[{"title":"A Set of Severe Flaws Affect Popular DNSMasq DNS Forwarder","description":"Cybersecurity researchers have uncovered multiple vulnerabilities in Dnsmasq, a popular open-source software used for caching Domain Name System (DNS) responses, thereby potentially allowing an adversary to mount DNS cache poisoning attacks and remotely execute malicious code.\nThe flaws, collectively called "DNSpooq" by Israeli research firm JSOF, echoes previously disclosed weaknesses in the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Sf3J0D9m78E" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Sf3J0D9m78E/a-set-of-severe-flaws-affect-popular.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Sf3J0D9m78E/a-set-of-severe-flaws-affect-popular.html","updated_at":"2021-01-19T12:30:23+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Sf3J0D9m78E/a-set-of-severe-flaws-affect-popular.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Dashworks (YC W20) Is Hiring Our Founding Front End Engineer","description":"<a href="https://news.ycombinator.com/item?id=25832574">Comments</a>","link":"https://www.notion.so/dashworks/Join-Us-03d259fee23e469891b699edc2ab647c","comments":"https://news.ycombinator.com/item?id=25832574","updated_at":"2021-01-19T12:00:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25832574","link_host":"www.notion.so","from":"hackernews"},{"title":"New Educational Video Series for CISOs with Small Security Teams","description":"Cybersecurity is hard. For a CISO that faces the cyber threat landscape with a small security team, the challenge is compounded.\nCompared to CISOs at large enterprises, CISOs small to medium-sized enterprises (SMEs) have smaller teams with less expertise, smaller budgets for technology and outside services, and are more involved in day-to-day protection activities. \nCISOs at SMEs are<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1vy4oyuKaFo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1vy4oyuKaFo/new-educational-video-series-for-cisos.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1vy4oyuKaFo/new-educational-video-series-for-cisos.html","updated_at":"2021-01-19T11:05:29+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1vy4oyuKaFo/new-educational-video-series-for-cisos.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities","description":"An ongoing malware campaign has been found exploiting recently disclosed vulnerabilities in Linux devices to co-opt the systems into an IRC botnet for launching distributed denial-of-service (DDoS) attacks and mining Monero cryptocurrency.\nThe attacks involve a new malware variant called "FreakOut" that leverages newly patched flaws in TerraMaster, Laminas Project (formerly Zend Framework), and<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/XiqkA-hTYq4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/XiqkA-hTYq4/freakout-ongoing-botnet-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XiqkA-hTYq4/freakout-ongoing-botnet-attack.html","updated_at":"2021-01-19T11:02:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XiqkA-hTYq4/freakout-ongoing-botnet-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Is this plane landing or departing?","description":"<a href="https://news.ycombinator.com/item?id=25832054">Comments</a>","link":"https://aviation.stackexchange.com/questions/34586/is-this-plane-landing-or-departing","comments":"https://news.ycombinator.com/item?id=25832054","updated_at":"2021-01-19T10:46:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25832054","link_host":"aviation.stackexchange.com","from":"hackernews"},{"title":"Turkey imposes advertising bans on Twitter, Periscope and Pinterest","description":"<a href="https://news.ycombinator.com/item?id=25832047">Comments</a>","link":"https://www.reuters.com/article/turkey-twitter-int-idUSKBN29O0CM","comments":"https://news.ycombinator.com/item?id=25832047","updated_at":"2021-01-19T10:45:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25832047","link_host":"www.reuters.com","from":"hackernews"},{"title":"How to leave Google and why","description":"<a href="https://news.ycombinator.com/item?id=25831981">Comments</a>","link":"https://jach.me/how-to-leave-google","comments":"https://news.ycombinator.com/item?id=25831981","updated_at":"2021-01-19T10:36:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25831981","link_host":"jach.me","from":"hackernews"},{"title":"Flagpack — Stunning flag icons for your digital product","description":"https://www.producthunt.com/posts/flagpack","link":"https://www.designernews.co/stories/113146-flagpack--stunning-flag-icons-for-your-digital-product","comments":"https://www.designernews.co/stories/113146-flagpack--stunning-flag-icons-for-your-digital-product","updated_at":"2021-01-19T10:00:34+00:00","link_to_comments":"https://www.designernews.co/stories/113146-flagpack--stunning-flag-icons-for-your-digital-product","link_host":"www.producthunt.com","from":"designernews"},{"title":"Digital VT100 (1978) – Beautiful Vintage Terminal","description":"<a href="https://news.ycombinator.com/item?id=25831695">Comments</a>","link":"https://www.oldcomputr.com/digital-vt100-1978/#more-703","comments":"https://news.ycombinator.com/item?id=25831695","updated_at":"2021-01-19T09:51:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25831695","link_host":"www.oldcomputr.com","from":"hackernews"},{"title":"5 Best YouTube Gallery Plugins for WordPress","description":"https://qodeinteractive.com/magazine/best-youtube-gallery-plugins-for-wordpress/","link":"https://www.designernews.co/stories/113144-5-best-youtube-gallery-plugins-for-wordpress","comments":"https://www.designernews.co/stories/113144-5-best-youtube-gallery-plugins-for-wordpress","updated_at":"2021-01-19T09:23:23+00:00","link_to_comments":"https://www.designernews.co/stories/113144-5-best-youtube-gallery-plugins-for-wordpress","link_host":"qodeinteractive.com","from":"designernews"},{"title":"Useful design