[{"title":"25 years of coding, and I'm just beginning","link":"https://www.reddit.com/r/programming/comments/aii8tn/25_years_of_coding_and_im_just_beginning/","comments":"https://www.reddit.com/r/programming/comments/aii8tn/25_years_of_coding_and_im_just_beginning/","updated_at":"2019-01-22T02:44:14+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aii8tn/25_years_of_coding_and_im_just_beginning/","link_host":"reddit.com","from":"reddit"},{"title":"An Interview With The Founding Members Of The LEGO Big Data Team","link":"https://www.reddit.com/r/programming/comments/aihul9/an_interview_with_the_founding_members_of_the/","comments":"https://www.reddit.com/r/programming/comments/aihul9/an_interview_with_the_founding_members_of_the/","updated_at":"2019-01-22T01:59:17+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aihul9/an_interview_with_the_founding_members_of_the/","link_host":"reddit.com","from":"reddit"},{"title":"Make School (YC W12) Is Hiring a Head of Marketing and Admissions","description":"<a href="https://news.ycombinator.com/item?id=18965399">Comments</a>","link":"https://news.ycombinator.com/item?id=18965399","comments":"https://news.ycombinator.com/item?id=18965399","updated_at":"2019-01-22T01:58:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18965399","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"A Command Line Tool To Monitor Code Complexity In Your Python Projects","link":"https://www.reddit.com/r/programming/comments/aihsu4/a_command_line_tool_to_monitor_code_complexity_in/","comments":"https://www.reddit.com/r/programming/comments/aihsu4/a_command_line_tool_to_monitor_code_complexity_in/","updated_at":"2019-01-22T01:54:00+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aihsu4/a_command_line_tool_to_monitor_code_complexity_in/","link_host":"reddit.com","from":"reddit"},{"title":"Volume Rendering with WebGL","link":"https://www.reddit.com/r/programming/comments/aihsms/volume_rendering_with_webgl/","comments":"https://www.reddit.com/r/programming/comments/aihsms/volume_rendering_with_webgl/","updated_at":"2019-01-22T01:53:22+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aihsms/volume_rendering_with_webgl/","link_host":"reddit.com","from":"reddit"},{"title":"After the reaction to Slack, I tried to give designers a better framework to judge rebrands","description":"https://medium.com/ux-power-tools/how-to-critique-the-latest-tech-rebrand-10e1bd5f374e","link":"https://www.designernews.co/stories/100092-after-the-reaction-to-slack-i-tried-to-give-designers-a-better-framework-to-judge-rebrands","comments":"https://www.designernews.co/stories/100092-after-the-reaction-to-slack-i-tried-to-give-designers-a-better-framework-to-judge-rebrands","updated_at":"2019-01-22T01:46:38+00:00","link_to_comments":"https://www.designernews.co/stories/100092-after-the-reaction-to-slack-i-tried-to-give-designers-a-better-framework-to-judge-rebrands","link_host":"medium.com","from":"designernews"},{"title":"Why Don't People Use Formal Methods?","description":"<a href="https://news.ycombinator.com/item?id=18965274">Comments</a>","link":"https://www.hillelwayne.com/post/why-dont-people-use-formal-methods/","comments":"https://news.ycombinator.com/item?id=18965274","updated_at":"2019-01-22T01:38:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18965274","link_host":"www.hillelwayne.com","from":"hackernews"},{"title":"Why Don't People Use Formal Methods?","link":"https://www.reddit.com/r/programming/comments/aihm83/why_dont_people_use_formal_methods/","comments":"https://www.reddit.com/r/programming/comments/aihm83/why_dont_people_use_formal_methods/","updated_at":"2019-01-22T01:33:11+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aihm83/why_dont_people_use_formal_methods/","link_host":"reddit.com","from":"reddit"},{"title":"Munchery Closes Down, Effective Immediately","description":"<a href="https://news.ycombinator.com/item?id=18965197">Comments</a>","link":"https://news.ycombinator.com/item?id=18965197","comments":"https://news.ycombinator.com/item?id=18965197","updated_at":"2019-01-22T01:20:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18965197","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Turns out the science saying screen time is bad isn’t science","description":"<a href="https://news.ycombinator.com/item?id=18964978">Comments</a>","link":"https://techcrunch.com/2019/01/14/turns-out-the-science-saying-screen-time-is-bad-isnt-science/","comments":"https://news.ycombinator.com/item?id=18964978","updated_at":"2019-01-22T00:35:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964978","link_host":"techcrunch.com","from":"hackernews"},{"title":"A command-line installer for Windows","description":"<a href="https://news.ycombinator.com/item?id=18964961">Comments</a>","link":"https://scoop.sh/","comments":"https://news.ycombinator.com/item?id=18964961","updated_at":"2019-01-22T00:32:08+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964961","link_host":"scoop.sh","from":"hackernews"},{"title":"Advanced Mac Substitute: API-level reimplementation of classic Mac OS","link":"https://www.reddit.com/r/programming/comments/aih1q9/advanced_mac_substitute_apilevel_reimplementation/","comments":"https://www.reddit.com/r/programming/comments/aih1q9/advanced_mac_substitute_apilevel_reimplementation/","updated_at":"2019-01-22T00:30:35+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aih1q9/advanced_mac_substitute_apilevel_reimplementation/","link_host":"reddit.com","from":"reddit"},{"title":"Objective-Smalltalk: now serving its own web site","description":"<a href="https://news.ycombinator.com/item?id=18964665">Comments</a>","link":"http://www.objective.st/","comments":"https://news.ycombinator.com/item?id=18964665","updated_at":"2019-01-21T23:36:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964665","link_host":"www.objective.st","from":"hackernews"},{"title":"I wrote a shell script to visualize your most used bash commands: ginh.sh","link":"https://www.reddit.com/r/programming/comments/aigdfm/i_wrote_a_shell_script_to_visualize_your_most/","comments":"https://www.reddit.com/r/programming/comments/aigdfm/i_wrote_a_shell_script_to_visualize_your_most/","updated_at":"2019-01-21T23:20:05+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aigdfm/i_wrote_a_shell_script_to_visualize_your_most/","link_host":"reddit.com","from":"reddit"},{"title":"$1.2T in risky corporate debt showing similar warning signs to subprime crisis","description":"<a href="https://news.ycombinator.com/item?id=18964470">Comments</a>","link":"https://www.latimes.com/business/la-fi-corporate-debt-risks-20190120-story.html#nws=mcnewsletter","comments":"https://news.ycombinator.com/item?id=18964470","updated_at":"2019-01-21T23:06:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964470","link_host":"www.latimes.com","from":"hackernews"},{"title":"Volume Rendering with WebGL","description":"<a href="https://news.ycombinator.com/item?id=18964404">Comments</a>","link":"https://www.willusher.io/webgl/2019/01/13/volume-rendering-with-webgl","comments":"https://news.ycombinator.com/item?id=18964404","updated_at":"2019-01-21T22:54:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964404","link_host":"www.willusher.io","from":"hackernews"},{"title":"TiDB open sources its MySQL/MariaDB compatible data migration tool","description":"<a href="https://news.ycombinator.com/item?id=18964397">Comments</a>","link":"https://github.com/pingcap/dm","comments":"https://news.ycombinator.com/item?id=18964397","updated_at":"2019-01-21T22:53:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964397","link_host":"github.com","from":"hackernews"},{"title":"Quinn 0.2.0: QUIC protocol implementation in Rust","description":"<a href="https://news.ycombinator.com/item?id=18964361">Comments</a>","link":"https://github.com/djc/quinn/releases/tag/0.2.0","comments":"https://news.ycombinator.com/item?id=18964361","updated_at":"2019-01-21T22:47:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964361","link_host":"github.com","from":"hackernews"},{"title":"Show HN: FBP editor for music/vfx with [three, tone, tensorflow].js nodes","description":"<a href="https://news.ycombinator.com/item?id=18964288">Comments</a>","link":"https://kousun12.github.io/eternal/","comments":"https://news.ycombinator.com/item?id=18964288","updated_at":"2019-01-21T22:35:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964288","link_host":"kousun12.github.io","from":"hackernews"},{"title":"How sloppy OPSEC gave researchers an inside look at the exploit industry","link":"https://www.reddit.com/r/programming/comments/aifq5t/how_sloppy_opsec_gave_researchers_an_inside_look/","comments":"https://www.reddit.com/r/programming/comments/aifq5t/how_sloppy_opsec_gave_researchers_an_inside_look/","updated_at":"2019-01-21T22:18:11+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aifq5t/how_sloppy_opsec_gave_researchers_an_inside_look/","link_host":"reddit.com","from":"reddit"},{"title":"Snagging Parking Spaces with Mask R-CNN and