[{"title":"A Simple Expense Cash Flow Tracker","link":"https://www.reddit.com/r/programming/comments/99980t/a_simple_expense_cash_flow_tracker/","comments":"https://www.reddit.com/r/programming/comments/99980t/a_simple_expense_cash_flow_tracker/","updated_at":"2018-08-22T01:49:38+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/99980t/a_simple_expense_cash_flow_tracker/","link_host":"reddit.com","from":"reddit"},{"title":"Minimalistic super mario 64 like 3D game engine","link":"https://www.reddit.com/r/programming/comments/9995bk/minimalistic_super_mario_64_like_3d_game_engine/","comments":"https://www.reddit.com/r/programming/comments/9995bk/minimalistic_super_mario_64_like_3d_game_engine/","updated_at":"2018-08-22T01:39:10+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9995bk/minimalistic_super_mario_64_like_3d_game_engine/","link_host":"reddit.com","from":"reddit"},{"title":"Dynamic Testing in JUnit 5; a Practical Guide – Billy Korando – Medium","link":"https://www.reddit.com/r/programming/comments/99942l/dynamic_testing_in_junit_5_a_practical_guide/","comments":"https://www.reddit.com/r/programming/comments/99942l/dynamic_testing_in_junit_5_a_practical_guide/","updated_at":"2018-08-22T01:34:26+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/99942l/dynamic_testing_in_junit_5_a_practical_guide/","link_host":"reddit.com","from":"reddit"},{"title":"TomEE: Running with Systemd - Tomitribe","link":"https://www.reddit.com/r/programming/comments/9993ub/tomee_running_with_systemd_tomitribe/","comments":"https://www.reddit.com/r/programming/comments/9993ub/tomee_running_with_systemd_tomitribe/","updated_at":"2018-08-22T01:33:35+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9993ub/tomee_running_with_systemd_tomitribe/","link_host":"reddit.com","from":"reddit"},{"title":"JavaFX 11 Release and Support Plans - Gluon","link":"https://www.reddit.com/r/programming/comments/9993ri/javafx_11_release_and_support_plans_gluon/","comments":"https://www.reddit.com/r/programming/comments/9993ri/javafx_11_release_and_support_plans_gluon/","updated_at":"2018-08-22T01:33:16+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9993ri/javafx_11_release_and_support_plans_gluon/","link_host":"reddit.com","from":"reddit"},{"title":"Show Proggit: I created a website with a bunch of math utilities that work in the browser","link":"https://www.reddit.com/r/programming/comments/9992is/show_proggit_i_created_a_website_with_a_bunch_of/","comments":"https://www.reddit.com/r/programming/comments/9992is/show_proggit_i_created_a_website_with_a_bunch_of/","updated_at":"2018-08-22T01:28:17+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9992is/show_proggit_i_created_a_website_with_a_bunch_of/","link_host":"reddit.com","from":"reddit"},{"title":"Pure JavaScript Barcode Scanner Based on WebAssembly Technology","link":"https://www.reddit.com/r/programming/comments/998xj7/pure_javascript_barcode_scanner_based_on/","comments":"https://www.reddit.com/r/programming/comments/998xj7/pure_javascript_barcode_scanner_based_on/","updated_at":"2018-08-22T01:08:35+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/998xj7/pure_javascript_barcode_scanner_based_on/","link_host":"reddit.com","from":"reddit"},{"title":"Retool (YC W17) is hiring a first engineer in SF","description":"<a href="https://news.ycombinator.com/item?id=17814939">Comments</a>","link":"https://news.ycombinator.com/item?id=17814939","comments":"https://news.ycombinator.com/item?id=17814939","updated_at":"2018-08-21T23:52:58+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814939","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"PowerShell Remoting","description":"<a href="https://news.ycombinator.com/item?id=17814922">Comments</a>","link":"https://www.sconstantinou.com/powershell-remoting/","comments":"https://news.ycombinator.com/item?id=17814922","updated_at":"2018-08-21T23:48:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814922","link_host":"www.sconstantinou.com","from":"hackernews"},{"title":"New T3 Instances – Burstable, Cost-Effective Performance","description":"<a href="https://news.ycombinator.com/item?id=17814871">Comments</a>","link":"https://aws.amazon.com/blogs/aws/new-t3-instances-burstable-cost-effective-performance/","comments":"https://news.ycombinator.com/item?id=17814871","updated_at":"2018-08-21T23:38:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814871","link_host":"aws.amazon.com","from":"hackernews"},{"title":"Check out this collision detection tutorial I threw together!","link":"https://www.reddit.com/r/programming/comments/9985h3/check_out_this_collision_detection_tutorial_i/","comments":"https://www.reddit.com/r/programming/comments/9985h3/check_out_this_collision_detection_tutorial_i/","updated_at":"2018-08-21T23:23:14+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9985h3/check_out_this_collision_detection_tutorial_i/","link_host":"reddit.com","from":"reddit"},{"title":"Commons Clause | Redis Labs","link":"https://www.reddit.com/r/programming/comments/9980py/commons_clause_redis_labs/","comments":"https://www.reddit.com/r/programming/comments/9980py/commons_clause_redis_labs/","updated_at":"2018-08-21T23:06:26+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9980py/commons_clause_redis_labs/","link_host":"reddit.com","from":"reddit"},{"title":"Science Proves: Pop Music Has Actually Gotten Worse (2012)","description":"<a href="https://news.ycombinator.com/item?id=17814648">Comments</a>","link":"https://www.smithsonianmag.com/smart-news/science-proves-pop-music-has-actually-gotten-worse-8173368/?no-ist","comments":"https://news.ycombinator.com/item?id=17814648","updated_at":"2018-08-21T23:02:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814648","link_host":"www.smithsonianmag.com","from":"hackernews"},{"title":"How Gusto Built Scalable Hiring Practices Rooted in Tradition","description":"<a href="https://news.ycombinator.com/item?id=17814478">Comments</a>","link":"http://firstround.com/review/how-gusto-built-scalable-hiring-practices-rooted-in-tradition/","comments":"https://news.ycombinator.com/item?id=17814478","updated_at":"2018-08-21T22:37:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814478","link_host":"firstround.com","from":"hackernews"},{"title":"Improving MapReduce Performance in Heterogeneous Environments (2008)","description":"<a href="https://news.ycombinator.com/item?id=17814451">Comments</a>","link":"https://www.usenix.org/legacy/event/osdi08/tech/full_papers/zaharia/zaharia_html/index.html","comments":"https://news.ycombinator.com/item?id=17814451","updated_at":"2018-08-21T22:33:15+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814451","link_host":"www.usenix.org","from":"hackernews"},{"title":"Commons Clause","description":"<a href="https://news.ycombinator.com/item?id=17814386">Comments</a>","link":"https://redislabs.com/community/commons-clause/","comments":"https://news.ycombinator.com/item?id=17814386","updated_at":"2018-08-21T22:24:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814386","link_host":"redislabs.com","from":"hackernews"},{"title":"PolarFS: Alibaba Distributed File System for Shared Storage Cloud Database [pdf]","description":"<a href="https://news.ycombinator.com/item?id=17814185">Comments</a>","link":"http://www.vldb.org/pvldb/vol11/p1849-cao.pdf","comments":"https://news.ycombinator.com/item?id=17814185","updated_at":"2018-08-21T21:54:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814185","link_host":"www.vldb.org","from":"hackernews"},{"title":"Overview of Inverse Dynamics for Robots","link":"https://www.reddit.com/r/programming/comments/997ffv/overview_of_inverse_dynamics_for_robots/","comments":"https://www.reddit.com/r/programming/comments/997ffv/overview_of_inverse_dynamics_for_robots/","updated_at":"2018-08-21T21:52:20+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/997ffv/overview_of_inverse_dynamics_for_robots/","link_host":"reddit.com","from":"reddit"},{"title":"CodeSandbox","description":"<a href="https://news.ycombinator.com/item?id=17814006">Comments</a>","link":"https://codesandbox.io/","comments":"https://news.ycombinator.com/item?id=17814006","updated_at":"2018-08-21T21:29:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17814006","link_host":"codesandbox.io","from":"hackernews"},{"title":"Verizon throttled fire department’s “unlimited” data during wildfire","description":"<a href="https://news.ycombinator.com/item?id=17813417">Comments</a>","link":"https://arstechnica.com/tech-policy/2018/08/verizon-throttled-fire-departments-unlimited-data-during-calif-wildfire/","comments":"https://news.ycombinator.com/item?id=17813417","updated_at":"2018-08-21T20:22:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17813417","link_host":"arstechnica.com","from":"hackernews"},{"title":"I made a display to show your repo events in real time broken out by user","link":"https://www.reddit.com/r/programming/comments/996k5c/i_made_a_display_to_show_your_repo_events_in_real/","comments":"https://www.reddit.com/r/programming/comments/996k5c/i_made_a_display_to_show_your_repo_events_in_real/","updated_at":"2018-08-21T20:11:04+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/996k5c/i_made_a_display_to_show_your_repo_events_in_real/","link_host":"reddit.com","from":"reddit"},{"title":"Learn