feedback","description":"https://blog.plantapp.io/post/useful-design-feedback","link":"https://www.designernews.co/stories/113142-useful-design-feedback","comments":"https://www.designernews.co/stories/113142-useful-design-feedback","updated_at":"2021-01-19T09:17:41+00:00","link_to_comments":"https://www.designernews.co/stories/113142-useful-design-feedback","link_host":"blog.plantapp.io","from":"designernews"},{"title":"Kenneth Kuttler's Free Math Books","description":"<a href="https://news.ycombinator.com/item?id=25831428">Comments</a>","link":"https://klkuttler.com/","comments":"https://news.ycombinator.com/item?id=25831428","updated_at":"2021-01-19T09:12:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25831428","link_host":"klkuttler.com","from":"hackernews"},{"title":"User power, not power users: htop and its design philosophy","description":"<a href="https://news.ycombinator.com/item?id=25831154">Comments</a>","link":"https://hisham.hm/2020/12/18/user-power-not-power-users-htop-and-its-design-philosophy/","comments":"https://news.ycombinator.com/item?id=25831154","updated_at":"2021-01-19T08:26:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25831154","link_host":"hisham.hm","from":"hackernews"},{"title":"Nature’s Electromagnetic Symphony – Whistlers","description":"<a href="https://news.ycombinator.com/item?id=25830624">Comments</a>","link":"https://aklsh.now.sh/blog/whistlers/","comments":"https://news.ycombinator.com/item?id=25830624","updated_at":"2021-01-19T06:28:56+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25830624","link_host":"aklsh.now.sh","from":"hackernews"},{"title":"How to design and create an app like Netflix","description":"https://www.webcluesinfotech.com/how-to-create-an-app-like-netflix/","link":"https://www.designernews.co/stories/113140-how-to-design-and-create-an-app-like-netflix","comments":"https://www.designernews.co/stories/113140-how-to-design-and-create-an-app-like-netflix","updated_at":"2021-01-19T05:53:55+00:00","link_to_comments":"https://www.designernews.co/stories/113140-how-to-design-and-create-an-app-like-netflix","link_host":"www.webcluesinfotech.com","from":"designernews"},{"title":"Paint.wtf","description":"<a href="https://news.ycombinator.com/item?id=25830087">Comments</a>","link":"https://paint.wtf/","comments":"https://news.ycombinator.com/item?id=25830087","updated_at":"2021-01-19T04:45:33+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25830087","link_host":"paint.wtf","from":"hackernews"},{"title":"Crossword.el – download and play crossword puzzles in Emacs","description":"<a href="https://news.ycombinator.com/item?id=25829851">Comments</a>","link":"https://github.com/Boruch-Baum/emacs-crossword","comments":"https://news.ycombinator.com/item?id=25829851","updated_at":"2021-01-19T04:00:03+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25829851","link_host":"github.com","from":"hackernews"},{"title":"Show HN: A high-performance TensorFlow library for quantitative finance","description":"<a href="https://news.ycombinator.com/item?id=25829757">Comments</a>","link":"https://github.com/google/tf-quant-finance","comments":"https://news.ycombinator.com/item?id=25829757","updated_at":"2021-01-19T03:43:08+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25829757","link_host":"github.com","from":"hackernews"},{"title":"What You Should Know Before Leaking a Zoom Meeting","description":"<a href="https://news.ycombinator.com/item?id=25829748">Comments</a>","link":"https://theintercept.com/2021/01/18/leak-zoom-meeting/","comments":"https://news.ycombinator.com/item?id=25829748","updated_at":"2021-01-19T03:41:07+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25829748","link_host":"theintercept.com","from":"hackernews"},{"title":"Full success of first-ever cubesat mission equipped with Hall-effect propulsion","description":"<a href="https://news.ycombinator.com/item?id=25829683">Comments</a>","link":"https://exotrail.com/news/2021-01-12/100-exotrail-paves-the-way-for-new-space-mobility-with-first-of-its-kind-successful-in-orbit-demonstration-mission/","comments":"https://news.ycombinator.com/item?id=25829683","updated_at":"2021-01-19T03:30:10+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25829683","link_host":"exotrail.com","from":"hackernews"},{"title":"Everything you need to know to design your own CNC router","description":"<a href="https://news.ycombinator.com/item?id=25829337">Comments</a>","link":"https://mattferraro.dev/posts/cnc-router","comments":"https://news.ycombinator.com/item?id=25829337","updated_at":"2021-01-19T02:35:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25829337","link_host":"mattferraro.dev","from":"hackernews"},{"title":"How Clarity Found Why Its Best Customers Were Buying","description":"https://solvingproduct.com/clarity-buying-triggers/","link":"https://www.designernews.co/stories/113138-how-clarity-found-why-its-best-customers-were-buying","comments":"https://www.designernews.co/stories/113138-how-clarity-found-why-its-best-customers-were-buying","updated_at":"2021-01-19T02:29:18+00:00","link_to_comments":"https://www.designernews.co/stories/113138-how-clarity-found-why-its-best-customers-were-buying","link_host":"solvingproduct.com","from":"designernews"},{"title":"Colorize","description":"<a href="https://news.ycombinator.com/item?id=25828312">Comments</a>","link":"https://alexbeals.com/projects/colorize/","comments":"https://news.ycombinator.com/item?id=25828312","updated_at":"2021-01-19T00:04:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25828312","link_host":"alexbeals.com","from":"hackernews"},{"title":"Centralisation Is a Danger to Democracy","description":"<a href="https://news.ycombinator.com/item?id=25828081">Comments</a>","link":"https://redecentralize.org/blog/2021/01/18/centralization-is-a-danger-to-democracy","comments":"https://news.ycombinator.com/item?id=25828081","updated_at":"2021-01-18T23:37:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25828081","link_host":"redecentralize.org","from":"hackernews"},{"title":"Software engineering is a learning process, working code is a side effect","description":"<a href="https://news.ycombinator.com/item?id=25827356">Comments</a>","link":"https://www.lambdabytes.io/posts/selearning/","comments":"https://news.ycombinator.com/item?id=25827356","updated_at":"2021-01-18T22:18:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25827356","link_host":"www.lambdabytes.io","from":"hackernews"},{"title":"7 