plugin.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor","description":"Linux users, beware!\n\nIf you haven't recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim.\n\nSecurity researcher Armin Razmjou recently discovered a high-severity arbitrary OS command execution vulnerability (CVE-2019-12735) in Vim and Neovim—two most popular and powerful command-line<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-kLUXaXKpeY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-kLUXaXKpeY/linux-vim-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-kLUXaXKpeY/linux-vim-vulnerability.html","updated_at":"2019-06-10T18:26:48+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-kLUXaXKpeY/linux-vim-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hacker Discloses Second Zero-Day to Bypass Patch for Windows EoP Flaw","description":"An anonymous security researcher going by the name of SandboxEscaper today publicly shared a second zero-day exploit that can be used to bypass a recently patched elevation of privilege vulnerability in the Microsoft Windows operating system.\n\nSandboxEscaper is known for publicly dropping zero-day exploits for unpatched Windows vulnerabilities. In the past year, the hacker has disclosed over half<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/fWKRSwPNfko" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/fWKRSwPNfko/windows-eop-exploit.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fWKRSwPNfko/windows-eop-exploit.html","updated_at":"2019-06-07T10:52:16+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fWKRSwPNfko/windows-eop-exploit.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Brute-Force Botnet Targeting Over 1.5 Million RDP Servers Worldwide","description":"Security researchers have discovered an ongoing sophisticated botnet campaign that is currently brute-forcing more than 1.5 million publicly accessible Windows RDP servers on the Internet.\n\nDubbed GoldBrute, the botnet scheme has been designed in a way to escalate gradually by adding every new cracked system to its network, forcing them to further find new available RDP servers and then brute<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/JnNQaHJknfI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/JnNQaHJknfI/windows-rdp-brute-force.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JnNQaHJknfI/windows-rdp-brute-force.html","updated_at":"2019-06-07T09:22:07+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JnNQaHJknfI/windows-rdp-brute-force.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"The clever cryptography behind Apple’s “Find My” feature","description":"You can track down your stolen MacBook, but no one else can—not even Apple.","link":"https://arstechnica.com/?p=1517721","comments":"https://arstechnica.com/?p=1517721","updated_at":"2019-06-06T19:16:01+00:00","link_to_comments":"https://arstechnica.com/?p=1517721","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Cryptocurrency Firm Itself Hacked Its Customers to Protect Their Funds From Hackers","description":"Are you using Komodo's Agama Wallet to store your KMD and BTC cryptocurrencies?\n\nWere your funds also unauthorisedly transferred overnight to a new address?\n\nIf yes, don't worry, it's probably safe, and if you are lucky, you will get your funds back.\n\nHere's what exactly happened…\n\nKomodo, a cryptocurrency project and developer of Agama wallet, adopted a surprisingly unique way to protect its<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/vcI9z3CggZQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/vcI9z3CggZQ/komodo-agama-wallet-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vcI9z3CggZQ/komodo-agama-wallet-hacking.html","updated_at":"2019-06-06T13:14:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vcI9z3CggZQ/komodo-agama-wallet-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"CompTIA Certification Training — Get Online Courses @ 95% OFF","description":"The Information Technology industry has seen exponential growth over the years.\n\nIt is essential for everyone to earn cybersecurity certification if you want to be a part of this growing industry.\n\nOrganizations always prefer employees with strong internationally-recognized professional certifications. It proofs your skills, knowledge, and gives more credibility to advance your career.\n\nIT<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/RQS0vG3LTqA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/RQS0vG3LTqA/comtia-certification-training-videos.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RQS0vG3LTqA/comtia-certification-training-videos.html","updated_at":"2019-06-06T13:07:20+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RQS0vG3LTqA/comtia-certification-training-videos.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Critical Flaws Found in Widely Used IPTV Software for Online Streaming Services","description":"Security researchers have discovered multiple critical vulnerabilities in a popular IPTV middleware platform that is currently being used by more than a thousand regional and international online media streaming services to manage their millions of subscribers.\n\nDiscovered by security researchers at CheckPoint, the vulnerabilities reside in the administrative panel of Ministra TV platform,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/YSlnundP2iU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/YSlnundP2iU/iptv-software-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/YSlnundP2iU/iptv-software-hacking.html","updated_at":"2019-06-06T09:54:52+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/YSlnundP2iU/iptv-software-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Unpatched Bug Let Attackers Bypass Windows Lock Screen On RDP Sessions","description":"A security researcher today revealed details of a newly unpatched vulnerability in Microsoft Windows Remote Desktop Protocol (RDP).