Python","link":"https://www.reddit.com/r/programming/comments/aifoz2/snagging_parking_spaces_with_mask_rcnn_and_python/","comments":"https://www.reddit.com/r/programming/comments/aifoz2/snagging_parking_spaces_with_mask_rcnn_and_python/","updated_at":"2019-01-21T22:14:58+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aifoz2/snagging_parking_spaces_with_mask_rcnn_and_python/","link_host":"reddit.com","from":"reddit"},{"title":"gitbatch: manage multiple git repositories. checkout v0.4 with a new design","link":"https://www.reddit.com/r/programming/comments/aifnn7/gitbatch_manage_multiple_git_repositories/","comments":"https://www.reddit.com/r/programming/comments/aifnn7/gitbatch_manage_multiple_git_repositories/","updated_at":"2019-01-21T22:11:29+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aifnn7/gitbatch_manage_multiple_git_repositories/","link_host":"reddit.com","from":"reddit"},{"title":"Binder – Turn a Git repo into a collection of interactive notebooks","description":"<a href="https://news.ycombinator.com/item?id=18964007">Comments</a>","link":"https://mybinder.org/","comments":"https://news.ycombinator.com/item?id=18964007","updated_at":"2019-01-21T22:00:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18964007","link_host":"mybinder.org","from":"hackernews"},{"title":"Greenland’s Melting Ice Nears a ‘Tipping Point’","description":"<a href="https://news.ycombinator.com/item?id=18963722">Comments</a>","link":"https://www.nytimes.com/2019/01/21/climate/greenland-ice.html","comments":"https://news.ycombinator.com/item?id=18963722","updated_at":"2019-01-21T21:19:09+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18963722","link_host":"www.nytimes.com","from":"hackernews"},{"title":"The future of TypeScript on ESLint","link":"https://www.reddit.com/r/programming/comments/aif2l3/the_future_of_typescript_on_eslint/","comments":"https://www.reddit.com/r/programming/comments/aif2l3/the_future_of_typescript_on_eslint/","updated_at":"2019-01-21T21:19:04+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aif2l3/the_future_of_typescript_on_eslint/","link_host":"reddit.com","from":"reddit"},{"title":"wdot - Online Graphviz viewer (view a .dot file located anywhere on the web)","link":"https://www.reddit.com/r/programming/comments/aiezzv/wdot_online_graphviz_viewer_view_a_dot_file/","comments":"https://www.reddit.com/r/programming/comments/aiezzv/wdot_online_graphviz_viewer_view_a_dot_file/","updated_at":"2019-01-21T21:12:35+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aiezzv/wdot_online_graphviz_viewer_view_a_dot_file/","link_host":"reddit.com","from":"reddit"},{"title":"The cloud skills shortage and the unemployed army of the certified","link":"https://www.reddit.com/r/programming/comments/aiepp9/the_cloud_skills_shortage_and_the_unemployed_army/","comments":"https://www.reddit.com/r/programming/comments/aiepp9/the_cloud_skills_shortage_and_the_unemployed_army/","updated_at":"2019-01-21T20:51:31+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aiepp9/the_cloud_skills_shortage_and_the_unemployed_army/","link_host":"reddit.com","from":"reddit"},{"title":"Why every new web app at PayPal starts with TypeScript","link":"https://www.reddit.com/r/programming/comments/aie7aj/why_every_new_web_app_at_paypal_starts_with/","comments":"https://www.reddit.com/r/programming/comments/aie7aj/why_every_new_web_app_at_paypal_starts_with/","updated_at":"2019-01-21T20:12:11+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aie7aj/why_every_new_web_app_at_paypal_starts_with/","link_host":"reddit.com","from":"reddit"},{"title":"Genode OS: A tool kit for highly secure special-purpose operating systems","link":"https://www.reddit.com/r/programming/comments/aie48r/genode_os_a_tool_kit_for_highly_secure/","comments":"https://www.reddit.com/r/programming/comments/aie48r/genode_os_a_tool_kit_for_highly_secure/","updated_at":"2019-01-21T20:05:09+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aie48r/genode_os_a_tool_kit_for_highly_secure/","link_host":"reddit.com","from":"reddit"},{"title":"Nanosecond Non bloated Asynchronous Message Logger in C","link":"https://www.reddit.com/r/programming/comments/aie2e8/nanosecond_non_bloated_asynchronous_message/","comments":"https://www.reddit.com/r/programming/comments/aie2e8/nanosecond_non_bloated_asynchronous_message/","updated_at":"2019-01-21T20:01:01+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aie2e8/nanosecond_non_bloated_asynchronous_message/","link_host":"reddit.com","from":"reddit"},{"title":"IMDB parser / IMDB API written in Java","link":"https://www.reddit.com/r/programming/comments/aidrvs/imdb_parser_imdb_api_written_in_java/","comments":"https://www.reddit.com/r/programming/comments/aidrvs/imdb_parser_imdb_api_written_in_java/","updated_at":"2019-01-21T19:34:56+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aidrvs/imdb_parser_imdb_api_written_in_java/","link_host":"reddit.com","from":"reddit"},{"title":"Genode OS: A tool kit for highly secure special-purpose operating systems","description":"<a href="https://news.ycombinator.com/item?id=18962861">Comments</a>","link":"https://genode.org/about/index","comments":"https://news.ycombinator.com/item?id=18962861","updated_at":"2019-01-21T19:30:46+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18962861","link_host":"genode.org","from":"hackernews"},{"title":"Google fined $57 million by France for lack of transparency and consent","description":"The French data protection watchdog CNIL has issued its first fine of €50 million (around $57 million) under the European Union's new General Data Protection Regulation (GDPR) law that came into force in May last year.\n\nThe fine has been levied on Google for "lack of transparency, inadequate information and lack of valid consent regarding the ads personalization," the CNIL (National Data<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=bupITfoYSVE:rwa-9poGa_8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bupITfoYSVE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bupITfoYSVE/google-privacy-gdpr-fine.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bupITfoYSVE/google-privacy-gdpr-fine.html","updated_at":"2019-01-21T18:54:34+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bupITfoYSVE/google-privacy-gdpr-fine.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"HTTP Security Check - Scan a web server for configuration problems","link":"https://www.reddit.com/r/programming/comments/aidb6w/http_security_check_scan_a_web_server_for/","comments":"https://www.reddit.com/r/programming/comments/aidb6w/http_security_check_scan_a_web_server_for/","updated_at":"2019-01-21T18:54:00+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aidb6w/http_security_check_scan_a_web_server_for/","link_host":"reddit.com","from":"reddit"},{"title":"MESG Online Hackathon 2019","link":"https://www.reddit.com/r/programming/comments/aiczn8/mesg_online_hackathon_2019/","comments":"https://www.reddit.com/r/programming/comments/aiczn8/mesg_online_hackathon_2019/","updated_at":"2019-01-21T18:24:59+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aiczn8/mesg_online_hackathon_2019/","link_host":"reddit.com","from":"reddit"},{"title":"Lessons learned building a modern, massive-scale web crawler","link":"https://www.reddit.com/r/programming/comments/aicqxv/lessons_learned_building_a_modern_massivescale/","comments":"https://www.reddit.com/r/programming/comments/aicqxv/lessons_learned_building_a_modern_massivescale/","updated_at":"2019-01-21T18:03:06+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aicqxv/lessons_learned_building_a_modern_massivescale/","link_host":"reddit.com","from":"reddit"},{"title":"Ask HN: What are must know concepts for back end development?","description":"<a href="https://news.ycombinator.com/item?id=18961793">Comments</a>","link":"https://news.ycombinator.com/item?id=18961793","comments":"https://news.ycombinator.com/item?id=18961793","updated_at":"2019-01-21T17:20:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18961793","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"New malware found using Google Drive as its command-and-control server","description":"Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious activities.\n\nCybersecurity researchers have now spotted a new malware attack campaign linked to the notorious DarkHydrus APT group that uses Google Drive as its command-and-control (<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Hok7n-hRYic:g8_fdR_4p7o:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Hok7n-hRYic" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Hok7n-hRYic/macro-malware-microsoft-office.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Hok7n-hRYic/macro-malware-microsoft-office.html","updated_at":"2019-01-21T17:04:24+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Hok7n-hRYic/macro-malware-microsoft-office.