You a Haskell for Great Good","description":"<a href="https://news.ycombinator.com/item?id=17812713">Comments</a>","link":"http://learnyouahaskell.com/","comments":"https://news.ycombinator.com/item?id=17812713","updated_at":"2018-08-21T19:04:43+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17812713","link_host":"learnyouahaskell.com","from":"hackernews"},{"title":"How to Hire Your First Engineer","description":"<a href="https://news.ycombinator.com/item?id=17812708">Comments</a>","link":"https://blog.ycombinator.com/how-to-hire-your-first-engineer/","comments":"https://news.ycombinator.com/item?id=17812708","updated_at":"2018-08-21T19:04:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17812708","link_host":"blog.ycombinator.com","from":"hackernews"},{"title":"Looking for colorblind designers/art directors/creative directors","description":"I had someone comment on one of my LinkedIn posts and mention that he received a degree in design, but seems to have given up on it because of colorblindness. \n\nIt seems like there's still a ton that can be accomplished as a colorblind designer, but I'd love to connect him with someone who can speak from experience. Is there anyone awesome out there that I could connect him with?","link":"https://www.designernews.co/stories/96769-looking-for-colorblind-designersart-directorscreative-directors","comments":"https://www.designernews.co/stories/96769-looking-for-colorblind-designersart-directorscreative-directors","updated_at":"2018-08-21T18:58:13+00:00","link_to_comments":"https://www.designernews.co/stories/96769-looking-for-colorblind-designersart-directorscreative-directors","link_host":null,"from":"designernews"},{"title":"National prison strike launches over underpaid labor and prison conditions","description":"<a href="https://news.ycombinator.com/item?id=17812292">Comments</a>","link":"https://slate.com/news-and-politics/2018/08/national-prison-strike-launches-over-underpaid-labor-and-prison-conditions.html","comments":"https://news.ycombinator.com/item?id=17812292","updated_at":"2018-08-21T18:23:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17812292","link_host":"slate.com","from":"hackernews"},{"title":"Waveguide - Landing Page Semantic Metrics ","description":"Hey DN Community,\n\nToday I want to share something new. One thing that I'm deeply passionate about is the raw data behind a design. Although I'm convinced that great design comes from a mix of intuition and expertise, I also believe that design is at a micro-level a complex science.\nI continuously try to do things to uncover the data behind a design and understand why things work or don't work. \n\nThat's why today I'm introducing a revamped detail view in Waveguide Landing Pages section.\nNow every landing page example in [Waveguide](https://www.waveguide.io/landing-pages/all/) shows a semantic analysis based on the content of that page. The semantic metrics that Waveguide will show are:\n\n- **Sentiment**: What's the overall sentiment of a page.\n- **Reading Ease**: How complicated is the text of a page based on education level (measured in School Grades)\n- **Read Time**: How long does it take to read the whole content at average human reading speed.\n- **Tone**: What are the emotions and communication style in the page.\n\n![Landing Page Analysis]\n(https://i.imgur.com/DgHVqag.png)\n\nBesides that, you can also see the color palette of the page (tip: click on the color to copy the hex value to your clipboard).\n\nI'm also trying to gauge some interest in providing these metrics on demand for your own designs. If you would be interested in a service where you could upload your design and get these metrics, please let me know. \n\nAnyways. Looking forward to your comments and thoughts. You can see the landing pages with semantic metrics here: [Waveguide - Landing Pages Examples] (https://www.waveguide.io/landing-pages/all/)","link":"https://www.designernews.co/stories/96767-waveguide--landing-page-semantic-metrics-","comments":"https://www.designernews.co/stories/96767-waveguide--landing-page-semantic-metrics-","updated_at":"2018-08-21T18:18:53+00:00","link_to_comments":"https://www.designernews.co/stories/96767-waveguide--landing-page-semantic-metrics-","link_host":"www.waveguide.io","from":"designernews"},{"title":"Dribbble redesigns its shot view?","description":"http://dribbble.com","link":"https://www.designernews.co/stories/96766-dribbble-redesigns-its-shot-view","comments":"https://www.designernews.co/stories/96766-dribbble-redesigns-its-shot-view","updated_at":"2018-08-21T18:17:47+00:00","link_to_comments":"https://www.designernews.co/stories/96766-dribbble-redesigns-its-shot-view","link_host":"dribbble.com","from":"designernews"},{"title":"ASP.NET Community Standup - Aug 21, 2018","link":"https://www.reddit.com/r/programming/comments/9956tr/aspnet_community_standup_aug_21_2018/","comments":"https://www.reddit.com/r/programming/comments/9956tr/aspnet_community_standup_aug_21_2018/","updated_at":"2018-08-21T17:32:52+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9956tr/aspnet_community_standup_aug_21_2018/","link_host":"reddit.com","from":"reddit"},{"title":"Chrome 69 will take the next step to killing Flash, roll out new design","description":"Flash will have to be enabled every time a site tries to use it.","link":"https://arstechnica.com/?p=1362157","comments":"https://arstechnica.com/?p=1362157","updated_at":"2018-08-21T17:26:03+00:00","link_to_comments":"https://arstechnica.com/?p=1362157","link_host":"arstechnica.com","from":"arssecurity"},{"title":"ReSharper 18.2 promises performance improvements, c# 7.3, spell checking and linters for js/ts","link":"https://www.reddit.com/r/programming/comments/99503r/resharper_182_promises_performance_improvements_c/","comments":"https://www.reddit.com/r/programming/comments/99503r/resharper_182_promises_performance_improvements_c/","updated_at":"2018-08-21T17:11:06+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/99503r/resharper_182_promises_performance_improvements_c/","link_host":"reddit.com","from":"reddit"},{"title":"My Experience and Advice for Using GPUs in Deep Learning: Which GPU(s) to get","description":"<a href="https://news.ycombinator.com/item?id=17811472">Comments</a>","link":"http://timdettmers.com/2018/08/21/which-gpu-for-deep-learning/","comments":"https://news.ycombinator.com/item?id=17811472","updated_at":"2018-08-21T17:04:59+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17811472","link_host":"timdettmers.com","from":"hackernews"},{"title":"Startups that launched today at Y Combinator’s S18 Demo Day 1","description":"<a href="https://news.ycombinator.com/item?id=17811181">Comments</a>","link":"https://techcrunch.com/2018/08/20/here-are-the-63-startups-that-launched-today-at-y-combinators-s18-demo-day-1/","comments":"https://news.ycombinator.com/item?id=17811181","updated_at":"2018-08-21T16:41:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17811181","link_host":"techcrunch.com","from":"hackernews"},{"title":"What to Do After Finding Hot Connectors on Overhead Power Lines (2017) [video]","description":"<a href="https://news.ycombinator.com/item?id=17811051">Comments</a>","link":"https://www.youtube.com/watch?v=piQpLL5nD18","comments":"https://news.ycombinator.com/item?id=17811051","updated_at":"2018-08-21T16:29:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17811051","link_host":"www.youtube.com","from":"hackernews"},{"title":"Introducing Ghost 2.0","description":"https://blog.ghost.org/2-0/","link":"https://www.designernews.co/stories/96762-introducing-ghost-20","comments":"https://www.designernews.co/stories/96762-introducing-ghost-20","updated_at":"2018-08-21T16:18:44+00:00","link_to_comments":"https://www.designernews.co/stories/96762-introducing-ghost-20","link_host":"blog.ghost.org","from":"designernews"},{"title":"Sponsor: Live Now: UX / UI design with Kyle Grady, Lisa Inoue and Jermaine Boca","description":"https://adobe.ly/2FpioQv","link":"https://www.designernews.co/stories/96760-sponsor-live-now-ux--ui-design-with-kyle-grady-lisa-inoue-and-jermaine-boca","comments":"https://www.designernews.co/stories/96760-sponsor-live-now-ux--ui-design-with-kyle-grady-lisa-inoue-and-jermaine-boca","updated_at":"2018-08-21T16:00:53+00:00","link_to_comments":"https://www.designernews.co/stories/96760-sponsor-live-now-ux--ui-design-with-kyle-grady-lisa-inoue-and-jermaine-boca","link_host":"adobe.ly","from":"designernews"},{"title":" How to Make a Conversion-driven SaaS Landing page [2018 edition]","description":"https://www.cortes.design/post/how-to-make-a-conversion-driven-saas-landing-page-2018-edition","link":"https://www.designernews.co/stories/96759--how-to-make-a-conversiondriven-saas-landing-page-2018-edition","comments":"https://www.designernews.co/stories/96759--how-to-make-a-conversiondriven-saas-landing-page-2018-edition","updated_at":"2018-08-21T16:00:02+00:00","link_to_comments":"https://www.designernews.co/stories/96759--how-to-make-a-conversiondriven-saas-landing-page-2018-edition","link_host":"www.cortes.design","from":"designernews"},{"title":"Wander Dream Journal by Baron Fig","description":"https://www.baronfig.com/products/wander","link":"https://www.designernews.co/stories/96757-wander-dream-journal-by-baron-fig","comments":"https://www.designernews.co/stories/96757-wander-dream-journal-by-baron-fig","updated_at":"2018-08-21T15:52:41+00:00","link_to_comments":"https://www.designernews.co/stories/96757-wander-dream-journal-by-baron-fig","link_host":"www.baronfig.com","from":"designernews"},{"title":"PHP 7.2 is now available in Google App Engine standard environment (beta)","description":"<a href="https://news.ycombinator.com/item?id=17810591">Comments</a>","link":"https://cloud.google.com/appengine/docs/standard/php7/","comments":"https://news.ycombinator.com/item?id=17810591","updated_at":"2018-08-21T15:41:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17810591","link_host":"cloud.google.com","from":"hackernews"},{"title":"Dark Tequila Banking Malware Uncovered After 5 Years of Activity","description":"Security researchers at Kaspersky Labs have uncovered a new, complex malware campaign that has been targeting customers of several Mexican banking institutions since at least 2013. \n\nDubbed Dark Tequila, the campaign delivers an advanced keylogger malware that managed to stay under the radar for five years due to its highly targeted nature and a few evasion techniques.