[{"title":"How YouTube’s Algorithm Really Works","description":"<a href="https://news.ycombinator.com/item?id=18448612">Comments</a>","link":"https://www.theatlantic.com/technology/archive/2018/11/how-youtubes-algorithm-really-works/575212/","comments":"https://news.ycombinator.com/item?id=18448612","updated_at":"2018-11-14T09:29:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18448612","link_host":"www.theatlantic.com","from":"hackernews"},{"title":"This family in Venice has been making velvet for popes and kings since the 1400s","description":"<a href="https://news.ycombinator.com/item?id=18448518">Comments</a>","link":"http://www.bbc.com/travel/gallery/20181113-the-last-velvet-merchant-of-venice","comments":"https://news.ycombinator.com/item?id=18448518","updated_at":"2018-11-14T09:01:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18448518","link_host":"www.bbc.com","from":"hackernews"},{"title":"We Need an FDA for Algorithms","description":"<a href="https://news.ycombinator.com/item?id=18448480">Comments</a>","link":"http://nautil.us/issue/66/clockwork/we-need-an-fda-for-algorithms","comments":"https://news.ycombinator.com/item?id=18448480","updated_at":"2018-11-14T08:50:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18448480","link_host":"nautil.us","from":"hackernews"},{"title":"Black & Dark mode for the Tink app","description":"https://www.behance.net/gallery/72547933/Tink-Dark-Black-Mode","link":"https://www.designernews.co/stories/98596-black--dark-mode-for-the-tink-app","comments":"https://www.designernews.co/stories/98596-black--dark-mode-for-the-tink-app","updated_at":"2018-11-14T08:48:22+00:00","link_to_comments":"https://www.designernews.co/stories/98596-black--dark-mode-for-the-tink-app","link_host":"www.behance.net","from":"designernews"},{"title":"Retool (YC W17) is hiring a first engineer in SF","description":"<a href="https://news.ycombinator.com/item?id=18447938">Comments</a>","link":"https://news.ycombinator.com/item?id=18447938","comments":"https://news.ycombinator.com/item?id=18447938","updated_at":"2018-11-14T06:24:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18447938","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Gods and Robots: Myths, Machines, and Ancient Dreams of Technology","description":"<a href="https://news.ycombinator.com/item?id=18447616">Comments</a>","link":"https://spectator.us/robots-ancient-greeks-loved-alexa/","comments":"https://news.ycombinator.com/item?id=18447616","updated_at":"2018-11-14T04:56:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18447616","link_host":"spectator.us","from":"hackernews"},{"title":"Chinese Tokamak reaches over 100M degrees","description":"<a href="https://news.ycombinator.com/item?id=18447589">Comments</a>","link":"http://english.hf.cas.cn/new/news/rn/201811/t20181113_201186.html","comments":"https://news.ycombinator.com/item?id=18447589","updated_at":"2018-11-14T04:51:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18447589","link_host":"english.hf.cas.cn","from":"hackernews"},{"title":"Snap Says DOJ and SEC Are Investigating IPO Disclosures","description":"<a href="https://news.ycombinator.com/item?id=18447171">Comments</a>","link":"https://www.bloomberg.com/news/articles/2018-11-14/snap-says-doj-and-sec-are-investigating-ipo-disclosures","comments":"https://news.ycombinator.com/item?id=18447171","updated_at":"2018-11-14T03:15:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18447171","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"Winds of Change: The Case for New Digital Currency","description":"<a href="https://news.ycombinator.com/item?id=18447142">Comments</a>","link":"https://www.imf.org/en/News/Articles/2018/11/13/sp111418-winds-of-change-the-case-for-new-digital-currency","comments":"https://news.ycombinator.com/item?id=18447142","updated_at":"2018-11-14T03:06:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18447142","link_host":"www.imf.org","from":"hackernews"},{"title":"Spectre, Meltdown researchers unveil 7 more speculative execution attacks","description":"Systematic