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Sponsor: Hiring a remote worker? WWR is the largest remote work community in the world, with millions of visit every month! Go Remote!","description":"https://weworkremotely.com/","link":"https://www.designernews.co/stories/100085-sponsor-hiring-a-remote-worker-wwr-is-the-largest-remote-work-community-in-the-world-with-millions-of-visit-every-month-go-remote","comments":"https://www.designernews.co/stories/100085-sponsor-hiring-a-remote-worker-wwr-is-the-largest-remote-work-community-in-the-world-with-millions-of-visit-every-month-go-remote","updated_at":"2019-01-21T17:01:16+00:00","link_to_comments":"https://www.designernews.co/stories/100085-sponsor-hiring-a-remote-worker-wwr-is-the-largest-remote-work-community-in-the-world-with-millions-of-visit-every-month-go-remote","link_host":"weworkremotely.com","from":"designernews"},{"title":"Are We in the Middle of a Programming Bubble?","description":"<a href="https://news.ycombinator.com/item?id=18961173">Comments</a>","link":"https://thinkfaster.co/2019/01/are-we-in-the-middle-of-a-giant-programming-bubble/","comments":"https://news.ycombinator.com/item?id=18961173","updated_at":"2019-01-21T15:58:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18961173","link_host":"thinkfaster.co","from":"hackernews"},{"title":"If 5G Is So Important, Why Isn’t It Secure?","description":"<a href="https://news.ycombinator.com/item?id=18960997">Comments</a>","link":"https://www.nytimes.com/2019/01/21/opinion/5g-cybersecurity-china.html","comments":"https://news.ycombinator.com/item?id=18960997","updated_at":"2019-01-21T15:34:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18960997","link_host":"www.nytimes.com","from":"hackernews"},{"title":"Semantic Versioning in Practice","link":"https://www.reddit.com/r/programming/comments/aib0jc/semantic_versioning_in_practice/","comments":"https://www.reddit.com/r/programming/comments/aib0jc/semantic_versioning_in_practice/","updated_at":"2019-01-21T15:17:40+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/aib0jc/semantic_versioning_in_practice/","link_host":"reddit.com","from":"reddit"},{"title":"Letter in Response to Jan. 17 Article in The New York Times","description":"<a href="https://news.ycombinator.com/item?id=18960718">Comments</a>","link":"https://reich.hms.harvard.edu/letter-response-jan-17-article-new-york-times","comments":"https://news.ycombinator.com/item?id=18960718","updated_at":"2019-01-21T14:51:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18960718","link_host":"reich.hms.harvard.edu","from":"hackernews"},{"title":"CNIL imposes a financial penalty of 50M euros against Google","description":"<a href="https://news.ycombinator.com/item?id=18960564">Comments</a>","link":"https://www.cnil.fr/en/cnils-restricted-committee-imposes-financial-penalty-50-million-euros-against-google-llc","comments":"https://news.ycombinator.com/item?id=18960564","updated_at":"2019-01-21T14:31:28+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18960564","link_host":"www.cnil.fr","from":"hackernews"},{"title":"Photo-Sketching: Inferring Contour Drawings from Images","description":"<a href="https://news.ycombinator.com/item?id=18960518">Comments</a>","link":"https://arxiv.org/abs/1901.00542","comments":"https://news.ycombinator.com/item?id=18960518","updated_at":"2019-01-21T14:24:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18960518","link_host":"arxiv.org","from":"hackernews"},{"title":"A Lifetime of Systems Thinking","description":"<a href="https://news.ycombinator.com/item?id=18960476">Comments</a>","link":"https://thesystemsthinker.com/a-lifetime-of-systems-thinking/","comments":"https://news.ycombinator.com/item?id=18960476","updated_at":"2019-01-21T14:18:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18960476","link_host":"thesystemsthinker.com","from":"hackernews"},{"title":"Programming Fonts - Test drive over 50 free programming fonts","description":"http://app.programmingfonts.org/","link":"https://www.designernews.co/stories/100076-programming-fonts---test-drive-over-50-free-programming-fonts","comments":"https://www.designernews.co/stories/100076-programming-fonts---test-drive-over-50-free-programming-fonts","updated_at":"2019-01-21T14:14:24+00:00","link_to_comments":"https://www.designernews.co/stories/100076-programming-fonts---test-drive-over-50-free-programming-fonts","link_host":"app.programmingfonts.org","from":"designernews"},{"title":"How McSema Handles C++ Exceptions","description":"<a href="https://news.ycombinator.com/item?id=18960178">Comments</a>","link":"https://blog.trailofbits.com/2019/01/21/how-mcsema-handles-c-exceptions/","comments":"https://news.ycombinator.com/item?id=18960178","updated_at":"2019-01-21T13:20:43+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18960178","link_host":"blog.trailofbits.com","from":"hackernews"},{"title":"Why does APT not use HTTPS?","link":"https://www.reddit.com/r/programming/comments/ai9n4k/why_does_apt_not_use_https/","comments":"https://www.reddit.com/r/programming/comments/ai9n4k/why_does_apt_not_use_https/","updated_at":"2019-01-21T12:26:14+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/ai9n4k/why_does_apt_not_use_https/","link_host":"reddit.com","from":"reddit"},{"title":"On whether changes in bedroom CO2 levels affect sleep quality","description":"<a href="https://news.ycombinator.com/item?id=18959796">Comments</a>","link":"https://www.gwern.net/zeo/CO2","comments":"https://news.ycombinator.com/item?id=18959796","updated_at":"2019-01-21T12:08:15+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18959796","link_host":"www.gwern.net","from":"hackernews"},{"title":"Intro to hacking MicroSD cards (2013)","description":"<a href="https://news.ycombinator.com/item?id=18959766">Comments</a>","link":"http://bunniestudios.com/blog/?p=3554","comments":"https://news.ycombinator.com/item?id=18959766","updated_at":"2019-01-21T12:02:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18959766","link_host":"bunniestudios.com","from":"hackernews"},{"title":"NumPy 1.16 is the last release to support Python 2.7","link":"https://www.reddit.com/r/programming/comments/ai9c9g/numpy_116_is_the_last_release_to_support_python_27/","comments":"https://www.reddit.com/r/programming/comments/ai9c9g/numpy_116_is_the_last_release_to_support_python_27/","updated_at":"2019-01-21T11:39:24+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/ai9c9g/numpy_116_is_the_last_release_to_support_python_27/","link_host":"reddit.com","from":"reddit"},{"title":"John Carmack on Inlined Code (2014)","description":"<a href="https://news.ycombinator.com/item?id=18959636">Comments</a>","link":"http://number-none.com/blow/john_carmack_on_inlined_code.html","comments":"https://news.ycombinator.com/item?id=18959636","updated_at":"2019-01-21T11:37:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18959636","link_host":"numbernone.com","from":"hackernews"},{"title":"The new design-with-code workflow with drag-and-drop on Hadronapp","description":"https://medium.com/@HadronApp/the-new-design-with-code-workflow-with-drag-and-drop-2b81ce21f077","link":"https://www.designernews.co/stories/100070-the-new-designwithcode-workflow-with-draganddrop-on-hadronapp","comments":"https://www.designernews.co/stories/100070-the-new-designwithcode-workflow-with-draganddrop-on-hadronapp","updated_at":"2019-01-21T11:00:43+00:00","link_to_comments":"https://www.designernews.co/stories/100070-the-new-designwithcode-workflow-with-draganddrop-on-hadronapp","link_host":"medium.com","from":"designernews"},{"title":"Advanced Mac Substitute: API-level reimplementation of classic Mac OS","description":"<a href="https://news.ycombinator.com/item?id=18959067">Comments</a>","link":"https://www.v68k.org/advanced-mac-substitute/","comments":"https://news.ycombinator.com/item?id=18959067","updated_at":"2019-01-21T09:43:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18959067","link_host":"www.v68k.org","from":"hackernews"},{"title":"Alleged Russian Hacker Pleads Not Guilty After Extradition to United States","description":"A Russian hacker indicted by a United States court for his involvement in online ad fraud schemes that defrauded multiple American companies out of tens of millions of dollars pleaded not guilty on Friday in a courtroom in Brooklyn, New York.\n\nAleksandr Zhukov, 38, was arrested in November last year by Bulgarian authorities after the U.S. issued an international warrant against him, and was<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=fJp0NBeCWpM:VWbEesqgZyo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/fJp0NBeCWpM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/fJp0NBeCWpM/russian-hacker-ad-fraud.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fJp0NBeCWpM/russian-hacker-ad-fraud.html","updated_at":"2019-01-21T09:42:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fJp0NBeCWpM/russian-hacker-ad-fraud.