\n\nDark Tequila has<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=vOdHq3l5DRc:D8S5Bd0K-YU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/vOdHq3l5DRc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/vOdHq3l5DRc/mexico-banking-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vOdHq3l5DRc/mexico-banking-malware.html","updated_at":"2018-08-21T15:37:43+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vOdHq3l5DRc/mexico-banking-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ice confirmed at the Moon's poles","description":"<a href="https://news.ycombinator.com/item?id=17810503">Comments</a>","link":"https://phys.org/news/2018-08-ice-moon-poles.amp","comments":"https://news.ycombinator.com/item?id=17810503","updated_at":"2018-08-21T15:33:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17810503","link_host":"phys.org","from":"hackernews"},{"title":"Monitoring and Observability in the .NET Runtime","link":"https://www.reddit.com/r/programming/comments/994119/monitoring_and_observability_in_the_net_runtime/","comments":"https://www.reddit.com/r/programming/comments/994119/monitoring_and_observability_in_the_net_runtime/","updated_at":"2018-08-21T15:18:55+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/994119/monitoring_and_observability_in_the_net_runtime/","link_host":"reddit.com","from":"reddit"},{"title":"Twenty-two states ask appeals court to bring back net neutrality","description":"<a href="https://news.ycombinator.com/item?id=17810267">Comments</a>","link":"https://techcrunch.com/2018/08/21/twenty-two-states-ask-appeals-court-to-bring-back-net-neutrality/","comments":"https://news.ycombinator.com/item?id=17810267","updated_at":"2018-08-21T15:10:08+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17810267","link_host":"techcrunch.com","from":"hackernews"},{"title":"WeTransfer Acquires Paper & Paste","description":"https://wetransfer.pr.co/168063-wetransfer-acquires-award-winning-creative-apps-paper-and-paste","link":"https://www.designernews.co/stories/96753-wetransfer-acquires-paper--paste","comments":"https://www.designernews.co/stories/96753-wetransfer-acquires-paper--paste","updated_at":"2018-08-21T13:51:29+00:00","link_to_comments":"https://www.designernews.co/stories/96753-wetransfer-acquires-paper--paste","link_host":"wetransfer.pr.co","from":"designernews"},{"title":"Introducing Ghost 2.0","description":"<a href="https://news.ycombinator.com/item?id=17809447">Comments</a>","link":"https://blog.ghost.org/2-0/","comments":"https://news.ycombinator.com/item?id=17809447","updated_at":"2018-08-21T13:42:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17809447","link_host":"blog.ghost.org","from":"hackernews"},{"title":"InVision Studio - Video Course","description":"https://learnux.io/course/invision-studio","link":"https://www.designernews.co/stories/96752-invision-studio--video-course","comments":"https://www.designernews.co/stories/96752-invision-studio--video-course","updated_at":"2018-08-21T13:19:35+00:00","link_to_comments":"https://www.designernews.co/stories/96752-invision-studio--video-course","link_host":"learnux.io","from":"designernews"},{"title":"ReasonML Standard Library","link":"https://www.reddit.com/r/programming/comments/992yho/reasonml_standard_library/","comments":"https://www.reddit.com/r/programming/comments/992yho/reasonml_standard_library/","updated_at":"2018-08-21T13:05:00+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/992yho/reasonml_standard_library/","link_host":"reddit.com","from":"reddit"},{"title":"Designer's workflow live: creating layouts in Figma with Websy team library","description":"https://www.youtube.com/watch?v=Kf1gILChfks","link":"https://www.designernews.co/stories/96750-designers-workflow-live-creating-layouts-in-figma-with-websy-team-library","comments":"https://www.designernews.co/stories/96750-designers-workflow-live-creating-layouts-in-figma-with-websy-team-library","updated_at":"2018-08-21T12:53:15+00:00","link_to_comments":"https://www.designernews.co/stories/96750-designers-workflow-live-creating-layouts-in-figma-with-websy-team-library","link_host":"www.youtube.com","from":"designernews"},{"title":"Telling the Truth About Defects in Technology Should Never, Ever, Ever Be Illegal. EVER.","link":"https://www.reddit.com/r/programming/comments/992s3i/telling_the_truth_about_defects_in_technology/","comments":"https://www.reddit.com/r/programming/comments/992s3i/telling_the_truth_about_defects_in_technology/","updated_at":"2018-08-21T12:38:31+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/992s3i/telling_the_truth_about_defects_in_technology/","link_host":"reddit.com","from":"reddit"},{"title":"Elm 0.19 released","link":"https://www.reddit.com/r/programming/comments/992qe5/elm_019_released/","comments":"https://www.reddit.com/r/programming/comments/992qe5/elm_019_released/","updated_at":"2018-08-21T12:29:41+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/992qe5/elm_019_released/","link_host":"reddit.com","from":"reddit"},{"title":"Listen to Her: Gender on This American Life","description":"<a href="https://news.ycombinator.com/item?id=17808870">Comments</a>","link":"https://pudding.cool/2017/09/this-american-life/","comments":"https://news.ycombinator.com/item?id=17808870","updated_at":"2018-08-21T12:15:59+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17808870","link_host":"pudding.cool","from":"hackernews"},{"title":"Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?","link":"https://www.reddit.com/r/programming/comments/992ntc/q_why_do_keynote_speakers_keep_suggesting_that/","comments":"https://www.reddit.com/r/programming/comments/992ntc/q_why_do_keynote_speakers_keep_suggesting_that/","updated_at":"2018-08-21T12:14:38+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/992ntc/q_why_do_keynote_speakers_keep_suggesting_that/","link_host":"reddit.com","from":"reddit"},{"title":"A Web Design Crash Course: From Developer to Developer","description":"<a href="https://news.ycombinator.com/item?id=17808631">Comments</a>","link":"https://zen-of-programming.com/design","comments":"https://news.ycombinator.com/item?id=17808631","updated_at":"2018-08-21T11:20:17+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17808631","link_host":"zenofprogramming.com","from":"hackernews"},{"title":"The differences between UX/UI Designer, Product Designer, Product Manager ","description":"How would you describe to your child what are the responsibilities of the UX/UI Designer, Product Designer, Product Manager?","link":"https://www.designernews.co/stories/96749-the-differences-between-uxui-designer-product-designer-product-manager-","comments":"https://www.designernews.co/stories/96749-the-differences-between-uxui-designer-product-designer-product-manager-","updated_at":"2018-08-21T10:49:27+00:00","link_to_comments":"https://www.designernews.co/stories/96749-the-differences-between-uxui-designer-product-designer-product-manager-","link_host":null,"from":"designernews"},{"title":"Catching integer overflows in C","description":"<a href="https://news.ycombinator.com/item?id=17808491">Comments</a>","link":"https://www.fefe.de/intof.html","comments":"https://news.ycombinator.com/item?id=17808491","updated_at":"2018-08-21T10:43:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17808491","link_host":"www.fefe.de","from":"hackernews"},{"title":"Creating a bash completion script","link":"https://www.reddit.com/r/programming/comments/9922r9/creating_a_bash_completion_script/","comments":"https://www.reddit.com/r/programming/comments/9922r9/creating_a_bash_completion_script/","updated_at":"2018-08-21T10:35:33+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9922r9/creating_a_bash_completion_script/","link_host":"reddit.com","from":"reddit"},{"title":"Google Sued Over Misleading Users About Location Tracking Feature","description":"Google was in the news last week for a misleading claim that "with Location History off, the places you go are no longer stored," which is not true.