Essential Tools Every Website Designer Needs (and Why)","description":"https://www.userback.io/blog/website-designer-tools","link":"https://www.designernews.co/stories/113136-7-essential-tools-every-website-designer-needs-and-why","comments":"https://www.designernews.co/stories/113136-7-essential-tools-every-website-designer-needs-and-why","updated_at":"2021-01-18T22:10:26+00:00","link_to_comments":"https://www.designernews.co/stories/113136-7-essential-tools-every-website-designer-needs-and-why","link_host":"www.userback.io","from":"designernews"},{"title":"A History of Primary Colours (2020)","description":"<a href="https://news.ycombinator.com/item?id=25827070">Comments</a>","link":"https://publicdomainreview.org/essay/primary-sources","comments":"https://news.ycombinator.com/item?id=25827070","updated_at":"2021-01-18T21:48:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25827070","link_host":"publicdomainreview.org","from":"hackernews"},{"title":"I wasted $40k on a fantastic startup idea","description":"<a href="https://news.ycombinator.com/item?id=25825917">Comments</a>","link":"https://tjcx.me/p/i-wasted-40k-on-a-fantastic-startup-idea","comments":"https://news.ycombinator.com/item?id=25825917","updated_at":"2021-01-18T20:01:15+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25825917","link_host":"tjcx.me","from":"hackernews"},{"title":"Tech companies are profiling us from before birth","description":"<a href="https://news.ycombinator.com/item?id=25825245">Comments</a>","link":"https://thereader.mitpress.mit.edu/tech-companies-are-profiling-us-from-before-birth/","comments":"https://news.ycombinator.com/item?id=25825245","updated_at":"2021-01-18T19:02:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25825245","link_host":"thereader.mitpress.mit.edu","from":"hackernews"},{"title":"Software effort estimation is mostly fake research","description":"<a href="https://news.ycombinator.com/item?id=25825244">Comments</a>","link":"http://shape-of-code.coding-guidelines.com/2021/01/17/software-effort-estimation-is-mostly-fake-research/","comments":"https://news.ycombinator.com/item?id=25825244","updated_at":"2021-01-18T19:02:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25825244","link_host":"shapeofcode.codingguidelines.com","from":"hackernews"},{"title":"TV detector vans once prowled the streets of England","description":"<a href="https://news.ycombinator.com/item?id=25823546">Comments</a>","link":"https://hackaday.com/2021/01/18/tv-detector-vans-once-prowled-the-streets-of-england/","comments":"https://news.ycombinator.com/item?id=25823546","updated_at":"2021-01-18T16:42:33+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25823546","link_host":"hackaday.com","from":"hackernews"},{"title":"UI Design Trends for 2021","description":"https://blog.boxmode.com/ui-design-trends-for-2021/","link":"https://www.designernews.co/stories/113132-ui-design-trends-for-2021","comments":"https://www.designernews.co/stories/113132-ui-design-trends-for-2021","updated_at":"2021-01-18T16:23:15+00:00","link_to_comments":"https://www.designernews.co/stories/113132-ui-design-trends-for-2021","link_host":"blog.boxmode.com","from":"designernews"},{"title":"The Xerox Principle","description":"https://toolbox.humandeluxe.com/the-xerox-principle/","link":"https://www.designernews.co/stories/113131-the-xerox-principle","comments":"https://www.designernews.co/stories/113131-the-xerox-principle","updated_at":"2021-01-18T16:09:50+00:00","link_to_comments":"https://www.designernews.co/stories/113131-the-xerox-principle","link_host":"toolbox.humandeluxe.com","from":"designernews"},{"title":"Speed techniques to help you design faster","description":"https://uxdesign.cc/speed-techniques-to-help-you-design-faster-f61f4f37bce7","link":"https://www.designernews.co/stories/113128-speed-techniques-to-help-you-design-faster","comments":"https://www.designernews.co/stories/113128-speed-techniques-to-help-you-design-faster","updated_at":"2021-01-18T15:09:02+00:00","link_to_comments":"https://www.designernews.co/stories/113128-speed-techniques-to-help-you-design-faster","link_host":"uxdesign.cc","from":"designernews"},{"title":"The Dream Job That Wasn’t","description":"<a href="https://news.ycombinator.com/item?id=25821489">Comments</a>","link":"https://newrepublic.com/article/160918/what-is-your-dream-job-doesnt-exist","comments":"https://news.ycombinator.com/item?id=25821489","updated_at":"2021-01-18T13:19:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25821489","link_host":"newrepublic.com","from":"hackernews"},{"title":"The Real Reason We Procrastinate and How to Stop","description":"https://blog.doit.io/procrastinate/","link":"https://www.designernews.co/stories/113126-the-real-reason-we-procrastinate-and-how-to-stop","comments":"https://www.designernews.co/stories/113126-the-real-reason-we-procrastinate-and-how-to-stop","updated_at":"2021-01-18T12:54:26+00:00","link_to_comments":"https://www.designernews.co/stories/113126-the-real-reason-we-procrastinate-and-how-to-stop","link_host":"blog.doit.io","from":"designernews"},{"title":"Microbes Sleeping 100M Years on the Ocean Floor Have Awakened","description":"<a href="https://news.ycombinator.com/item?id=25820979">Comments</a>","link":"https://charliestephen6.medium.com/microbes-sleeping-100-million-years-on-the-ocean-floor-have-awakened-c9b898900e36","comments":"https://news.ycombinator.com/item?id=25820979","updated_at":"2021-01-18T12:16:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25820979","link_host":"charliestephen6.medium.com","from":"hackernews"},{"title":"A Study of the “Human Flesh” Search Engine (2010) [pdf]","description":"<a href="https://news.ycombinator.com/item?id=25820966">Comments</a>","link":"http://www.u.arizona.edu/~qpzhang/paper/HFS_Computer_2010.pdf","comments":"https://news.ycombinator.com/item?id=25820966","updated_at":"2021-01-18T12:14:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25820966","link_host":"www.u.arizona.edu","from":"hackernews"},{"title":"5 