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Night of a cascading failure","description":"<a href="https://news.ycombinator.com/item?id=18958602">Comments</a>","link":"https://rachelbythebay.com/w/2019/01/20/quiet/","comments":"https://news.ycombinator.com/item?id=18958602","updated_at":"2019-01-21T08:06:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18958602","link_host":"rachelbythebay.com","from":"hackernews"},{"title":"A Program Optimization for Automatic Database Result Caching (2017) [pdf]","description":"<a href="https://news.ycombinator.com/item?id=18958574">Comments</a>","link":"http://adam.chlipala.net/papers/SqlcachePOPL17/SqlcachePOPL17.pdf","comments":"https://news.ycombinator.com/item?id=18958574","updated_at":"2019-01-21T07:58:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18958574","link_host":"adam.chlipala.net","from":"hackernews"},{"title":"Schumpeter on Strategy","description":"<a href="https://news.ycombinator.com/item?id=18958406">Comments</a>","link":"http://reactionwheel.net/2019/01/schumpeter-on-strategy.html","comments":"https://news.ycombinator.com/item?id=18958406","updated_at":"2019-01-21T07:26:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18958406","link_host":"reactionwheel.net","from":"hackernews"},{"title":"Programming Fonts","link":"https://www.reddit.com/r/programming/comments/ai7rh0/programming_fonts/","comments":"https://www.reddit.com/r/programming/comments/ai7rh0/programming_fonts/","updated_at":"2019-01-21T07:25:40+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/ai7rh0/programming_fonts/","link_host":"reddit.com","from":"reddit"},{"title":"History of Teaching Machines","description":"<a href="https://news.ycombinator.com/item?id=18957555">Comments</a>","link":"http://teachingmachin.es/timeline.html","comments":"https://news.ycombinator.com/item?id=18957555","updated_at":"2019-01-21T04:07:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18957555","link_host":"teachingmachin.es","from":"hackernews"},{"title":"Raytracing in 256 lines of bare C++","link":"https://www.reddit.com/r/programming/comments/ai1lkv/raytracing_in_256_lines_of_bare_c/","comments":"https://www.reddit.com/r/programming/comments/ai1lkv/raytracing_in_256_lines_of_bare_c/","updated_at":"2019-01-20T19:56:51+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/ai1lkv/raytracing_in_256_lines_of_bare_c/","link_host":"reddit.com","from":"reddit"},{"title":"This font you know from old pulp novels is all over new books","description":"https://www.vox.com/the-goods/2019/1/17/18185389/lydian-font-book-design-nancy-drew-against-everything","link":"https://www.designernews.co/stories/100055-this-font-you-know-from-old-pulp-novels-is-all-over-new-books","comments":"https://www.designernews.co/stories/100055-this-font-you-know-from-old-pulp-novels-is-all-over-new-books","updated_at":"2019-01-18T18:10:39+00:00","link_to_comments":"https://www.designernews.co/stories/100055-this-font-you-know-from-old-pulp-novels-is-all-over-new-books","link_host":"www.vox.com","from":"designernews"},{"title":"4k 27\" External Monitor for UI/UX","description":"Hi all,\n\nHope you all are doing great! \nI am looking for a 4k 27" external Monitor for my MacBook Pro 15". I would be very grateful if you can share your experiences with monitors and what would be best for a UI/UX Designer. \n\nBudget: Maximum 600 euro.\n\nThanks you!","link":"https://www.designernews.co/stories/100053-4k-27-external-monitor-for-uiux","comments":"https://www.designernews.co/stories/100053-4k-27-external-monitor-for-uiux","updated_at":"2019-01-18T17:57:54+00:00","link_to_comments":"https://www.designernews.co/stories/100053-4k-27-external-monitor-for-uiux","link_host":null,"from":"designernews"},{"title":"New Android Malware Apps Use Motion Sensor to Evade Detection","description":"Even after so many efforts by Google for preventing its Play Store from malware, shady apps somehow managed to fool its anti-malware protections and get into its service to infect Android users with malware.\n\nTwo such Android apps have recently been spotted on the Google Play Store by security researchers with the Trend Micro malware research team, infecting thousands of Android users who have<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=3IT0YUf-dgc:75pQqEJ2YK8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/3IT0YUf-dgc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/3IT0YUf-dgc/android-malware-play-store.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3IT0YUf-dgc/android-malware-play-store.html","updated_at":"2019-01-18T11:37:55+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/3IT0YUf-dgc/android-malware-play-store.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Please critique my landing (it's a design tool to give feedback to developers)","description":"Hey to all Desing News community!\nI’m working on **a side-project for giving feedback on developers’ implementation**. So when you see something wrong on the implemented app, you can send comments seamlessly. \n\nWhile the product is in development, I launched a site: https://flawlessapp.io/feedback\n(I hope, I will finish the alpha in February, have something working already)\n\n**What do you think about the concept in general?**\n**What can be improved in landing design?**\nDoes it clearly explained on the landing? Any other feedback?\n\nNotes:\n\n- the copy is still in the draft stage, so please forgive “non-native copy”\n\n- the design was done by my friend, based my wireframes\n\n- I & my team run a week of user testing with the first Sketch prototype. Bases on that prototype, we defined features. \n\nThanks for the feedback ahead!","link":"https://www.designernews.co/stories/100046-please-critique-my-landing-its-a-design-tool-to-give-feedback-to-developers","comments":"https://www.designernews.co/stories/100046-please-critique-my-landing-its-a-design-tool-to-give-feedback-to-developers","updated_at":"2019-01-18T10:39:32+00:00","link_to_comments":"https://www.designernews.co/stories/100046-please-critique-my-landing-its-a-design-tool-to-give-feedback-to-developers","link_host":null,"from":"designernews"},{"title":"A Twitter Bug Left Android Users' Private Tweets Exposed For 4 Years","description":"Twitter just admitted that the social network accidentally revealed some Android users' protected tweets to the public for more than 4 years — a kind of privacy blunder that you'd typically expect from Facebook.\n\nWhen you sign up for Twitter, all your Tweets are public by default, allowing anyone to view and interact with your Tweets. Fortunately, Twitter also gives you control of your<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=iFoiPguuOWg:F4OhLwgdY5A:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/iFoiPguuOWg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/iFoiPguuOWg/twitter-privacy-settings.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/iFoiPguuOWg/twitter-privacy-settings.html","updated_at":"2019-01-18T06:49:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/iFoiPguuOWg/twitter-privacy-settings.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Windows 10 October 2018 Update is at last being pushed automatically","description":"The update is still rolling out at a snail's pace.","link":"https://arstechnica.com/?p=1442743","comments":"https://arstechnica.com/?p=1442743","updated_at":"2019-01-17T18:38:57+00:00","link_to_comments":"https://arstechnica.com/?p=1442743","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Six Figure Freelancer: Podcast on how to grow your freelance business","description":"https://www.and.co/six-figure-freelancer","link":"https://www.designernews.co/stories/100009-six-figure-freelancer-podcast-on-how-to-grow-your-freelance-business","comments":"https://www.designernews.co/stories/100009-six-figure-freelancer-podcast-on-how-to-grow-your-freelance-business","updated_at":"2019-01-17T14:59:52+00:00","link_to_comments":"https://www.designernews.co/stories/100009-six-figure-freelancer-podcast-on-how-to-grow-your-freelance-business","link_host":"www.and.co","from":"designernews"},{"title":"Breakpoints in Sketch","description":"I would like to share a Sketch plugin I've made that adds breakpoints to artboards. Instead of having separate artboards for desktop and mobile, you can have one artboard with multiple breakpoints. As well as horizontal breakpoints for web design it has vertical breakpoints which are useful for mobile apps in landscape orientation.\n\n[You can download the plugin here](https://pointbreak.protowire.com/?utm_source=designernews)\n\n![Breakpoints in Sketch](https://protowire.com/ref-images/pointbreak_designernews.gif)","link":"https://www.designernews.co/stories/100001-breakpoints-in-sketch","comments":"https://www.designernews.co/stories/100001-breakpoints-in-sketch","updated_at":"2019-01-17T10:01:00+00:00","link_to_comments":"https://www.designernews.co/stories/100001-breakpoints-in-sketch","link_host":"pointbreak.protowire.com","from":"designernews"},{"title":"Ukrainian Police Arrest 6 Hackers Linked to DDoS and Financial Attacks","description":"Ukrainian Police have this week busted out two separate groups of hackers involved in carrying out DDoS attacks against news agencies and stealing money from Ukrainian citizens, respectively.