\n\nNow, the search engine giant is once again in the news after a San Diego man has filed the first lawsuit against Google over this issue.\n\nLast week, the Associated Press investigation revealed that the search engine giant tracks movements of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=g_wzwQCCqSg:Jkgqwg8mONA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/g_wzwQCCqSg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/g_wzwQCCqSg/google-location-tracking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/g_wzwQCCqSg/google-location-tracking.html","updated_at":"2018-08-21T10:34:55+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/g_wzwQCCqSg/google-location-tracking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"My daily PLANNER","description":"https://paulina.website/daily-planner/","link":"https://www.designernews.co/stories/96748-my-daily-planner","comments":"https://www.designernews.co/stories/96748-my-daily-planner","updated_at":"2018-08-21T10:33:12+00:00","link_to_comments":"https://www.designernews.co/stories/96748-my-daily-planner","link_host":"paulina.website","from":"designernews"},{"title":"Principle 4 Beta","description":"http://principleformac.com/beta.html","link":"https://www.designernews.co/stories/96747-principle-4-beta","comments":"https://www.designernews.co/stories/96747-principle-4-beta","updated_at":"2018-08-21T09:36:32+00:00","link_to_comments":"https://www.designernews.co/stories/96747-principle-4-beta","link_host":"principleformac.com","from":"designernews"},{"title":"Idempotence. What is it and why should I care?","link":"https://www.reddit.com/r/programming/comments/991loy/idempotence_what_is_it_and_why_should_i_care/","comments":"https://www.reddit.com/r/programming/comments/991loy/idempotence_what_is_it_and_why_should_i_care/","updated_at":"2018-08-21T09:05:55+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/991loy/idempotence_what_is_it_and_why_should_i_care/","link_host":"reddit.com","from":"reddit"},{"title":"Set of 24 Dotted Map Country","description":"####Hey,\n\n I've worked on a Dotted Map of France for my [Daily UI Challenge](https://dribbble.com/jacquelinclem).\n\nMaybe some of you would love to use this kind of map, so I've created a set of 24 differents country in the same effect. \n\nYou can easily change the color of the dots on each map.\n\n![Set of 24 Dotted Map Country](https://www.sketchappsources.com/resources/source-image/dotted-country-maps-jacquelinclem.jpg)\n\n[Here is a link](https://jacquelinclement.com/ressources/24-pays-carte-en-points?source=designernews) from my website or you can find it on [SketchAppSource](https://www.sketchappsources.com/free-source/3515-dotted-countries-maps-sketch-freebie-resource.html) too.\n\n---\n\nFeedback or suggestions for new country is greatly appreciated !","link":"https://www.designernews.co/stories/96746-set-of-24-dotted-map-country","comments":"https://www.designernews.co/stories/96746-set-of-24-dotted-map-country","updated_at":"2018-08-21T09:00:19+00:00","link_to_comments":"https://www.designernews.co/stories/96746-set-of-24-dotted-map-country","link_host":null,"from":"designernews"},{"title":"Adding a pipe operator to Python","link":"https://www.reddit.com/r/programming/comments/991kep/adding_a_pipe_operator_to_python/","comments":"https://www.reddit.com/r/programming/comments/991kep/adding_a_pipe_operator_to_python/","updated_at":"2018-08-21T08:59:06+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/991kep/adding_a_pipe_operator_to_python/","link_host":"reddit.com","from":"reddit"},{"title":"Behind the Scenes in Digital Product Development: Part Two","description":"https://perspective.despark.com/be-the-annoying-kid-in-the-room-a9031800e447","link":"https://www.designernews.co/stories/96742-behind-the-scenes-in-digital-product-development-part-two","comments":"https://www.designernews.co/stories/96742-behind-the-scenes-in-digital-product-development-part-two","updated_at":"2018-08-21T08:55:46+00:00","link_to_comments":"https://www.designernews.co/stories/96742-behind-the-scenes-in-digital-product-development-part-two","link_host":"perspective.despark.com","from":"designernews"},{"title":"Microsoft Detects More Russian Cyber Attacks Ahead of Mid-Term Election","description":"Microsoft claims to have uncovered another new Russian hacking attempts targeting United States' Senate and conservative think tanks ahead of the 2018 midterm elections.\n\nThe tech giant said Tuesday that the APT28 hacking group—also known as Strontium, Fancy Bear, Sofacy, Sednit, and Pawn Storm, which is believed to be tied to the Russian government—created at least six fake websites related<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=4-dz6ISWm2E:Yg61c6sqyBg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/4-dz6ISWm2E" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/4-dz6ISWm2E/russia-election-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/4-dz6ISWm2E/russia-election-hacking.html","updated_at":"2018-08-21T08:29:16+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/4-dz6ISWm2E/russia-election-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"The importance of branding in a startup world. And how we've launched our MVP.","description":"![](https://storychief.io/images/tild6166-6634-4536-b561-653333383964__storychiefpipe1qfvs7.gif)\n\nSo here is a short story. It's 2016, we had an idea based on the pain we've seen our clients struggle with on a daily basis. Their SEO flows for articles and multichannel publishing was a mess. We were running our branding & digital agency back then. \n\nThree people, different backgrounds, same target. What do we start with? Logo! That's right, we knew a bit what we were going to make, we knew a little bit less about how we were going to make it, but we knew for sure that we needed a kickass logo and UX for our new tool! Design first approach, as we call it.\n\nTook us 3 months to brainstorm about the MVP and to find a great NAME, and then we started designing. After 6 months of redesigning, brainstorming and testing the MVP we had our branding, one-pager with 'early subscription' form, and we knew how we would program our software. But we didn't write any code yet.\n\nWe launched our story in a local blogging community. And it was huge, I remember we had a slack notification for each lead coming in and in the first half hour it was constantly making noise :)) We gathered 700 leads within two hours. \n\nStrangely enough, the most comments were related to the branding of the app. Folks loved our concept and logo. \n\nNow two years later our tool has grown a lot and it's a full-time job with 10 people in the company. \n\n![StoryChief.com](https://storychief.io/images/tild3135-6531-4734-b838-333430353733__storychief_logo.gif)\n\nToday we are on [Product Hunt](https://www.producthunt.com/posts/seo-tool-by-storychief) by the way.\n\nSo start with well-designed branding folks! \n\nCheers\nValeri, co-founder @ [StoryChief.io](https://storychief.io)","link":"https://www.designernews.co/stories/96740-the-importance-of-branding-in-a-startup-world-and-how-weve-launched-our-mvp","comments":"https://www.designernews.co/stories/96740-the-importance-of-branding-in-a-startup-world-and-how-weve-launched-our-mvp","updated_at":"2018-08-21T08:01:38+00:00","link_to_comments":"https://www.designernews.co/stories/96740-the-importance-of-branding-in-a-startup-world-and-how-weve-launched-our-mvp","link_host":"storychief.io","from":"designernews"},{"title":"The Definitive Guide to Python import Statements","link":"https://www.reddit.com/r/programming/comments/9912pn/the_definitive_guide_to_python_import_statements/","comments":"https://www.reddit.com/r/programming/comments/9912pn/the_definitive_guide_to_python_import_statements/","updated_at":"2018-08-21T07:18:29+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/9912pn/the_definitive_guide_to_python_import_statements/","link_host":"reddit.com","from":"reddit"},{"title":"The secret behind all great copywriting","description":"https://www.felixjamestin.com/post/the-secret-to-great-copywriting","link":"https://www.designernews.co/stories/96739-the-secret-behind-all-great-copywriting","comments":"https://www.designernews.co/stories/96739-the-secret-behind-all-great-copywriting","updated_at":"2018-08-21T07:03:25+00:00","link_to_comments":"https://www.designernews.co/stories/96739-the-secret-behind-all-great-copywriting","link_host":"www.felixjamestin.com","from":"designernews"},{"title":"TxFS: Leveraging File-System Crash Consistency to Provide Transactions [pdf]","description":"<a href="https://news.ycombinator.com/item?id=17807272">Comments</a>","link":"http://www.cs.utexas.edu/%7Evijay/papers/atc18-txfs.pdf","comments":"https://news.ycombinator.com/item?id=17807272","updated_at":"2018-08-21T05:38:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17807272","link_host":"www.cs.utexas.edu","from":"hackernews"},{"title":"Chris Kelly on Designing an Award-Winning Brand for Adobe