female illustrators to work with in 2021","description":"https://tasteminty.com/page/2021/01/14/5-female-illustrators-to-work-with-in-2021/","link":"https://www.designernews.co/stories/113123-5-female-illustrators-to-work-with-in-2021","comments":"https://www.designernews.co/stories/113123-5-female-illustrators-to-work-with-in-2021","updated_at":"2021-01-18T11:21:53+00:00","link_to_comments":"https://www.designernews.co/stories/113123-5-female-illustrators-to-work-with-in-2021","link_host":"tasteminty.com","from":"designernews"},{"title":"Nocturnal — iOS 14 theme to match dark mode","description":"http://designessentials.co/nocturnal","link":"https://www.designernews.co/stories/113121-nocturnal--ios-14-theme-to-match-dark-mode","comments":"https://www.designernews.co/stories/113121-nocturnal--ios-14-theme-to-match-dark-mode","updated_at":"2021-01-18T11:02:05+00:00","link_to_comments":"https://www.designernews.co/stories/113121-nocturnal--ios-14-theme-to-match-dark-mode","link_host":"designessentials.co","from":"designernews"},{"title":"Non-Blocking Parallelism for Services in Go","description":"<a href="https://news.ycombinator.com/item?id=25820057">Comments</a>","link":"http://www.goldsborough.me/go/2020/12/06/12-24-24-non-blocking_parallelism_for_services_in_go/","comments":"https://news.ycombinator.com/item?id=25820057","updated_at":"2021-01-18T09:49:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25820057","link_host":"www.goldsborough.me","from":"hackernews"},{"title":"Future of Design and Creativity","description":"https://hexorial.studio/blog/the-future-of-design-and-creativity","link":"https://www.designernews.co/stories/113118-future-of-design-and-creativity","comments":"https://www.designernews.co/stories/113118-future-of-design-and-creativity","updated_at":"2021-01-18T09:16:08+00:00","link_to_comments":"https://www.designernews.co/stories/113118-future-of-design-and-creativity","link_host":"hexorial.studio","from":"designernews"},{"title":"50+ Free Illustrator Scripts","description":"https://www.designinspiration.info/free-illustrator-scripts/","link":"https://www.designernews.co/stories/113117-50-free-illustrator-scripts","comments":"https://www.designernews.co/stories/113117-50-free-illustrator-scripts","updated_at":"2021-01-18T09:13:20+00:00","link_to_comments":"https://www.designernews.co/stories/113117-50-free-illustrator-scripts","link_host":"www.designinspiration.info","from":"designernews"},{"title":"How to render JSON file (Lottie animation) in After Effects","description":"https://drawer.design/blog/how-to-render-json-file-in-adobe-after-effects/","link":"https://www.designernews.co/stories/113115-how-to-render-json-file-lottie-animation-in-after-effects","comments":"https://www.designernews.co/stories/113115-how-to-render-json-file-lottie-animation-in-after-effects","updated_at":"2021-01-18T08:34:18+00:00","link_to_comments":"https://www.designernews.co/stories/113115-how-to-render-json-file-lottie-animation-in-after-effects","link_host":"drawer.design","from":"designernews"},{"title":"An amazing ebook reader mobil app design","description":"https://www.behance.net/gallery/110927553/bookline-reader-Mobile-app","link":"https://www.designernews.co/stories/113114-an-amazing-ebook-reader-mobil-app-design","comments":"https://www.designernews.co/stories/113114-an-amazing-ebook-reader-mobil-app-design","updated_at":"2021-01-18T08:06:00+00:00","link_to_comments":"https://www.designernews.co/stories/113114-an-amazing-ebook-reader-mobil-app-design","link_host":"www.behance.net","from":"designernews"},{"title":"60 Best Free SEO Tools (Tried & Tested)","description":"https://smartseotools.org/popular-seo-tools","link":"https://www.designernews.co/stories/113109-60-best-free-seo-tools-tried--tested","comments":"https://www.designernews.co/stories/113109-60-best-free-seo-tools-tried--tested","updated_at":"2021-01-18T07:21:47+00:00","link_to_comments":"https://www.designernews.co/stories/113109-60-best-free-seo-tools-tried--tested","link_host":"smartseotools.org","from":"designernews"},{"title":"Apple Removes macOS Feature That Allowed Apps to Bypass Firewall Security","description":"Apple has removed a controversial feature from its macOS operating system that allowed the company's own first-party apps to bypass content filters, VPNs, and third-party firewalls.\nCalled "ContentFilterExclusionList," it included a list of as many as 50 Apple apps like iCloud, Maps, Music, FaceTime, HomeKit, the App Store, and its software update service that were routed through Network<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Eu6wIQHUeXw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Eu6wIQHUeXw/apple-removes-macos-feature-that.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Eu6wIQHUeXw/apple-removes-macos-feature-that.html","updated_at":"2021-01-18T06:42:40+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Eu6wIQHUeXw/apple-removes-macos-feature-that.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Researchers Disclose Undocumented Chinese Malware Used in Recent Attacks","description":"Cybersecurity researchers have disclosed a series of attacks by a threat actor of Chinese origin that has targeted organizations in Russia and Hong Kong with malware — including a previously undocumented backdoor.\nAttributing the campaign to Winnti (or APT41), Positive Technologies dated the first attack to May 12, 2020, when the APT used LNK shortcuts to extract and run the malware payload. A<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ngop7H1Rsho" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ngop7H1Rsho/researchers-disclose-undocumented.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ngop7H1Rsho/researchers-disclose-undocumented.html","updated_at":"2021-01-18T06:07:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ngop7H1Rsho/researchers-disclose-undocumented.