\n\nAccording to the authorities, the four suspected hackers they arrested last week, all aged from 26 to 30 years, stole more than 5 million Hryvnia (around 178,380 USD) from the bank accounts of Ukrainian<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=iD3xYp8N7OY:jZcHGaKCdwE:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/iD3xYp8N7OY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/iD3xYp8N7OY/ukrainian-cybercriminals.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/iD3xYp8N7OY/ukrainian-cybercriminals.html","updated_at":"2019-01-17T09:37:20+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/iD3xYp8N7OY/ukrainian-cybercriminals.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Unprotected Government Server Exposes Years of FBI Investigations","description":"A massive government data belonging to the Oklahoma Department of Securities (ODS) was left unsecured on a storage server for at least a week, exposing a whopping 3 terabytes of data containing millions of sensitive files.\n\nThe unsecured storage server, discovered by Greg Pollock, a researcher with cybersecurity firm UpGuard, also contained decades worth of confidential case files from the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=78XARsf3N6w:wN3TLmRQRb0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/78XARsf3N6w" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/78XARsf3N6w/oklahoma-fbi-data-leak.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/78XARsf3N6w/oklahoma-fbi-data-leak.html","updated_at":"2019-01-17T07:45:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/78XARsf3N6w/oklahoma-fbi-data-leak.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Pentagram Case Study on the Slack Rebrand","description":"https://www.pentagram.com/work/slack","link":"https://www.designernews.co/stories/99994-pentagram-case-study-on-the-slack-rebrand","comments":"https://www.designernews.co/stories/99994-pentagram-case-study-on-the-slack-rebrand","updated_at":"2019-01-16T21:53:52+00:00","link_to_comments":"https://www.designernews.co/stories/99994-pentagram-case-study-on-the-slack-rebrand","link_host":"www.pentagram.com","from":"designernews"},{"title":"Creating a 3D information kiosk in AR using Illustrator, After Effects, and Torch","description":"https://www.torch.app/blog/use-adobe-after-effects-torch-ar-build-interactive-3d-directory","link":"https://www.designernews.co/stories/99991-creating-a-3d-information-kiosk-in-ar-using-illustrator-after-effects-and-torch","comments":"https://www.designernews.co/stories/99991-creating-a-3d-information-kiosk-in-ar-using-illustrator-after-effects-and-torch","updated_at":"2019-01-16T20:24:22+00:00","link_to_comments":"https://www.designernews.co/stories/99991-creating-a-3d-information-kiosk-in-ar-using-illustrator-after-effects-and-torch","link_host":"www.torch.app","from":"designernews"},{"title":"Let‘s celebrate BAUHAUS 100 Years.","description":"Today in germany we celebrate 100 years of bauhaus. So i thought, lets‘s celebrate here together also. Let‘s collect some nice inspiration links and talk about it. Get some inspiration for 2019!\n\nLet‘s go.","link":"https://www.designernews.co/stories/99989-lets-celebrate-bauhaus-100-years","comments":"https://www.designernews.co/stories/99989-lets-celebrate-bauhaus-100-years","updated_at":"2019-01-16T19:25:27+00:00","link_to_comments":"https://www.designernews.co/stories/99989-lets-celebrate-bauhaus-100-years","link_host":null,"from":"designernews"},{"title":"Slack new logo!","description":"https://slackhq.com/say-hello-new-logo?sf97476398=1","link":"https://www.designernews.co/stories/99987-slack-new-logo","comments":"https://www.designernews.co/stories/99987-slack-new-logo","updated_at":"2019-01-16T18:48:37+00:00","link_to_comments":"https://www.designernews.co/stories/99987-slack-new-logo","link_host":"slackhq.com","from":"designernews"},{"title":"Hackers infect e-commerce sites by compromising their advertising partner","description":"Magecart strikes again, one of the most notorious hacking groups specializes in stealing credit card details from poorly-secured e-commerce websites.\n\nAccording to security researchers from RiskIQ and Trend Micro, cybercriminals of a new subgroup of Magecart, labeled as "Magecart Group 12," recently successfully compromised nearly 277 e-commerce websites by using supply-chain attacks.\n\nMagecart<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Wfy4JzaRrOo:DkIbLNAVNl8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Wfy4JzaRrOo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Wfy4JzaRrOo/magecart-hacking-credit-cards.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Wfy4JzaRrOo/magecart-hacking-credit-cards.html","updated_at":"2019-01-16T18:04:07+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Wfy4JzaRrOo/magecart-hacking-credit-cards.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Fortnite Flaws Allowed Hackers to Takeover Gamers' Accounts","description":"Check Point researchers have discovered multiple security vulnerabilities in Fortnite, a massively popular online battle game, one of which could have allowed remote attackers to completely takeover player accounts just by tricking users into clicking an unsuspectable link.\n\nThe reported Fortnite flaws include a SQL injection, cross-site scripting (XSS) bug, a web application firewall bypass<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=NP7_0g2aWPU:AqJ5oB4B70s:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/NP7_0g2aWPU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/NP7_0g2aWPU/fortnite-account-hacked.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/NP7_0g2aWPU/fortnite-account-hacked.html","updated_at":"2019-01-16T16:35:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/NP7_0g2aWPU/fortnite-account-hacked.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How do you share UI issues and bugs with your developer or development team?","description":"Whether it be just an in-person conversation, put it straight into a project tracking software like Jira, making a spreadsheet or list of some sort - what have you found works best for you and/or your team?\n\nI'm currently in the more spreadsheet/list zone as I work with remote development team, and it has its obvious flaws with effective communication. So looking for any recommendations on processes or solutions!\n\n(I realize shooting for "pixel perfect" is an arguably antiquated term and we should concentrate on the experience more so - but first cuts are rarely flawless as we're all humans doing our best.)","link":"https://www.designernews.co/stories/99981-how-do-you-share-ui-issues-and-bugs-with-your-developer-or-development-team","comments":"https://www.designernews.co/stories/99981-how-do-you-share-ui-issues-and-bugs-with-your-developer-or-development-team","updated_at":"2019-01-16T13:39:14+00:00","link_to_comments":"https://www.designernews.co/stories/99981-how-do-you-share-ui-issues-and-bugs-with-your-developer-or-development-team","link_host":null,"from":"designernews"},{"title":"Flight Booking System Flaw Affected Customers of 141 Airlines Worldwide","description":"Almost half of the fight travelers around the world were found exposed to a critical security vulnerability discovered in online flight ticket booking system that allowed remote hackers to access and modify their travel details and even claim their frequent flyer miles.\n\nIsraeli network security researcher Noam Rotem discovered the vulnerability when he booked a flight on the Israeli airline<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xAuy0KWFIao:7tTv-dWUqkQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xAuy0KWFIao" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xAuy0KWFIao/airlines-flight-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xAuy0KWFIao/airlines-flight-hacking.html","updated_at":"2019-01-16T12:56:39+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xAuy0KWFIao/airlines-flight-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Designing a mobile app to help women with self-esteem","description":"https://medium.com/ux-station/dove-designing-a-mobile-app-to-help-women-with-self-esteem-be5b1ec022d1","link":"https://www.designernews.co/stories/99975-designing-a-mobile-app-to-help-women-with-selfesteem","comments":"https://www.designernews.co/stories/99975-designing-a-mobile-app-to-help-women-with-selfesteem","updated_at":"2019-01-16T09:23:32+00:00","link_to_comments":"https://www.designernews.co/stories/99975-designing-a-mobile-app-to-help-women-with-selfesteem","link_host":"medium.com","from":"designernews"},{"title":"Unprotected VOIP Server Exposed Millions of SMS Messages, Call Logs","description":"A California-based Voice-Over-IP (VoIP) services provider VOIPO has accidentally left tens of gigabytes of its customer data, containing millions of call logs, SMS/MMS messages, and plaintext internal system credentials, publicly accessible to anyone without authentication.