\n\nTracked as CVE-2019-9510, the reported vulnerability could allow client-side attackers to bypass the lock screen on remote desktop (RD) sessions.\n\nDiscovered by Joe Tammariello of Carnegie Mellon University Software Engineering Institute (SEI), the flaw exists<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/vuH4b8lQvn0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/vuH4b8lQvn0/rdp-windows-lock-screen.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vuH4b8lQvn0/rdp-windows-lock-screen.html","updated_at":"2019-06-05T09:30:13+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vuH4b8lQvn0/rdp-windows-lock-screen.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Firefox Web Browser Now Blocks Third-Party Tracking Cookies By Default","description":"As promised, Mozilla has finally enabled "Enhanced Tracking Protection" feature on its Firefox browser by default, which from now onwards would automatically block all third-party tracking cookies that allow advertisers and websites to track you across the web.\n\nTracking cookies, also known as third-party cookies, allows advertisers to monitor your online behavior and interests, using which<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/vGzPUxAZeoA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/vGzPUxAZeoA/firefox-tracking-cookies.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vGzPUxAZeoA/firefox-tracking-cookies.html","updated_at":"2019-06-04T17:57:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vGzPUxAZeoA/firefox-tracking-cookies.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Apple Launches Privacy-Focused 'Sign in with Apple ID' Feature at WWDC 2019","description":"Just like 'login with Google,' 'login with Facebook,' Twitter, LinkedIn or any other social media site, you would now be able to quickly sign-up and log into third-party websites and apps using your Apple ID.\n\nWhat's the difference? Well, Apple claims that signing-in with Apple ID would protect users' privacy by not disclosing their actual email addresses to the 3rd-party services and also<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/PUrUEi4ANGQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/PUrUEi4ANGQ/apple-launches-privacy-focused-sign-in.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PUrUEi4ANGQ/apple-launches-privacy-focused-sign-in.html","updated_at":"2019-06-04T16:37:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PUrUEi4ANGQ/apple-launches-privacy-focused-sign-in.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"macOS 0-Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks","description":"A security researcher who last year bypassed Apple's then-newly introduced macOS privacy feature has once again found a new way to bypass security warnings by performing 'Synthetic Clicks' on behalf of users without requiring their interaction.\n\nLast June, Apple introduced a core security feature in MacOS that made it mandatory for all applications to take permission ("allow" or "deny") from<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/KCc2lB51ZE8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/KCc2lB51ZE8/macOS-synthetic-click.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/KCc2lB51ZE8/macOS-synthetic-click.html","updated_at":"2019-06-03T16:08:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/KCc2lB51ZE8/macOS-synthetic-click.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"SUPRA Smart TV Flaw Lets Attackers Hijack Screens With Any Video","description":"I have said it before, and I will say it again — Smart devices are one of the dumbest technologies, so far, when it comes to protecting users' privacy and security.\n\nAs more and more smart devices are being sold worldwide, consumers should be aware of security and privacy risks associated with the so-called intelligent devices.\n\nWhen it comes to internet-connected devices, smart TVs are the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/CUuoyRtcruQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/CUuoyRtcruQ/supra-smart-tv-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/CUuoyRtcruQ/supra-smart-tv-hack.html","updated_at":"2019-06-03T09:15:13+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/CUuoyRtcruQ/supra-smart-tv-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Stole Customers' Credit Cards from 103 Checkers and Rally's Restaurants","description":"If you have swiped your payment card at the popular Checkers and Rally's drive-through restaurant chains in past 2-3 years, you should immediately request your bank to block your card and notify it if you notice any suspicious transaction.\n\nCheckers, one of the largest drive-through restaurant chains in the United States, disclosed a massive long-running data breach yesterday that affected an<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/rD0lGuHt0tk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/rD0lGuHt0tk/credit-card-checkers-restaurants.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rD0lGuHt0tk/credit-card-checkers-restaurants.html","updated_at":"2019-05-31T08:20:27+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rD0lGuHt0tk/credit-card-checkers-restaurants.