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Reflections on a Talk Gone Wrong","description":"<a href="https://news.ycombinator.com/item?id=25818644">Comments</a>","link":"https://statmodeling.stat.columbia.edu/2021/01/15/reflections-on-a-talk-gone-wrong/","comments":"https://news.ycombinator.com/item?id=25818644","updated_at":"2021-01-18T05:55:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25818644","link_host":"statmodeling.stat.columbia.edu","from":"hackernews"},{"title":"The short, tormented life of computer genius Phil Katz (2000)","description":"<a href="https://news.ycombinator.com/item?id=25816753">Comments</a>","link":"https://web.archive.org/web/20000829071343/http://www2.jsonline.com/news/state/may00/katz21052000a.asp","comments":"https://news.ycombinator.com/item?id=25816753","updated_at":"2021-01-18T00:18:19+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25816753","link_host":"web.archive.org","from":"hackernews"},{"title":"mixtapes.work - playlists for focus and productivity","description":"http://mixtapes.work/","link":"https://www.designernews.co/stories/113105-mixtapeswork--playlists-for-focus-and-productivity","comments":"https://www.designernews.co/stories/113105-mixtapeswork--playlists-for-focus-and-productivity","updated_at":"2021-01-17T21:41:26+00:00","link_to_comments":"https://www.designernews.co/stories/113105-mixtapeswork--playlists-for-focus-and-productivity","link_host":"mixtapes.work","from":"designernews"},{"title":"Brandkey - All-in-one Brand Data API.","description":"https://brandkey.io","link":"https://www.designernews.co/stories/113101-brandkey--allinone-brand-data-api","comments":"https://www.designernews.co/stories/113101-brandkey--allinone-brand-data-api","updated_at":"2021-01-17T16:58:49+00:00","link_to_comments":"https://www.designernews.co/stories/113101-brandkey--allinone-brand-data-api","link_host":"brandkey.io","from":"designernews"},{"title":"Learning to Suffer","description":"<a href="https://news.ycombinator.com/item?id=25809846">Comments</a>","link":"https://backpackinglight.com/learning-curve-learning-to-suffer","comments":"https://news.ycombinator.com/item?id=25809846","updated_at":"2021-01-17T11:18:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25809846","link_host":"backpackinglight.com","from":"hackernews"},{"title":"Sosumi Snap – Download and Install macOS in Ubuntu","description":"<a href="https://news.ycombinator.com/item?id=25809640">Comments</a>","link":"https://github.com/popey/sosumi-snap","comments":"https://news.ycombinator.com/item?id=25809640","updated_at":"2021-01-17T10:29:28+00:00","link_to_comments":"https://news.ycombinator.com/item?id=25809640","link_host":"github.com","from":"hackernews"},{"title":"How to Complement Typography with the Right Colors.","description":"https://deesignre.com/how-to-complement-typography-with-the-right-colors/","link":"https://www.designernews.co/stories/113099-how-to-complement-typography-with-the-right-colors","comments":"https://www.designernews.co/stories/113099-how-to-complement-typography-with-the-right-colors","updated_at":"2021-01-17T09:51:09+00:00","link_to_comments":"https://www.designernews.co/stories/113099-how-to-complement-typography-with-the-right-colors","link_host":"deesignre.com","from":"designernews"},{"title":"Email shortcuts to your favorite productivity tools.","description":"https://hitsnag.com/","link":"https://www.designernews.co/stories/113098-email-shortcuts-to-your-favorite-productivity-tools","comments":"https://www.designernews.co/stories/113098-email-shortcuts-to-your-favorite-productivity-tools","updated_at":"2021-01-16T21:54:58+00:00","link_to_comments":"https://www.designernews.co/stories/113098-email-shortcuts-to-your-favorite-productivity-tools","link_host":"hitsnag.com","from":"designernews"},{"title":"NSA Suggests Enterprises Use 'Designated' DNS-over-HTTPS' Resolvers","description":"The U.S. National Security Agency (NSA) on Friday said DNS over HTTPS (DoH) — if configured appropriately in enterprise environments — can help prevent "numerous" initial access, command-and-control, and exfiltration techniques used by threat actors.\n"DNS over Hypertext Transfer Protocol over Transport Layer Security (HTTPS), often referred to as DNS over HTTPS (DoH), encrypts DNS requests by<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/fgafY9kl7l8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/fgafY9kl7l8/nsa-suggests-enterprises-use-designated.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fgafY9kl7l8/nsa-suggests-enterprises-use-designated.html","updated_at":"2021-01-16T17:11:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fgafY9kl7l8/nsa-suggests-enterprises-use-designated.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"WhatsApp Delays Controversial 'Data-Sharing' Privacy Policy Update By 3 Months","description":"WhatsApp said on Friday that it wouldn't enforce its recently announced controversial data sharing policy update until May 15.\nOriginally set to go into effect next month on February 8, the three-month delay comes following "a lot of misinformation" about a revision to its privacy policy that allows WhatsApp to share data with Facebook, sparking widespread concerns about the exact kind of<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/49MjvX1o4oM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/49MjvX1o4oM/whatsapp-delays-controversial-data.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/49MjvX1o4oM/whatsapp-delays-controversial-data.html","updated_at":"2021-01-16T17:10:04+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/49MjvX1o4oM/whatsapp-delays-controversial-data.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Check out top 10 Mobile App Development Trends in 2021","description":"https://jumpgrowth.com/mobile-app-development-trends/","link":"https://www.designernews.co/stories/113097-check-out-top-10-mobile-app-development-trends-in-2021","comments":"https://www.designernews.co/stories/113097-check-out-top-10-mobile-app-development-trends-in-2021","updated_at":"2021-01-16T16:53:45+00:00","link_to_comments":"https://www.designernews.co/stories/113097-check-out-top-10-mobile-app-development-trends-in-2021","link_host":"jumpgrowth.com","from":"designernews"},{"title":"PNGABLE is a good tool for finding high quality PNG images","description":"https://pngable.com/","link":"https://www.designernews.co/stories/113096-pngable-is-a-good-tool-for-finding-high-quality-png-images","comments":"https://www.designernews.co/stories/113096-pngable-is-a-good-tool-for-finding-high-quality-png-images","updated_at":"2021-01-16T12:46:28+00:00","link_to_comments":"https://www.designernews.co/stories/113096-pngable-is-a-good-tool-for-finding-high-quality-png-images","link_host":"pngable.com","from":"designernews"},{"title":"Joker's Stash, The Largest Carding Marketplace, Announces Shutdown","description":"Joker's Stash, the largest dark web marketplace notorious for selling compromised payment card data, has announced plans to shut down its operations on February 15, 2021.