\n\nVOIPo is one of a leading providers of Voice-Over-IP (VoIP) services in the United States offering reseller VoIP, Cloud<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Y-KtwnE-eKg:g0U21fqxoqg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Y-KtwnE-eKg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y-KtwnE-eKg/voip-service-database-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y-KtwnE-eKg/voip-service-database-hacking.html","updated_at":"2019-01-16T09:21:28+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y-KtwnE-eKg/voip-service-database-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Practical Tips for User Journey Mapping","description":"https://phase.com/magazine/user-journey-map/","link":"https://www.designernews.co/stories/99974-practical-tips-for-user-journey-mapping","comments":"https://www.designernews.co/stories/99974-practical-tips-for-user-journey-mapping","updated_at":"2019-01-16T09:14:56+00:00","link_to_comments":"https://www.designernews.co/stories/99974-practical-tips-for-user-journey-mapping","link_host":"phase.com","from":"designernews"},{"title":"CSS Grid Experiment: A train ticket","description":"https://codepen.io/oliviale/details/MZZYyO","link":"https://www.designernews.co/stories/99973-css-grid-experiment-a-train-ticket","comments":"https://www.designernews.co/stories/99973-css-grid-experiment-a-train-ticket","updated_at":"2019-01-16T08:47:48+00:00","link_to_comments":"https://www.designernews.co/stories/99973-css-grid-experiment-a-train-ticket","link_host":"codepen.io","from":"designernews"},{"title":"5 Popular Web Hosting Services Found Vulnerable to Multiple Flaws","description":"A security researcher has discovered multiple one-click client-side vulnerabilities in the some of the world's most popular and widely-used web hosting companies that could have put millions of their customers as well as billions of their sites' visitors at risk of hacking.\n\nIndependent researcher and bug-hunter Paulos Yibelo, who shared his new research with The Hacker News, discovered roughly<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=p0GDqqrEJKU:p_q4T2nU-40:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/p0GDqqrEJKU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/p0GDqqrEJKU/web-hosting-server-security.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/p0GDqqrEJKU/web-hosting-server-security.html","updated_at":"2019-01-16T07:15:42+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/p0GDqqrEJKU/web-hosting-server-security.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Two Hackers Charged with Hacking SEC System in Stock-Trading Scheme","description":"The U.S. authorities have charged two Ukrainian hackers for hacking into the Securities and Exchange Commission's EDGAR filing system and stealing sensitive market-moving reports of companies before their public release.\n\nEDGAR, or Electronic Data Gathering, Analysis, and Retrieval, is an online filing system wherein companies submit their financial filings. The system processes around 1.7<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=bPb0qxP-eHc:cLDCbIvmFFk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bPb0qxP-eHc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bPb0qxP-eHc/sec-trading-edgar-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bPb0qxP-eHc/sec-trading-edgar-hacking.html","updated_at":"2019-01-15T19:34:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bPb0qxP-eHc/sec-trading-edgar-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Clockwise | The Calendar Assistant for Makers","description":"https://www.getclockwise.com/landing/chrome","link":"https://www.designernews.co/stories/99961-clockwise--the-calendar-assistant-for-makers","comments":"https://www.designernews.co/stories/99961-clockwise--the-calendar-assistant-for-makers","updated_at":"2019-01-15T17:22:38+00:00","link_to_comments":"https://www.designernews.co/stories/99961-clockwise--the-calendar-assistant-for-makers","link_host":"www.getclockwise.com","from":"designernews"},{"title":"Reminder: Microsoft to end support for Windows 7 in 1-year from today","description":"A new reminder for those who are still holding on to the Windows 7 operating system—you have one year left until Microsoft ends support for its 9-year-old operating system.\n\nSo it's time for you to upgrade your OS and say goodbye to Windows 7, as its five years of extended support will end on January 14, 2020—that's precisely one year from today.\n\nAfter that date, the tech giant will no longer<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=2_4jIPmbhXw:kwGWqLEUh38:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/2_4jIPmbhXw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/2_4jIPmbhXw/microsoft-windows-7-support.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2_4jIPmbhXw/microsoft-windows-7-support.html","updated_at":"2019-01-15T15:29:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2_4jIPmbhXw/microsoft-windows-7-support.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"MakeUI - The world’s first Sketch UI kit generator with themes","description":"https://makeui.design/","link":"https://www.designernews.co/stories/99955-makeui--the-worlds-first-sketch-ui-kit-generator-with-themes","comments":"https://www.designernews.co/stories/99955-makeui--the-worlds-first-sketch-ui-kit-generator-with-themes","updated_at":"2019-01-15T14:09:28+00:00","link_to_comments":"https://www.designernews.co/stories/99955-makeui--the-worlds-first-sketch-ui-kit-generator-with-themes","link_host":"makeui.design","from":"designernews"},{"title":"36-Year-Old SCP Clients' Implementation Flaws Discovered","description":"A set of 36-year-old vulnerabilities has been uncovered in the Secure Copy Protocol (SCP) implementation of many client applications that can be exploited by malicious servers to overwrite arbitrary files in the SCP client target directory unauthorizedly.\n\nSession Control Protocol (SCP), also known as secure copy, is a network protocol that allows users to securely transfer files between a<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=VBuJc-AA2is:z8SpO6Whv18:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/VBuJc-AA2is" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/VBuJc-AA2is/scp-software-vulnerabilities.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/VBuJc-AA2is/scp-software-vulnerabilities.html","updated_at":"2019-01-15T12:32:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/VBuJc-AA2is/scp-software-vulnerabilities.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How to Secure Your Mid-Size Organization From the Next Cyber Attack","description":"If you are responsible for the cybersecurity of a medium-sized company, you may assume your organization is too small to be targeted. Well, think again.\n\nWhile the major headlines tend to focus on large enterprises getting breached – such as Sony, Equifax, or Target the actual reality is that small and mid-sized companies are experiencing similar threats. \n\nAccording to Verizon’s 2018 Data<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=zDNovNjRItc:13FiGOJT4no:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/zDNovNjRItc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/zDNovNjRItc/cyber-security-webinars.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/zDNovNjRItc/cyber-security-webinars.html","updated_at":"2019-01-15T11:51:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/zDNovNjRItc/cyber-security-webinars.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Unpatched vCard Flaw Could Let Attackers Hack Your Windows PCs","description":"A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system that, under a certain scenario, could allow a remote attacker to execute arbitrary code on Windows machine.\n\nDiscovered by security researcher John Page (@hyp3rlinx), the vulnerability was reported to the Microsoft security team through Trend Micro's Zero Day Initiative (ZDI) Program over 6<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ZxsAQ321JTo:4Xrnq7C1Ug0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ZxsAQ321JTo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZxsAQ321JTo/vcard-windows-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZxsAQ321JTo/vcard-windows-hacking.html","updated_at":"2019-01-15T10:08:54+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZxsAQ321JTo/vcard-windows-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Does WhatsApp Have A Privacy Bug That Could Expose Your Messages?","description":"In-short conclusion—Whatsapp service or its 45-days deletion policy doesn't seem to have a bug. For detailed logical explanation, please read below.\n\nAn Amazon employee earlier today tweeted details about an incident that many suggest could be a sign of a huge privacy bug in the most popular end-to-end encrypted Whatsapp messaging app that could expose some of your secret messages under<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=vMnVxdnl36w:lY2BramozBU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/vMnVxdnl36w" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/vMnVxdnl36w/whatsapp-privacy-chats.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vMnVxdnl36w/whatsapp-privacy-chats.html","updated_at":"2019-01-15T09:00:48+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vMnVxdnl36w/whatsapp-privacy-chats.