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Infect 50,000 MS-SQL and PHPMyAdmin Servers with Rootkit Malware","description":"Cyber Security researchers at Guardicore Labs today published a detailed report on a widespread cryptojacking campaign attacking Windows MS-SQL and PHPMyAdmin servers worldwide.\n\nDubbed Nansh0u, the malicious campaign is reportedly being carried out by an APT-style Chinese hacking group who has already infected nearly 50,000 servers and are installing a sophisticated kernel-mode rootkit on<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/5U7cyftK9WE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/5U7cyftK9WE/hacking-mysql-phpmyadmin.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/5U7cyftK9WE/hacking-mysql-phpmyadmin.html","updated_at":"2019-05-29T18:53:49+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/5U7cyftK9WE/hacking-mysql-phpmyadmin.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Top 5 Last-Minute Memorial Day Deals at THN Store → Get 60% Extra OFF","description":"Memorial Day has come and gone, but you still have time to land some of the best deals on some of the best apps and tech training bundles around.\n\nWhether you're looking for a world-class VPN or want to begin a career as a high-paid ethical hacker or IT pro, this list of ultra-discounted apps and course bundles has you covered.\n\n\nEthical Hacking A to Z Training Bundle\n\n\nMSRP: $1273 - Sale Price<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/7ghuUwHnIxo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/7ghuUwHnIxo/memorial-day-deals.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/7ghuUwHnIxo/memorial-day-deals.html","updated_at":"2019-05-29T18:06:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/7ghuUwHnIxo/memorial-day-deals.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Flipboard Database Hacked — Users' Account Information Exposed","description":"Flipboard, a popular social sharing and news aggregator service used by over 150 million people, has disclosed that its databases containing account information of certain users have been hacked.\n\nAccording to a public note published yesterday by the company, unknown hackers managed to gain unauthorized access to its systems for nearly 10 months—between June 2, 2018, and March 23, 2019, and<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-KkesfMmGHM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-KkesfMmGHM/flipboard-data-breach-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-KkesfMmGHM/flipboard-data-breach-hacking.html","updated_at":"2019-05-29T10:27:10+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-KkesfMmGHM/flipboard-data-breach-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Nearly 1 Million Computers Still Vulnerable to \"Wormable\" BlueKeep RDP Flaw","description":"Nearly 1 million Windows systems are still unpatched and have been found vulnerable to a recently disclosed critical, wormable, remote code execution vulnerability in the Windows Remote Desktop Protocol (RDP)—two weeks after Microsoft releases the security patch.\n\nIf exploited, the vulnerability could allow an attacker to easily cause havoc around the world, potentially much worse than what<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/WaESRdPdx5M" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/WaESRdPdx5M/bluekeep-rdp-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/WaESRdPdx5M/bluekeep-rdp-vulnerability.html","updated_at":"2019-05-28T12:08:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/WaESRdPdx5M/bluekeep-rdp-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Windows 10 May 2019 Update now rolling out to everyone… slowly","description":"Unless you explicitly want it installed, you probably won't get this update.","link":"https://arstechnica.com/?p=1509109","comments":"https://arstechnica.com/?p=1509109","updated_at":"2019-05-21T20:50:24+00:00","link_to_comments":"https://arstechnica.com/?p=1509109","link_host":"arstechnica.com","from":"arssecurity"},{"title":">20,000 Linksys routers leak historic record of every device ever connected","description":"Linksys said it fixed flaw in 2014. Researcher Troy Mursch disagrees.","link":"https://arstechnica.com/?p=1507147","comments":"https://arstechnica.com/?p=1507147","updated_at":"2019-05-18T11:45:24+00:00","link_to_comments":"https://arstechnica.com/?p=1507147","link_host":"arstechnica.com","from":"arssecurity"},{"title":"The radio navigation planes use to land safely is insecure and can be hacked","description":"Radios that sell for $600 can spoof signals planes use to find runways.","link":"https://arstechnica.com/?p=1500727","comments":"https://arstechnica.com/?p=1500727","updated_at":"2019-05-15T10:00:36+00:00","link_to_comments":"https://arstechnica.com/?p=1500727","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New speculative execution bug leaks data from Intel chips’ internal buffers","description":"Intel-specific vulnerability was found by researchers both inside and outside the company.","link":"https://arstechnica.com/?p=1504973","comments":"https://arstechnica.com/?p=1504973","updated_at":"2019-05-14T18:10:55+00:00","link_to_comments":"https://arstechnica.com/?p=1504973","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Bloomberg alleges Huawei routers and network gear are backdoored","description":"Details are scarce, but the "backdoor" appears to be benign.","link":"https://arstechnica.com/?p=1498049","comments":"https://arstechnica.com/?p=1498049","updated_at":"2019-04-30T18:37:04+00:00","link_to_comments":"https://arstechnica.com/?p=1498049","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Password1, Password2, Password3 no more: Microsoft drops password