\nIn a message board post on a Russian-language underground cybercrime forum, the operator of the site — who goes by the name "JokerStash" — said "it's time for us to leave forever" and that "we will never ever open again,"<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bK1Tdt4UhWI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bK1Tdt4UhWI/jokers-stash-largest-carding.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bK1Tdt4UhWI/jokers-stash-largest-carding.html","updated_at":"2021-01-16T05:35:26+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bK1Tdt4UhWI/jokers-stash-largest-carding.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"14 recent useful design resources in January 2021","description":"https://setproduct.com/blog/top-design-resources-jan-2021","link":"https://www.designernews.co/stories/113090-14-recent-useful-design-resources-in-january-2021","comments":"https://www.designernews.co/stories/113090-14-recent-useful-design-resources-in-january-2021","updated_at":"2021-01-15T17:04:50+00:00","link_to_comments":"https://www.designernews.co/stories/113090-14-recent-useful-design-resources-in-january-2021","link_host":"setproduct.com","from":"designernews"},{"title":"Top 10 reasons why Laravel Is The Best PHP Framework","description":"https://jumpgrowth.com/laravel-best-php-framework/","link":"https://www.designernews.co/stories/113088-top-10-reasons-why-laravel-is-the-best-php-framework","comments":"https://www.designernews.co/stories/113088-top-10-reasons-why-laravel-is-the-best-php-framework","updated_at":"2021-01-15T16:38:00+00:00","link_to_comments":"https://www.designernews.co/stories/113088-top-10-reasons-why-laravel-is-the-best-php-framework","link_host":"jumpgrowth.com","from":"designernews"},{"title":"Experts Uncover Malware Attacks Against Colombian Government and Companies","description":"Cybersecurity researchers took the wraps off an ongoing surveillance campaign directed against Colombian government institutions and private companies in the energy and metallurgical industries.\nIn a report published by ESET on Tuesday, the Slovak internet security company said the attacks — dubbed "Operation Spalax" — began in 2020, with the modus operandi sharing some similarities to an APT<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_B-rCnW8Yt8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_B-rCnW8Yt8/experts-uncover-malware-attacks-against.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_B-rCnW8Yt8/experts-uncover-malware-attacks-against.html","updated_at":"2021-01-14T09:10:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_B-rCnW8Yt8/experts-uncover-malware-attacks-against.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Intel Adds Hardware-Enabled Ransomware Detection to 11th Gen vPro Chips","description":"Intel and Cybereason have partnered to build anti-ransomware defenses into the chipmaker's newly announced 11th generation Core vPro business-class processors.\nThe hardware-based security enhancements are baked into Intel's vPro platform via its Hardware Shield and Threat Detection Technology (TDT), enabling profiling and detection of ransomware and other threats that have an impact on the CPU<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/zlAYxBBZU_M" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/zlAYxBBZU_M/intel-adds-hardware-enabled-ransomware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/zlAYxBBZU_M/intel-adds-hardware-enabled-ransomware.html","updated_at":"2021-01-13T10:07:16+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/zlAYxBBZU_M/intel-adds-hardware-enabled-ransomware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Steal Mimecast Certificate Used to Securely Connect with Microsoft 365","description":"Mimecast said on Tuesday that "a sophisticated threat actor" had compromised a digital certificate it provided to certain customers to securely connect its products to Microsoft 365 (M365) Exchange.\nThe discovery was made after the breach was notified by Microsoft, the London-based company said in an alert posted on its website, adding it's reached out to the impacted organizations to remediate<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8SBSY6Y9KFE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/8SBSY6Y9KFE/hackers-steal-mimecast-certificate-used.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8SBSY6Y9KFE/hackers-steal-mimecast-certificate-used.html","updated_at":"2021-01-13T08:41:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8SBSY6Y9KFE/hackers-steal-mimecast-certificate-used.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Buyer's Guide for Securing Internal Environment with a Small Cybersecurity Team","description":"Ensuring the cybersecurity of your internal environment when you have a small security team is challenging. If you want to maintain the highest security level with a small team, your strategy has to be 'do more with less,' and with the right technology, you can leverage your team and protect your internal environment from breaches.\nThe "buyer's guide for securing the internal environment with a<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/FzkB4pB0ZYM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/FzkB4pB0ZYM/buyers-guide-for-securing-internal.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/FzkB4pB0ZYM/buyers-guide-for-securing-internal.html","updated_at":"2021-01-13T08:37:23+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/FzkB4pB0ZYM/buyers-guide-for-securing-internal.