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Police Can't Force You To Unlock Your Phone Using Face or Fingerprint Scan","description":"Can feds force you to unlock your iPhone or Android phone?\n\n..."NO"\n\nA Northern California judge has ruled that federal authorities can't force you to unlock your smartphone using your fingerprints or other biometric features such as facial recognition—even with a warrant.\n\nThe ruling came in the case of two unspecified suspects allegedly using Facebook Messenger to threaten a man with the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=l7vFAmySQXM:BslWH6KpHMs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/l7vFAmySQXM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/l7vFAmySQXM/phone-fingerprint-unlock.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/l7vFAmySQXM/phone-fingerprint-unlock.html","updated_at":"2019-01-15T08:17:42+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/l7vFAmySQXM/phone-fingerprint-unlock.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Windows 7 enters its final year of free support","description":"Up to three years of paid support will be available after the cut-off.","link":"https://arstechnica.com/?p=1440851","comments":"https://arstechnica.com/?p=1440851","updated_at":"2019-01-14T18:50:01+00:00","link_to_comments":"https://arstechnica.com/?p=1440851","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Best web app for doing remote user testing?","description":"Hey all,\nI'm looking for a good solution for remote user testing (both moderated, and unmoderated). I tried out Lookback and had a terrible experience (lots of disconnecting, glitches in the videos, and couldn't get users into the app a couple times), so probably not going to go with that.\n\nAny suggestions on what I should use? I was considering taking a look at User Zoom for example.","link":"https://www.designernews.co/stories/99934-best-web-app-for-doing-remote-user-testing","comments":"https://www.designernews.co/stories/99934-best-web-app-for-doing-remote-user-testing","updated_at":"2019-01-14T15:51:17+00:00","link_to_comments":"https://www.designernews.co/stories/99934-best-web-app-for-doing-remote-user-testing","link_host":null,"from":"designernews"},{"title":"Postcards Introduces Transactional Email Modules","description":"https://medium.com/@designmodo/postcards-transactional-emails-c6d829ffef24","link":"https://www.designernews.co/stories/99932-postcards-introduces-transactional-email-modules","comments":"https://www.designernews.co/stories/99932-postcards-introduces-transactional-email-modules","updated_at":"2019-01-14T15:12:04+00:00","link_to_comments":"https://www.designernews.co/stories/99932-postcards-introduces-transactional-email-modules","link_host":"medium.com","from":"designernews"},{"title":"Made a small tool for generating mailto links markup","description":"https://mailtolink.me/\n\nKinda, sorta pointless but I built this for those times when your mailto links involves more than just an email address. All feedback welcome.","link":"https://www.designernews.co/stories/99927-made-a-small-tool-for-generating-mailto-links-markup","comments":"https://www.designernews.co/stories/99927-made-a-small-tool-for-generating-mailto-links-markup","updated_at":"2019-01-14T13:13:12+00:00","link_to_comments":"https://www.designernews.co/stories/99927-made-a-small-tool-for-generating-mailto-links-markup","link_host":"mailtolink.me","from":"designernews"},{"title":"Anime.js 3.0 is out now and it looks impressive!","description":"https://animejs.com/","link":"https://www.designernews.co/stories/99905-animejs-30-is-out-now-and-it-looks-impressive","comments":"https://www.designernews.co/stories/99905-animejs-30-is-out-now-and-it-looks-impressive","updated_at":"2019-01-13T14:47:43+00:00","link_to_comments":"https://www.designernews.co/stories/99905-animejs-30-is-out-now-and-it-looks-impressive","link_host":"animejs.com","from":"designernews"},{"title":"Manrope 2.0 Typeface","description":"https://www.behance.net/gallery/67424063/Manrope-Modern-Geometric-Sans-Serif-font-family(FREE)","link":"https://www.designernews.co/stories/99891-manrope-20-typeface","comments":"https://www.designernews.co/stories/99891-manrope-20-typeface","updated_at":"2019-01-11T14:40:15+00:00","link_to_comments":"https://www.designernews.co/stories/99891-manrope-20-typeface","link_host":"www.behance.net","from":"designernews"},{"title":"Guardian Interactive: The internet, but not as we know it","description":"https://www.theguardian.com/technology/ng-interactive/2019/jan/11/the-internet-but-not-as-we-know-it-life-online-in-china-russia-cuba-and-india","link":"https://www.designernews.co/stories/99890-guardian-interactive-the-internet-but-not-as-we-know-it","comments":"https://www.designernews.co/stories/99890-guardian-interactive-the-internet-but-not-as-we-know-it","updated_at":"2019-01-11T13:55:10+00:00","link_to_comments":"https://www.designernews.co/stories/99890-guardian-interactive-the-internet-but-not-as-we-know-it","link_host":"www.theguardian.com","from":"designernews"},{"title":"DDoSing Hospital Networks Landed This Hacktivist in Jail for Over 10 Years","description":"A simple DDoS attack could land you in jail for 10 years or even more.\n\nA Massachusetts man has been sentenced to over 10 years in prison for launching DDoS attacks against the computer network of two healthcare organizations in 2014 to protest the treatment of a teenager at the centers.\n\nBeyond serving 121 months in prison, Martin Gottesfeld, 34, was also ordered by U.S. District Judge<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=gvkuP_vbQfQ:4VvOSOVlVjc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/gvkuP_vbQfQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/gvkuP_vbQfQ/ddos-attack-anonymous-hacker.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/gvkuP_vbQfQ/ddos-attack-anonymous-hacker.html","updated_at":"2019-01-11T11:54:55+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/gvkuP_vbQfQ/ddos-attack-anonymous-hacker.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"PyLocky Ransomware Decryption Tool Released — Unlock Files For Free","description":"If your computer has been infected with PyLocky Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt your files—your search might end here.\n\nSecurity researcher Mike Bautista at Cisco's Talos cyber intelligence unit have released a free decryption tool that makes it possible for victims infected with the PyLocky ransomware to unlock their encrypted files<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=DzyAb8lniqg:kLZtxx4b6eA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/DzyAb8lniqg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/DzyAb8lniqg/pylocky-free-ransomware-decryption.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/DzyAb8lniqg/pylocky-free-ransomware-decryption.html","updated_at":"2019-01-11T07:11:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/DzyAb8lniqg/pylocky-free-ransomware-decryption.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Over 202 Million Chinese Job Seekers' Details Exposed On the Internet","description":"Cybersecurity researcher has discovered online a massive database containing records of more than 202 million Chinese citizens that remained accessible to anyone on the Internet without authentication until last week.\n\nThe unprotected 854.8 gigabytes of the database was stored in an instance of MongoDB, a NoSQL high performance and cross-platform document-oriented database, hosted by an<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=_tFpUcGY8HU:BtF2iyCvblY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_tFpUcGY8HU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_tFpUcGY8HU/mongodb-chinese-database.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_tFpUcGY8HU/mongodb-chinese-database.html","updated_at":"2019-01-10T15:31:28+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_tFpUcGY8HU/mongodb-chinese-database.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Systemd Privilege Escalation Flaws Affect Most Linux Distributions","description":"Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, that could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems.\n\nThe vulnerabilities, assigned as CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866, actually resides in the "systemd-journald" service<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Me5q7V1edFQ:kYIQ9Mrh5W4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Me5q7V1edFQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Me5q7V1edFQ/linux-systemd-exploit.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Me5q7V1edFQ/linux-systemd-exploit.html","updated_at":"2019-01-10T12:18:26+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Me5q7V1edFQ/linux-systemd-exploit.