expiration rec","description":"For years, Microsoft's baseline security policy has expired passwords after 60 days.","link":"https://arstechnica.com/?p=1496017","comments":"https://arstechnica.com/?p=1496017","updated_at":"2019-04-25T17:46:08+00:00","link_to_comments":"https://arstechnica.com/?p=1496017","link_host":"arstechnica.com","from":"arssecurity"},{"title":"McAfee joins Sophos, Avira, Avast—the latest Windows update breaks them all","description":"A range of fixes and workarounds have been published.","link":"https://arstechnica.com/?p=1493563","comments":"https://arstechnica.com/?p=1493563","updated_at":"2019-04-19T16:26:59+00:00","link_to_comments":"https://arstechnica.com/?p=1493563","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Hackers could read non-corporate Outlook.com, Hotmail for six months","description":"Hackers and Microsoft seem to disagree on key details of the hack.","link":"https://arstechnica.com/?p=1491071","comments":"https://arstechnica.com/?p=1491071","updated_at":"2019-04-15T15:14:19+00:00","link_to_comments":"https://arstechnica.com/?p=1491071","link_host":"arstechnica.com","from":"arssecurity"},{"title":"To catch a drug thief, hospital secretly recorded births, women’s surgeries","description":"81 women claim their privacy was violated as hospital tried to trap a drug thief.","link":"https://arstechnica.com/?p=1485547","comments":"https://arstechnica.com/?p=1485547","updated_at":"2019-04-03T15:41:05+00:00","link_to_comments":"https://arstechnica.com/?p=1485547","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Woman from China, with malware in tow, illegally entered Trump’s Mar-a-Lago","description":"Event raises serious questions about security practices of the US Secret Service.","link":"https://arstechnica.com/?p=1485277","comments":"https://arstechnica.com/?p=1485277","updated_at":"2019-04-03T00:30:06+00:00","link_to_comments":"https://arstechnica.com/?p=1485277","link_host":"arstechnica.com","from":"arssecurity"},{"title":"How Microsoft found a Huawei driver that opened systems to attack","description":"Monitoring systems were looking for attacks using technique popularized by the NSA.","link":"https://arstechnica.com/?p=1481405","comments":"https://arstechnica.com/?p=1481405","updated_at":"2019-03-26T19:03:08+00:00","link_to_comments":"https://arstechnica.com/?p=1481405","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft ships antivirus for macOS as Windows Defender becomes Microsoft Defender","description":"Microsoft is expanding the reach of its device management services.","link":"https://arstechnica.com/?p=1477565","comments":"https://arstechnica.com/?p=1477565","updated_at":"2019-03-21T15:57:59+00:00","link_to_comments":"https://arstechnica.com/?p=1477565","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google, Microsoft work together for a year to figure out new type of Windows flaw","description":"Researcher finds building blocks for privilege escalation: Can they be assembled to create a flaw?","link":"https://arstechnica.com/?p=1475361","comments":"https://arstechnica.com/?p=1475361","updated_at":"2019-03-18T18:36:59+00:00","link_to_comments":"https://arstechnica.com/?p=1475361","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Epic says its Game Store is not spying on you","description":"But Sweeney says it will stop accessing Steam friends lists without permission.","link":"https://arstechnica.com/?p=1474647","comments":"https://arstechnica.com/?p=1474647","updated_at":"2019-03-15T16:43:12+00:00","link_to_comments":"https://arstechnica.com/?p=1474647","link_host":"arstechnica.com","from":"arssecurity"},{"title":"An email marketing company left 809 million records exposed online","description":"150GB database included mortgage amounts, info on credit ratings.","link":"https://arstechnica.com/?p=1471293","comments":"https://arstechnica.com/?p=1471293","updated_at":"2019-03-09T18:36:53+00:00","link_to_comments":"https://arstechnica.com/?p=1471293","link_host":"arstechnica.com","from":"arssecurity"},{"title":"The rise of tech-worker activism","description":"Video: Leigh Honeywell created Never Again pledge and a company devoted to tech-worker safety.","link":"https://arstechnica.com/?p=1464789","comments":"https://arstechnica.com/?p=1464789","updated_at":"2019-03-01T14:00:19+00:00","link_to_comments":"https://arstechnica.com/?p=1464789","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft’s latest security service uses human intelligence, not artificial","description":"Computers are good at processing vast amounts of data, but humans still have their uses.","link":"https://arstechnica.com/?p=1466151","comments":"https://arstechnica.com/?p=1466151","updated_at":"2019-02-28T17:21:26+00:00","link_to_comments":"https://arstechnica.com/?p=1466151","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google: Software is never going to be able to fix Spectre-type bugs","description":"Researchers also devise a Spectre-like attack with no known mitigation.","link":"https://arstechnica.com/?p=1462619","comments":"https://arstechnica.com/?p=1462619","updated_at":"2019-02-23T17:30:15+00:00","link_to_comments":"https://arstechnica.com/?p=1462619","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Mandatory update coming to Windows 7, 2008 to kill off weak update hashes","description":"Microsoft is phasing out SHA-1 hashes on its patches.","link":"https://arstechnica.com/?p=1459215","comments":"https://arstechnica.com/?p=1459215","updated_at":"2019-02-19T17:10:23+00:00","link_to_comments":"https://arstechnica.com/?p=1459215","link_host":"arstechnica.com","from":"arssecurity"}]