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Authorities Take Down World's Largest Illegal Dark Web Marketplace","description":"Europol on Tuesday said it shut down DarkMarket, the world's largest online marketplace for illicit goods, as part of an international operation involving Germany, Australia, Denmark, Moldova, Ukraine, the U.K.'s National Crime Agency (NCA), and the U.S. Federal Bureau of Investigation (FBI).\nAt the time of closure, DarkMarket is believed to have had 500,000 users and more than 2,400 vendors,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/gyoxN9Ipaz4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/gyoxN9Ipaz4/authorities-take-down-worlds-largest.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/gyoxN9Ipaz4/authorities-take-down-worlds-largest.html","updated_at":"2021-01-13T07:49:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/gyoxN9Ipaz4/authorities-take-down-worlds-largest.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Experts Sound Alarm On New Android Malware Sold On Hacking Forums","description":"Cybersecurity researchers have exposed the operations of an Android malware vendor who teamed up with a second threat actor to market and sell a remote access Trojan (RAT) capable of device takeover and exfiltration of photos, locations, contacts, and messages from popular apps such as Facebook, Instagram, WhatsApp, Skype, Telegram, Kik, Line, and Google Messages.\nThe vendor, who goes by the<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_mOsbV5_NvM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_mOsbV5_NvM/experts-sound-alarm-on-new-android.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_mOsbV5_NvM/experts-sound-alarm-on-new-android.html","updated_at":"2021-01-13T05:24:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_mOsbV5_NvM/experts-sound-alarm-on-new-android.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Issues Patches for Defender Zero-Day and 82 Other Windows Flaws","description":"For the first patch Tuesday of 2021, Microsoft released security updates addressing a total of 83 flaws spanning as many as 11 products and services, including an actively exploited zero-day vulnerability.\nThe latest security patches cover Microsoft Windows, Edge browser, ChakraCore, Office and Microsoft Office Services, and Web Apps, Visual Studio, Microsoft Malware Protection Engine, .NET Core<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/eEiTp6rST00" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/eEiTp6rST00/microsoft-issues-patches-for-defender.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eEiTp6rST00/microsoft-issues-patches-for-defender.html","updated_at":"2021-01-13T05:01:20+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eEiTp6rST00/microsoft-issues-patches-for-defender.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Warning — 5 New Trojanized Android Apps Spying On Users In Pakistan","description":"Cybersecurity researchers took the wraps off a new spyware operation targeting users in Pakistan that leverages trojanized versions of legitimate Android apps to carry out covert surveillance and espionage.\nDesigned to masquerade apps such as the Pakistan Citizen Portal, a Muslim prayer-clock app called Pakistan Salat Time, Mobile Packages Pakistan, Registered SIMs Checker, and TPL Insurance,<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ByMB4xwGWxg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ByMB4xwGWxg/warning-5-new-trojanized-android-apps.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ByMB4xwGWxg/warning-5-new-trojanized-android-apps.html","updated_at":"2021-01-12T14:10:14+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ByMB4xwGWxg/warning-5-new-trojanized-android-apps.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor","description":"As the investigation into the SolarWinds supply-chain attack continues, cybersecurity researchers have disclosed a third malware strain that was deployed into the build environment to inject the backdoor into the company's Orion network monitoring platform.\nCalled "Sunspot," the malignant tool adds to a growing list of previously disclosed malicious software such as Sunburst and Teardrop.\n"This<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/k_Q9om7nPpw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/k_Q9om7nPpw/unveiled-sunspot-malware-was-used-to.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/k_Q9om7nPpw/unveiled-sunspot-malware-was-used-to.html","updated_at":"2021-01-12T06:29:57+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/k_Q9om7nPpw/unveiled-sunspot-malware-was-used-to.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Researchers Find Links Between Sunburst and Russian Kazuar Malware","description":"Cybersecurity researchers, for the first time, may have found a potential connection between the backdoor used in the SolarWinds hack to a previously known malware strain.\nIn new research published by Kaspersky researchers today, the cybersecurity firm said it discovered several features that overlap with another backdoor known as Kazuar, a .NET-based malware first documented by Palo Alto<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/svCQ65KUMLQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/svCQ65KUMLQ/researchers-find-links-between-sunburst.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/svCQ65KUMLQ/researchers-find-links-between-sunburst.html","updated_at":"2021-01-12T04:36:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/svCQ65KUMLQ/researchers-find-links-between-sunburst.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Russian Hacker Gets 12-Years Prison for Massive JP Morgan Chase Hack","description":"A U.S. court on Thursday sentenced a 37-year-old Russian to 12 years in prison for perpetrating an international hacking campaign that resulted in the heist of a trove of personal information from several financial institutions, brokerage firms, financial news publishers, and other American companies.