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Using Zero-Width Spaces to Bypass MS Office 365 Protection","description":"Security researchers have been warning about a simple technique that cybercriminals and email scammers are already being using in the wild to bypass security features of Microsoft Office 365, including Safe Links, which are originally designed to protect users from malware and phishing attacks.\n\nSafe Links has been included by Microsoft in Office 365 as part of its ATP (Advanced Threat Protection<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=-ZVuwsTbhI8:vjSuSn3V-4w:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-ZVuwsTbhI8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-ZVuwsTbhI8/phishing-zero-width-spaces.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-ZVuwsTbhI8/phishing-zero-width-spaces.html","updated_at":"2019-01-10T11:08:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-ZVuwsTbhI8/phishing-zero-width-spaces.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Google DNS Service (8.8.8.8) Now Supports DNS-over-TLS Security","description":"Almost every activity on the Internet starts with a DNS query, a key function of the Internet that works as an Internet's directory where your device looks up for the server IP addresses after you enter a human-readable web address (e.g., thehackernews.com).\n\nSince DNS queries are sent in clear text over UDP or TCP without encryption, the information can reveal not only what websites an<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=bT4zQB1whUg:zLkm2PWkjr4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bT4zQB1whUg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bT4zQB1whUg/google-dns-over-tls-security.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bT4zQB1whUg/google-dns-over-tls-security.html","updated_at":"2019-01-10T08:39:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bT4zQB1whUg/google-dns-over-tls-security.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Windows 10 build silences Cortana, brings passwordless accounts","description":"Though as ever, Home users are special.","link":"https://arstechnica.com/?p=1436113","comments":"https://arstechnica.com/?p=1436113","updated_at":"2019-01-04T21:43:40+00:00","link_to_comments":"https://arstechnica.com/?p=1436113","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Bay Area: Join us 1/9 to talk about personal data security in 2019","description":"Researcher Ashkan Soltani will discuss what happens when companies sell your data.","link":"https://arstechnica.com/?p=1435603","comments":"https://arstechnica.com/?p=1435603","updated_at":"2019-01-03T18:08:26+00:00","link_to_comments":"https://arstechnica.com/?p=1435603","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Cryptography failure leads to easy hacking for PlayStation Classic","description":"Plug-and-play hardware lacks even basic functional security for crucial bootrom.","link":"https://arstechnica.com/?p=1425895","comments":"https://arstechnica.com/?p=1425895","updated_at":"2018-12-10T17:03:44+00:00","link_to_comments":"https://arstechnica.com/?p=1425895","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Marriott breach leaves 500 million exposed with passport, card numbers stolen","description":"Motivations of hackers are unclear, but proprietary Wi-Fi may have been a target.","link":"https://arstechnica.com/?p=1420655","comments":"https://arstechnica.com/?p=1420655","updated_at":"2018-11-30T18:32:08+00:00","link_to_comments":"https://arstechnica.com/?p=1420655","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Now it’s Office’s turn to have a load of patches pulled","description":"Two patches pulled altogether; another is known to cause crashes but should be used anyway.","link":"https://arstechnica.com/?p=1415699","comments":"https://arstechnica.com/?p=1415699","updated_at":"2018-11-20T17:19:38+00:00","link_to_comments":"https://arstechnica.com/?p=1415699","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Spectre, Meltdown researchers unveil 7 more speculative execution attacks","description":"Systematic analysis reveals a range of new issues and a need for new mitigations.","link":"https://arstechnica.com/?p=1411209","comments":"https://arstechnica.com/?p=1411209","updated_at":"2018-11-14T01:50:54+00:00","link_to_comments":"https://arstechnica.com/?p=1411209","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 October 2018 Update is back, this time without deleting your data","description":"Microsoft is opening up about some of its testing procedures, too.","link":"https://arstechnica.com/?p=1410715","comments":"https://arstechnica.com/?p=1410715","updated_at":"2018-11-13T18:21:06+00:00","link_to_comments":"https://arstechnica.com/?p=1410715","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Another Windows 0-day flaw has been published on Twitter","description":"And on GitHub there's a proof-of-concept that'll render your system unbootable.","link":"https://arstechnica.com/?p=1399385","comments":"https://arstechnica.com/?p=1399385","updated_at":"2018-10-24T15:50:29+00:00","link_to_comments":"https://arstechnica.com/?p=1399385","link_host":"arstechnica.com","from":"arssecurity"},{"title":"How to make elections secure in the age of digital operatives","description":"Former Facebook CSO Alex Stamos tells us what he learned in 2016 and what comes next.","link":"https://arstechnica.com/?p=1396633","comments":"https://arstechnica.com/?p=1396633","updated_at":"2018-10-24T13:10:38+00:00","link_to_comments":"https://arstechnica.com/?p=1396633","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Meet Helm, the startup taking on Gmail with a server that runs in your home","description":"Fee-based service couples the security of a private server with the reliability of the cloud.","link":"https://arstechnica.com/?p=1395757","comments":"https://arstechnica.com/?p=1395757","updated_at":"2018-10-17T17:52:29+00:00","link_to_comments":"https://arstechnica.com/?p=1395757","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Apple, Google, Microsoft, and Mozilla come together to end TLS 1.0","description":"Almost everyone has now migrated to TLS 1.2, and a few have moved to TLS 1.3.","link":"https://arstechnica.com/?p=1395081","comments":"https://arstechnica.com/?p=1395081","updated_at":"2018-10-16T22:00:32+00:00","link_to_comments":"https://arstechnica.com/?p=1395081","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Already facing an uphill misinformation fight, Facebook loses to scammers, too","description":"Facebook's focus on misinformation is leaving an opening for another type of scam.","link":"https://arstechnica.com/?p=1394641","comments":"https://arstechnica.com/?p=1394641","updated_at":"2018-10-16T00:42:37+00:00","link_to_comments":"https://arstechnica.com/?p=1394641","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Apple to Congress: Chinese spy-chip story is “simply wrong”","description":""Our internal investigations directly contradict every consequential assertion."","link":"https://arstechnica.com/?p=1389661","comments":"https://arstechnica.com/?p=1389661","updated_at":"2018-10-08T18:25:11+00:00","link_to_comments":"https://arstechnica.com/?p=1389661","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Bloomberg: Super Micro motherboards used by Apple, Amazon contained Chinese spy chips","description":"Super Micro, Amazon, and Apple deny everything in the report.","link":"https://arstechnica.com/?p=1387815","comments":"https://arstechnica.com/?p=1387815","updated_at":"2018-10-04T16:08:56+00:00","link_to_comments":"https://arstechnica.com/?p=1387815","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google taking new steps to prevent malicious Chrome extensions","description":"Company plans stricter rules for developers and greater control for users.","link":"https://arstechnica.com/?p=1386063","comments":"https://arstechnica.com/?p=1386063","updated_at":"2018-10-02T17:10:45+00:00","link_to_comments":"https://arstechnica.com/?p=1386063","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google backtracks—a bit—on controversial Chrome sign-in feature","description":"Privacy-conscious users were unhappy at being signed in to browser without consent.","link":"https://arstechnica.com/?p=1383633","comments":"https://arstechnica.com/?p=1383633","updated_at":"2018-09-27T21:26:10+00:00","link_to_comments":"https://arstechnica.com/?p=1383633","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft offers completely passwordless authentication for online apps","description":"Phone-based authentication is the way forward instead.","link":"https://arstechnica.com/?p=1381265","comments":"https://arstechnica.com/?p=1381265","updated_at":"2018-09-24T13:00:08+00:00","link_to_comments":"https://arstechnica.com/?p=1381265","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New modification of the old cold boot attack leaves most systems vulnerable","description":"The defenses put in place to thwart the 2008 attack turn out to be very weak.","link":"https://arstechnica.com/?p=1374349","comments":"https://arstechnica.com/?p=1374349","updated_at":"2018-09-13T20:26:02+00:00","link_to_comments":"https://arstechnica.com/?p=1374349","link_host":"arstechnica.com","from":"arssecurity"}]