Live","description":"https://www.milanote.com/the-work/chris-kelly-on-designing-an-award-winning-brand-for-adobe","link":"https://www.designernews.co/stories/96738-chris-kelly-on-designing-an-awardwinning-brand-for-adobe-live","comments":"https://www.designernews.co/stories/96738-chris-kelly-on-designing-an-awardwinning-brand-for-adobe-live","updated_at":"2018-08-21T05:29:55+00:00","link_to_comments":"https://www.designernews.co/stories/96738-chris-kelly-on-designing-an-awardwinning-brand-for-adobe-live","link_host":"www.milanote.com","from":"designernews"},{"title":"Kenya burial site shows community spirit of herders 5,000 years ago","description":"<a href="https://news.ycombinator.com/item?id=17806957">Comments</a>","link":"https://www.theguardian.com/science/2018/aug/20/kenya-burial-site-shows-community-spirit-of-herders-5000-years-ago","comments":"https://news.ycombinator.com/item?id=17806957","updated_at":"2018-08-21T04:17:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17806957","link_host":"www.theguardian.com","from":"hackernews"},{"title":"Creationism and conspiracism share a common teleological bias","description":"<a href="https://news.ycombinator.com/item?id=17806849">Comments</a>","link":"https://www.cell.com/current-biology/fulltext/S0960-9822(18)30863-7","comments":"https://news.ycombinator.com/item?id=17806849","updated_at":"2018-08-21T03:56:18+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17806849","link_host":"www.cell.com","from":"hackernews"},{"title":"404 Page: Press Mouse > Draw Circles > Find Bonus Egg :)","description":"https://www.magicleap.com/test","link":"https://www.designernews.co/stories/96737-404-page-press-mouse--draw-circles--find-bonus-egg-","comments":"https://www.designernews.co/stories/96737-404-page-press-mouse--draw-circles--find-bonus-egg-","updated_at":"2018-08-21T02:26:38+00:00","link_to_comments":"https://www.designernews.co/stories/96737-404-page-press-mouse--draw-circles--find-bonus-egg-","link_host":"www.magicleap.com","from":"designernews"},{"title":"Docker cannot be downloaded without logging into Docker Store","link":"https://www.reddit.com/r/programming/comments/98z2g5/docker_cannot_be_downloaded_without_logging_into/","comments":"https://www.reddit.com/r/programming/comments/98z2g5/docker_cannot_be_downloaded_without_logging_into/","updated_at":"2018-08-21T02:00:44+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/98z2g5/docker_cannot_be_downloaded_without_logging_into/","link_host":"reddit.com","from":"reddit"},{"title":"A Parasitic Vine That Slowly Sucks the Life Out of Wasps","description":"<a href="https://news.ycombinator.com/item?id=17806127">Comments</a>","link":"https://www.theatlantic.com/science/archive/2018/08/parasite-vine-wasp-tumor/567823/?single_page=true","comments":"https://news.ycombinator.com/item?id=17806127","updated_at":"2018-08-21T01:45:25+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17806127","link_host":"www.theatlantic.com","from":"hackernews"},{"title":"Heard At Work","description":"https://www.heardatwork.co","link":"https://www.designernews.co/stories/96736-heard-at-work","comments":"https://www.designernews.co/stories/96736-heard-at-work","updated_at":"2018-08-21T01:45:09+00:00","link_to_comments":"https://www.designernews.co/stories/96736-heard-at-work","link_host":"www.heardatwork.co","from":"designernews"},{"title":"Just Read the Book Already","description":"<a href="https://news.ycombinator.com/item?id=17803873">Comments</a>","link":"https://slate.com/culture/2018/08/reader-come-home-by-maryanne-wolf-reviewed.html","comments":"https://news.ycombinator.com/item?id=17803873","updated_at":"2018-08-20T20:55:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17803873","link_host":"slate.com","from":"hackernews"},{"title":"Figma For Beginners - A Free Bite Sized Design Course","description":"https://www.figmaforbeginners.com/","link":"https://www.designernews.co/stories/96735-figma-for-beginners--a-free-bite-sized-design-course","comments":"https://www.designernews.co/stories/96735-figma-for-beginners--a-free-bite-sized-design-course","updated_at":"2018-08-20T20:09:13+00:00","link_to_comments":"https://www.designernews.co/stories/96735-figma-for-beginners--a-free-bite-sized-design-course","link_host":"www.figmaforbeginners.com","from":"designernews"},{"title":"Paul Rand large collection of pieces being auctioned off","description":"https://www.wright20.com/auctions/2018/09/paul-rand-the-art-of-design","link":"https://www.designernews.co/stories/96734-paul-rand-large-collection-of-pieces-being-auctioned-off","comments":"https://www.designernews.co/stories/96734-paul-rand-large-collection-of-pieces-being-auctioned-off","updated_at":"2018-08-20T20:02:42+00:00","link_to_comments":"https://www.designernews.co/stories/96734-paul-rand-large-collection-of-pieces-being-auctioned-off","link_host":"www.wright20.com","from":"designernews"},{"title":"Bing.com runs on .NET Core 2.1!","link":"https://www.reddit.com/r/programming/comments/98veqr/bingcom_runs_on_net_core_21/","comments":"https://www.reddit.com/r/programming/comments/98veqr/bingcom_runs_on_net_core_21/","updated_at":"2018-08-20T17:07:00+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/98veqr/bingcom_runs_on_net_core_21/","link_host":"reddit.com","from":"reddit"},{"title":"5 tips for styling the component layer","description":"https://alexcarpenter.me/posts/2018/08/component-css-tips/","link":"https://www.designernews.co/stories/96728-5-tips-for-styling-the-component-layer","comments":"https://www.designernews.co/stories/96728-5-tips-for-styling-the-component-layer","updated_at":"2018-08-20T16:36:11+00:00","link_to_comments":"https://www.designernews.co/stories/96728-5-tips-for-styling-the-component-layer","link_host":"alexcarpenter.me","from":"designernews"},{"title":"CSS only Roll-The-Dice game","description":"https://codepen.io/alvaromontoro/full/gjWPNW/","link":"https://www.designernews.co/stories/96725-css-only-rollthedice-game","comments":"https://www.designernews.co/stories/96725-css-only-rollthedice-game","updated_at":"2018-08-20T15:16:42+00:00","link_to_comments":"https://www.designernews.co/stories/96725-css-only-rollthedice-game","link_host":"codepen.io","from":"designernews"},{"title":"What Did Ada Lovelace's Program Actually Do?","link":"https://www.reddit.com/r/programming/comments/98tnga/what_did_ada_lovelaces_program_actually_do/","comments":"https://www.reddit.com/r/programming/comments/98tnga/what_did_ada_lovelaces_program_actually_do/","updated_at":"2018-08-20T13:38:51+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/98tnga/what_did_ada_lovelaces_program_actually_do/","link_host":"reddit.com","from":"reddit"},{"title":"100+ Free Design Resources","description":"Hey friends, I wanted to share a side project I have been working on over the past few months.\n\nhttp://www.designnotes.co/\n\nDesign notes is a free online resource library for UX/UI/Product Designers.\n\nWith over 100 curated resources, Design notes saves creatives time when learning to design for mobile and web.\n\n Feedback or suggestions for new resources is greatly appreciated!","link":"https://www.designernews.co/stories/96712-100-free-design-resources","comments":"https://www.designernews.co/stories/96712-100-free-design-resources","updated_at":"2018-08-20T07:11:18+00:00","link_to_comments":"https://www.designernews.co/stories/96712-100-free-design-resources","link_host":"www.designnotes.co","from":"designernews"},{"title":"The Art and Science of Being on Hold","description":"<a href="https://news.ycombinator.com/item?id=17798195">Comments</a>","link":"http://www.bbc.com/capital/story/20180817-the-art-and-science-of-being-on-hold","comments":"https://news.ycombinator.com/item?id=17798195","updated_at":"2018-08-20T07:08:25+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17798195","link_host":"www.bbc.com","from":"hackernews"},{"title":"Greek island to run on wind, solar power","description":"<a href="https://news.ycombinator.com/item?id=17795411">Comments</a>","link":"https://techxplore.com/news/2018-08-renewable-resort-greek-island-solar.html","comments":"https://news.ycombinator.com/item?id=17795411","updated_at":"2018-08-19T18:01:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17795411","link_host":"techxplore.com","from":"hackernews"},{"title":"16-Year-Old Teen Hacked Apple Servers, Stole 90GB of Secure Files","description":"Well, there's something quite embarrassing for Apple fans.\n\nThough Apple servers are widely believed to be unhackable, a 16-year-old high school student proved that nothing is impossible.\n\nThe teenager from Melbourne, Australia, managed to break into Apple servers and downloaded some 90GB of secure files, including extremely secure authorized keys used to grant login access to users, as well as<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=A0_E2pJX-Ic:io3Tjeelta4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/A0_E2pJX-Ic" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/A0_E2pJX-Ic/apple-hack-servers.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/A0_E2pJX-Ic/apple-hack-servers.html","updated_at":"2018-08-17T12:07:03+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/A0_E2pJX-Ic/apple-hack-servers.