\nAndrei Tyurin was charged with computer intrusion, wire fraud, bank fraud, and illegal online<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/NSo7YtwOw20" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/NSo7YtwOw20/russian-hacker-gets-12-years-prison-for.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/NSo7YtwOw20/russian-hacker-gets-12-years-prison-for.html","updated_at":"2021-01-11T07:11:27+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/NSo7YtwOw20/russian-hacker-gets-12-years-prison-for.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"ALERT: North Korean hackers targeting South Korea with RokRat Trojan","description":"A North Korean hacking group has been found deploying the RokRat Trojan in a new spear-phishing campaign targeting the South Korean government.\nAttributing the attack to APT37 (aka Starcruft, Ricochet Chollima, or Reaper), Malwarebytes said it identified a malicious document last December that, when opened, executes a macro in memory to install the aforementioned remote access tool (RAT).\n"The<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/yF4TY5O24po" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/yF4TY5O24po/alert-north-korean-hackers-targeting.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/yF4TY5O24po/alert-north-korean-hackers-targeting.html","updated_at":"2021-01-08T20:00:16+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/yF4TY5O24po/alert-north-korean-hackers-targeting.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Attack Could Let Hackers Clone Your Google Titan 2FA Security Keys","description":"Hardware security keys—such as those from Google and Yubico—are considered the most secure means to protect accounts from phishing and takeover attacks.\nBut a new research published on Thursday demonstrates how an adversary in possession of such a two-factor authentication (2FA) device can clone it by exploiting an electromagnetic side-channel in the chip embedded in it.\nThe vulnerability (<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/tomotVjJq1k" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/tomotVjJq1k/new-attack-could-let-hackers-clone-your.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/tomotVjJq1k/new-attack-could-let-hackers-clone-your.html","updated_at":"2021-01-08T19:59:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/tomotVjJq1k/new-attack-could-let-hackers-clone-your.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"WhatsApp Will Disable Your Account If You Don't Agree Sharing Data With Facebook","description":""Respect for your privacy is coded into our DNA," opens WhatsApp's privacy policy. "Since we started WhatsApp, we've aspired to build our Services with a set of strong privacy principles in mind."\nBut come February 8, 2021, this opening statement will no longer find a place in the policy.\nThe Facebook-owned messaging service is alerting users in India of an update to its terms of service and <img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/emDwsJLO-AE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/emDwsJLO-AE/whatsapp-will-delete-your-account-if.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/emDwsJLO-AE/whatsapp-will-delete-your-account-if.html","updated_at":"2021-01-08T15:27:03+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/emDwsJLO-AE/whatsapp-will-delete-your-account-if.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How Does Your AD Password Policy Compare to NIST's Password Recommendations?","description":"End-user passwords are one of the weakest components of your overall security protocols. Most users tend to reuse passwords across work and personal accounts.\nThey may also choose relatively weak passwords that satisfy company password policies but can be easily guessed or brute-forced. Your users may also inadvertently use breached passwords for their corporate account password.\nThe National<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bG0ipFKJqfU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bG0ipFKJqfU/creating-strong-password-policy-with.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bG0ipFKJqfU/creating-strong-password-policy-with.html","updated_at":"2021-01-08T07:02:32+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bG0ipFKJqfU/creating-strong-password-policy-with.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"SolarWinds Hackers Also Accessed U.S. Justice Department's Email Server","description":"The U.S. Department of Justice on Wednesday became the latest government agency in the country to admit its internal network was compromised as part of the SolarWinds supply chain attack.\n"On December 24, 2020, the Department of Justice's Office of the Chief Information Officer (OCIO) learned of previously unknown malicious activity linked to the global SolarWinds incident that has affected<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1m_kRjA37iY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1m_kRjA37iY/solarwinds-hackers-also-accessed-us.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1m_kRjA37iY/solarwinds-hackers-also-accessed-us.html","updated_at":"2021-01-07T15:49:57+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1m_kRjA37iY/solarwinds-hackers-also-accessed-us.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Using Fake Trump's Scandal Video to Spread QNode Malware","description":"Cybesecurity researchers today revealed a new malspam campaign that distributes a remote access Trojan (RAT) by purporting to contain a sex scandal video of U.S. President Donald Trump.\nThe emails, which carry with the subject line "GOOD LOAN OFFER!!," come attached with a Java archive (JAR) file called "TRUMP_SEX_SCANDAL_VIDEO.jar," which, when downloaded, installs Qua or Quaverse RAT (QRAT)<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/GsyEkjDf4OI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/GsyEkjDf4OI/hackers-using-fake-trumps-scandal-video.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GsyEkjDf4OI/hackers-using-fake-trumps-scandal-video.html","updated_at":"2021-01-06T14:00:59+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/GsyEkjDf4OI/hackers-using-fake-trumps-scandal-video.html","link_host":"thehackernews.com","from":"thehackernews"}]