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New PHP Code Execution Attack Puts WordPress Sites at Risk","description":"Sam Thomas, a security researcher from Secarma, has discovered a new exploitation technique that could make it easier for hackers to trigger critical deserialization vulnerabilities in PHP programming language using previously low-risk considered functions.\n\nThe new technique leaves hundreds of thousands of web applications open to remote code execution attacks, including websites powered by<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=uXfmSC2iTH8:LlLzK0zCMJs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/uXfmSC2iTH8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/uXfmSC2iTH8/php-deserialization-wordpress.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/uXfmSC2iTH8/php-deserialization-wordpress.html","updated_at":"2018-08-17T09:26:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/uXfmSC2iTH8/php-deserialization-wordpress.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Chrome Bug Allowed Hackers to Find Out Everything Facebook Knows About You","description":"With the release of Chrome 68, Google prominently marks all non-HTTPS websites as 'Not Secure' on its browser to make the web a more secure place for Internet users.\n\nIf you haven't yet, there is another significant reason to immediately switch to the latest version of the Chrome web browser.\n\nRon Masas, a security researcher from Imperva, has discovered a vulnerability in web browsers that<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=2CybL25l2B8:eYopOsj4I9Y:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/2CybL25l2B8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/2CybL25l2B8/google-chrome-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2CybL25l2B8/google-chrome-vulnerability.html","updated_at":"2018-08-16T14:35:35+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2CybL25l2B8/google-chrome-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Widespread Instagram Hack Locking Users Out of Their Accounts","description":"Instagram has been hit by a widespread hacking campaign that appears to stem from Russia and have affected hundreds of users over the past week, leaving them locked out of their accounts.\n\nA growing number of Instagram users are taking to social media, including Twitter and Reddit, to report a mysterious hack which involves locking them out of their account with their email addresses changed to<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=MHB3OEMrtbE:L4brnJNJ6fk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/MHB3OEMrtbE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/MHB3OEMrtbE/hack-instagram-accounts.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/MHB3OEMrtbE/hack-instagram-accounts.html","updated_at":"2018-08-15T19:00:57+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/MHB3OEMrtbE/hack-instagram-accounts.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Email Phishers Using New Way to Bypass Microsoft Office 365 Protections","description":"Phishing works no matter how hard a company tries to protect its customers or employees.\n\nSecurity researchers have been warning of a new phishing attack that cybercriminals and email scammers are using in the wild to bypass the Advanced Threat Protection (ATP) mechanism implemented by widely used email services like Microsoft Office 365.\n\nMicrosoft Office 365 is an all-in-solution for users<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=A9o0N_ycwGM:HkDl8tDzsPs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/A9o0N_ycwGM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/A9o0N_ycwGM/microsoft-office365-phishing.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/A9o0N_ycwGM/microsoft-office365-phishing.html","updated_at":"2018-08-15T18:12:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/A9o0N_ycwGM/microsoft-office365-phishing.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Former Microsoft Engineer Gets Prison for Role in Reveton Ransomware","description":"A former Microsoft network engineer who was charged in April this year has now been sentenced to 18 months in prison after pleading guilty to money laundering in connection with the Reveton ransomware.\n\nReveton malware is old ransomware, also known as scareware or police ransomware that instead of encrypting files locks the screen of victims’ computers and displays a message purporting to come<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=6pbNTdxE7zM:2dGSXxE4nuo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/6pbNTdxE7zM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/6pbNTdxE7zM/microsoft-reveton-ransomware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/6pbNTdxE7zM/microsoft-reveton-ransomware.html","updated_at":"2018-08-15T09:28:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/6pbNTdxE7zM/microsoft-reveton-ransomware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Foreshadow Attacks — 3 New Intel CPU Side-Channel Flaws Discovered","description":"2018 has been quite a tough year for Intel.\n\nWhile the chip-maker giant is still dealing with Meltdown and Spectre processor vulnerabilities, yet another major speculative execution flaw has been revealed in Intel's Core and Xeon lines of processors that may leave users vulnerable to cyber-attacks.\n\nDubbed Foreshadow, alternatively called L1 Terminal Fault or L1TF, the new attacks include<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Khuph2YYiu0:-wREBu5dTrY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Khuph2YYiu0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Khuph2YYiu0/foreshadow-intel-processor-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Khuph2YYiu0/foreshadow-intel-processor-vulnerability.html","updated_at":"2018-08-15T07:40:22+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Khuph2YYiu0/foreshadow-intel-processor-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Intel’s SGX blown wide open by, you guessed it, a speculative execution attack","description":"Speculative execution attacks truly are the gift that keeps on giving.","link":"https://arstechnica.com/?p=1358223","comments":"https://arstechnica.com/?p=1358223","updated_at":"2018-08-14T19:18:31+00:00","link_to_comments":"https://arstechnica.com/?p=1358223","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft Releases Patches for 60 Flaws—Two Under Active Attack","description":"Get your update caps on.\n\nJust a few minutes ago Microsoft released its latest monthly Patch Tuesday update for August 2018, patching a total of 60 vulnerabilities, of which 19 are rated as critical.\n\nThe updates patch flaws in Microsoft Windows, Edge Browser, Internet Explorer, Office, ChakraCore, .NET Framework, Exchange Server, Microsoft SQL Server and Visual Studio.\n\nTwo of these<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xLgvGW3wL_w:RrpJZBj9IaU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xLgvGW3wL_w" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xLgvGW3wL_w/microsoft-patch-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xLgvGW3wL_w/microsoft-patch-updates.html","updated_at":"2018-08-14T18:36:07+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xLgvGW3wL_w/microsoft-patch-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Adobe releases important security patches for its 4 popular software","description":"Adobe has released August 2018 security patch updates for a total of 11 vulnerabilities in its products, two of which are rated as critical that affect Adobe Acrobat and Reader software.\n\nThe vulnerabilities addressed in this month updates affect Adobe Flash Player, Creative Cloud Desktop Application, Adobe Experience Manager, Adobe Acrobat and Reader applications.\n\nNone of the security<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=-r98oNFQhsw:1GIHESr718o:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-r98oNFQhsw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-r98oNFQhsw/adobe-patch-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-r98oNFQhsw/adobe-patch-updates.html","updated_at":"2018-08-14T15:20:49+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-r98oNFQhsw/adobe-patch-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"CompTIA IT Certification Training 2018 — 12 Course Bundle","description":"The Information Technology industry has witnessed exponential growth over the years, and if you want to be a part of this growing industry, it's important for you to earn certificates in this field.\n\nOrganisations always prefer employees with strong internationally-recognized professional certifications that proof your skills, knowledge, and what you know—giving you more credibility and<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=RQS0vG3LTqA:_Tut9g9mMwk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/RQS0vG3LTqA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/RQS0vG3LTqA/comtia-certification-training-videos.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RQS0vG3LTqA/comtia-certification-training-videos.html","updated_at":"2018-08-14T12:55:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RQS0vG3LTqA/comtia-certification-training-videos.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers can compromise your network just by sending a Fax","description":"What maximum a remote attacker can do just by having your Fax machine number?\n\nBelieve it or not, but your fax number is literally enough for a hacker to gain complete control over the printer and possibly infiltrate the rest of the network connected to it.\n\nCheck Point researchers have revealed details of two critical remote code execution (RCE) vulnerabilities they discovered in the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=aQPmfeNsOZ0:7e3GDYxtrLc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/aQPmfeNsOZ0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/aQPmfeNsOZ0/hack-printer-fax-machine.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/aQPmfeNsOZ0/hack-printer-fax-machine.html","updated_at":"2018-08-14T10:35:40+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/aQPmfeNsOZ0/hack-printer-fax-machine.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Man-in-the-Disk attack leaves millions of Android phones vulnerable","description":"Security researchers at Check Point Software Technologies have discovered a new attack vector against the Android operating system that could potentially allow attackers to silently infect your smartphones with malicious apps or launch denial of service attacks.\n\nDubbed Man-in-the-Disk, the attack takes advantage of the way Android apps utilize 'External Storage' system to store app-related data,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Q5BeyGjdYAY:MjSyuEIkiPI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Q5BeyGjdYAY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Q5BeyGjdYAY/man-in-the-disk-android-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Q5BeyGjdYAY/man-in-the-disk-android-hack.html","updated_at":"2018-08-14T08:46:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Q5BeyGjdYAY/man-in-the-disk-android-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"ex-NSA Hacker Discloses macOS High Sierra Zero-Day Vulnerability","description":"Your Mac computer running the Apple's latest High Sierra operating system can be hacked by tweaking just two lines of code, a researcher demonstrated at the Def Con security conference on Sunday.\n\nPatrick Wardle, an ex-NSA hacker and now Chief Research Officer of Digita Security, uncovered a critical zero-day vulnerability in the macOS operating system that could allow a malicious application<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=i9zWibz_2dk:7L9kvVN0rDM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/i9zWibz_2dk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/i9zWibz_2dk/macos-mouse-click-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/i9zWibz_2dk/macos-mouse-click-hack.html","updated_at":"2018-08-14T05:11:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/i9zWibz_2dk/macos-mouse-click-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Google Tracks Android, iPhone Users Even With 'Location History' Turned Off","description":"Google tracks you everywhere, even if you explicitly tell it not to.\n\nEvery time a service like Google Maps wants to use your location, Google asks your permission to allow access to your location if you want to use it for navigating, but a new investigation shows that the company does track you anyway.\n\nAn investigation by Associated Press revealed that many Google services on Android and<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=4wGIw3FzXMg:qasmvN_u73U:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/4wGIw3FzXMg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/4wGIw3FzXMg/google-mobile-location-tracking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/4wGIw3FzXMg/google-mobile-location-tracking.html","updated_at":"2018-08-13T17:37:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/4wGIw3FzXMg/google-mobile-location-tracking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Flaws in Pre-Installed Apps Expose Millions of Android Devices to Hackers","description":"Bought a new Android phone? What if I say your brand new smartphone can be hacked remotely?\n\nNearly all Android phones come with useless applications pre-installed by manufacturers or carriers, usually called bloatware, and there's nothing you can do if any of them has a backdoor built-in—even if you're careful about avoiding sketchy apps.\n\nThat's exactly what security researchers from mobile<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=jo7jt78Ih8A:TZJ1FyXM0zY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/jo7jt78Ih8A" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/jo7jt78Ih8A/android-app-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jo7jt78Ih8A/android-app-hack.html","updated_at":"2018-08-13T14:13:56+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jo7jt78Ih8A/android-app-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Windows 10 to get disposable sandboxes for dodgy apps","description":"Apps will be run in a virtual machine that's discarded after use.","link":"https://arstechnica.com/?p=1356239","comments":"https://arstechnica.com/?p=1356239","updated_at":"2018-08-09T17:08:07+00:00","link_to_comments":"https://arstechnica.com/?p=1356239","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Free Facial Recognition Tool Can Track People Across Social Media Sites","description":"Security researchers at Trustwave have released a new open-source tool that uses facial recognition technology to locate targets across numerous social media networks on a large scale.\n\nDubbed Social Mapper, the facial recognition tool automatically searches for targets across eight social media platforms, including—Facebook, Instagram, Twitter, LinkedIn, Google+, the Russian social networking<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=J41vpMEqVPs:Vm9e2GH7NLY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/J41vpMEqVPs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/J41vpMEqVPs/social-mapper-osint.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/J41vpMEqVPs/social-mapper-osint.html","updated_at":"2018-08-09T14:22:08+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/J41vpMEqVPs/social-mapper-osint.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Researchers Developed Artificial Intelligence-Powered Stealthy Malware","description":"Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attacks before they affect any organization.\n\nHowever, the same technology can also be weaponized by threat actors to power a new generation of malware that can evade even the best cyber-security defenses and infects a computer network or launch an attack only<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=TRkeI-A2Oes:D3jiWhNDlwU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/TRkeI-A2Oes" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/TRkeI-A2Oes/artificial-intelligence-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TRkeI-A2Oes/artificial-intelligence-malware.html","updated_at":"2018-08-09T14:20:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TRkeI-A2Oes/artificial-intelligence-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"WhatsApp Flaw Lets Users Modify Group Chats to Spread Fake News","description":"WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations.\n\nDiscovered by security researchers at Israeli security firm Check Point, the flaws take advantage of a loophole in WhatsApp's security<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=1uxYVRCK0ss:0_sumMAkDtk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1uxYVRCK0ss" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1uxYVRCK0ss/whatsapp-modify-chat-fake-news.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1uxYVRCK0ss/whatsapp-modify-chat-fake-news.html","updated_at":"2018-08-08T15:14:22+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1uxYVRCK0ss/whatsapp-modify-chat-fake-news.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Snapchat Hack — Hacker Leaked Snapchat Source Code On GitHub","description":"The source code of the popular social media app Snapchat was recently surfaced online after a hacker leaked and posted it on the Microsoft-owned code repository GitHub.\n\nA GitHub account under the name Khaled Alshehri with the handle i5xx, who claimed to be from Pakistan, created a GitHub repository called Source-Snapchat with a description "Source Code for SnapChat," publishing the code of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=M2xfGGxnaz4:mROEDAHSxR4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/M2xfGGxnaz4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/M2xfGGxnaz4/snapchat-hack-source-code.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/M2xfGGxnaz4/snapchat-hack-source-code.html","updated_at":"2018-08-08T10:33:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/M2xfGGxnaz4/snapchat-hack-source-code.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How to Hack WiFi Password Easily Using New Attack On WPA/WPA2","description":"Looking for how to hack WiFi password OR WiFi hacking software?\n\nWell, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers.\n\nDiscovered by the lead developer of the popular password-cracking tool Hashcat, Jens 'Atom' Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=NK4We6_uJ4c:beNhRQrWW7Q:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/NK4We6_uJ4c" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/NK4We6_uJ4c/how-to-hack-wifi-password.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/NK4We6_uJ4c/how-to-hack-wifi-password.html","updated_at":"2018-08-07T18:57:57+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/NK4We6_uJ4c/how-to-hack-wifi-password.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Facebook Open Sources Fizz — TLS 1.3 Library For Speed and Security","description":"Facebook has open sourced Fizz—a library designed to help developers implement TLS 1.3 protocol with all recommended security and performance related configurations.\n\nSince late last month, Google Chrome web browser has started marking all non-HTTPS websites as 'Not Secure' in an effort to make the web a more secure place, forcing website administrators to switch to HTTPS.\n\nTLS 1.3 is the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=73kJB-cm9lU:3DqGl8lOaTA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/73kJB-cm9lU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/73kJB-cm9lU/fizz-tls-ssl-library.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/73kJB-cm9lU/fizz-tls-ssl-library.html","updated_at":"2018-08-07T12:10:16+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/73kJB-cm9lU/fizz-tls-ssl-library.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"TSMC Chip Maker Blames WannaCry Malware for Production Halt","description":"Taiwan Semiconductor Manufacturing Company (TSMC)—the world's largest makers of semiconductors and processors—was forced to shut down several of its chip-fabrication factories over the weekend after being hit by a computer virus.\n\nNow, it turns out that the computer virus outbreak at Taiwan chipmaker was the result of a variant of WannaCry—a massive ransomware attack that wreaked havoc across<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=PqG_7YO_CTk:mewvbrl5WIM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/PqG_7YO_CTk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/PqG_7YO_CTk/tsmc-wannacry-ransomware-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PqG_7YO_CTk/tsmc-wannacry-ransomware-attack.html","updated_at":"2018-08-07T09:03:07+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PqG_7YO_CTk/tsmc-wannacry-ransomware-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Heads-up: 2FA provider Duo Security to be acquired by Cisco (ugh)","description":"Both companies insist nothing will change, but this former Cisco customer has doubts.","link":"https://arstechnica.com/?p=1352469","comments":"https://arstechnica.com/?p=1352469","updated_at":"2018-08-02T22:08:27+00:00","link_to_comments":"https://arstechnica.com/?p=1352469","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New Spectre attack enables secrets to be leaked over a network","description":"It's no longer necessary to run attacker code on the victim system.","link":"https://arstechnica.com/?p=1349267","comments":"https://arstechnica.com/?p=1349267","updated_at":"2018-07-26T21:40:36+00:00","link_to_comments":"https://arstechnica.com/?p=1349267","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft offers extended support for Windows, SQL 2008—but with a catch","description":"An extra three years of patches are being offered to in-cloud users.","link":"https://arstechnica.com/?p=1342759","comments":"https://arstechnica.com/?p=1342759","updated_at":"2018-07-12T22:06:08+00:00","link_to_comments":"https://arstechnica.com/?p=1342759","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New Spectre-like attack uses speculative execution to overflow buffers","description":"Research is continuing to find new attack vectors.","link":"https://arstechnica.com/?p=1341201","comments":"https://arstechnica.com/?p=1341201","updated_at":"2018-07-10T21:00:18+00:00","link_to_comments":"https://arstechnica.com/?p=1341201","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Hyperthreading under scrutiny with new TLBleed crypto key leak","description":"A new attack prompted OpenBSD's developers to disable hyperthreading by default.","link":"https://arstechnica.com/?p=1336327","comments":"https://arstechnica.com/?p=1336327","updated_at":"2018-06-25T22:18:00+00:00","link_to_comments":"https://arstechnica.com/?p=1336327","link_host":"arstechnica.com","from":"arssecurity"},{"title":"A host of new security enhancements is coming to iOS and macOS","description":"Coming: FaceTime encryption, protected cam access, and, possibly, USB Restricted Mode.","link":"https://arstechnica.com/?p=1320893","comments":"https://arstechnica.com/?p=1320893","updated_at":"2018-06-05T00:10:07+00:00","link_to_comments":"https://arstechnica.com/?p=1320893","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New speculative-execution vulnerability strikes AMD, ARM, and Intel","description":"Fortunately, existing fixes should provide the protection we need.","link":"https://arstechnica.com/?p=1312715","comments":"https://arstechnica.com/?p=1312715","updated_at":"2018-05-22T16:24:09+00:00","link_to_comments":"https://arstechnica.com/?p=1312715","link_host":"arstechnica.com","from":"arssecurity"},{"title":"As the Web moves toward HTTPS by default, Chrome will remove “secure” indicator","description":"The browser is changing to flag the things that are dangerous, not the ones that are safe.","link":"https://arstechnica.com/?p=1310651","comments":"https://arstechnica.com/?p=1310651","updated_at":"2018-05-17T18:46:49+00:00","link_to_comments":"https://arstechnica.com/?p=1310651","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft claims to make Chrome safer with new extension","description":"A purported Edge advantage is now available in Chrome.","link":"https://arstechnica.com/?p=1295205","comments":"https://arstechnica.com/?p=1295205","updated_at":"2018-04-18T15:12:54+00:00","link_to_comments":"https://arstechnica.com/?p=1295205","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel, Microsoft to use GPU to scan memory for malware","description":"The company is also using its processors’ performance monitoring to detect malicious code.","link":"https://arstechnica.com/?p=1294013","comments":"https://arstechnica.com/?p=1294013","updated_at":"2018-04-17T03:00:10+00:00","link_to_comments":"https://arstechnica.com/?p=1294013","link_host":"arstechnica.com","from":"arssecurity"},{"title":"AMD systems gain Spectre protection with latest Windows fixes","description":"Systems will still need updated firmware to get the latest microcode, however.","link":"https://arstechnica.com/?p=1291707","comments":"https://arstechnica.com/?p=1291707","updated_at":"2018-04-11T16:32:56+00:00","link_to_comments":"https://arstechnica.com/?p=1291707","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Practical passwordless authentication comes a step closer with WebAuthn","description":"Microsoft, Mozilla, and Google are all implementing the new standard.","link":"https://arstechnica.com/?p=1291003","comments":"https://arstechnica.com/?p=1291003","updated_at":"2018-04-10T18:48:13+00:00","link_to_comments":"https://arstechnica.com/?p=1291003","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel drops plans to develop Spectre microcode for ancient chips","description":"Company claims it's too hard, and few systems have exposure to attack.","link":"https://arstechnica.com/?p=1288023","comments":"https://arstechnica.com/?p=1288023","updated_at":"2018-04-04T17:35:04+00:00","link_to_comments":"https://arstechnica.com/?p=1288023","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google bans cryptomining Chrome extensions because they refuse to play by the rules","description":"Google continues to try to keep its browser running smoothly in spite of others’ efforts.","link":"https://arstechnica.com/?p=1287415","comments":"https://arstechnica.com/?p=1287415","updated_at":"2018-04-03T20:56:08+00:00","link_to_comments":"https://arstechnica.com/?p=1287415","link_host":"arstechnica.com","from":"arssecurity"},{"title":"As predicted, more branch prediction processor attacks are discovered","description":"New attack focuses on a different part of the branch prediction system.","link":"https://arstechnica.com/?p=1282101","comments":"https://arstechnica.com/?p=1282101","updated_at":"2018-03-26T22:15:55+00:00","link_to_comments":"https://arstechnica.com/?p=1282101","link_host":"arstechnica.com","from":"arssecurity"},{"title":"AMD promises firmware fixes for security processor bugs","description":"All bugs require administrative access to exploit.","link":"https://arstechnica.com/?p=1279147","comments":"https://arstechnica.com/?p=1279147","updated_at":"2018-03-20T22:00:09+00:00","link_to_comments":"https://arstechnica.com/?p=1279147","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel outlines plans for Meltdown and Spectre fixes, microcode for older chips","description":"Microcodes for Sandy Bridge and newer are now available.","link":"https://arstechnica.com/?p=1275921","comments":"https://arstechnica.com/?p=1275921","updated_at":"2018-03-15T18:00:16+00:00","link_to_comments":"https://arstechnica.com/?p=1275921","link_host":"arstechnica.com","from":"arssecurity"}]