analysis reveals a range of new issues and a need for new mitigations.","link":"https://arstechnica.com/?p=1411209","comments":"https://arstechnica.com/?p=1411209","updated_at":"2018-11-14T01:50:54+00:00","link_to_comments":"https://arstechnica.com/?p=1411209","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Destruction of evidence charges filed for remotely wiping iPhone","description":"<a href="https://news.ycombinator.com/item?id=18446498">Comments</a>","link":"https://dailygazette.com/article/2018/11/08/police-woman-remotely-wipes-phone-in-evidence-after-shooting","comments":"https://news.ycombinator.com/item?id=18446498","updated_at":"2018-11-14T01:11:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18446498","link_host":"dailygazette.com","from":"hackernews"},{"title":"Blue Apron lays off more workers","description":"<a href="https://news.ycombinator.com/item?id=18446448">Comments</a>","link":"https://www.wsj.com/articles/blue-apron-lays-off-more-workers-1542148447","comments":"https://news.ycombinator.com/item?id=18446448","updated_at":"2018-11-14T01:01:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18446448","link_host":"www.wsj.com","from":"hackernews"},{"title":"Private by Design: How We Built Firefox Sync","description":"<a href="https://news.ycombinator.com/item?id=18446278">Comments</a>","link":"https://hacks.mozilla.org/2018/11/firefox-sync-privacy/","comments":"https://news.ycombinator.com/item?id=18446278","updated_at":"2018-11-14T00:36:46+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18446278","link_host":"hacks.mozilla.org","from":"hackernews"},{"title":"DrawKit - collection of beautiful, customisable MIT licensed illustrations","description":"https://www.drawkit.io","link":"https://www.designernews.co/stories/98591-drawkit--collection-of-beautiful-customisable-mit-licensed-illustrations","comments":"https://www.designernews.co/stories/98591-drawkit--collection-of-beautiful-customisable-mit-licensed-illustrations","updated_at":"2018-11-13T23:25:33+00:00","link_to_comments":"https://www.designernews.co/stories/98591-drawkit--collection-of-beautiful-customisable-mit-licensed-illustrations","link_host":"www.drawkit.io","from":"designernews"},{"title":"Show HN: Squally – A Game to Teach Low Level Computer Science","description":"<a href="https://news.ycombinator.com/item?id=18445748">Comments</a>","link":"https://news.ycombinator.com/item?id=18445748","comments":"https://news.ycombinator.com/item?id=18445748","updated_at":"2018-11-13T23:05:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18445748","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Waymo CEO Says Alphabet Unit Plans to Launch Driverless Car Service","description":"<a href="https://news.ycombinator.com/item?id=18445714">Comments</a>","link":"https://www.marketwatch.com/story/waymo-ceo-says-driverless-car-service-coming-soon-2018-11-13","comments":"https://news.ycombinator.com/item?id=18445714","updated_at":"2018-11-13T22:59:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18445714","link_host":"www.marketwatch.com","from":"hackernews"},{"title":"Abusing C macros to render the Mandelbrot Set at compile-time","description":"<a href="https://news.ycombinator.com/item?id=18445685">Comments</a>","link":"https://gist.github.com/DavidBuchanan314/b9230fe7d335a1caf90483dbb00a5375","comments":"https://news.ycombinator.com/item?id=18445685","updated_at":"2018-11-13T22:55:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18445685","link_host":"gist.github.com","from":"hackernews"},{"title":"Build a do-it-yourself home air purifier for about $25","description":"<a href="https://news.ycombinator.com/item?id=18445652">Comments</a>","link":"https://www.uofmhealth.org/news/sinus-hepa-0630","comments":"https://news.ycombinator.com/item?id=18445652","updated_at":"2018-11-13T22:50:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18445652","link_host":"www.uofmhealth.org","from":"hackernews"},{"title":"Ask HN: I've been a programmer for 6 years, and I can't solve basic CS problems","description":"<a href="https://news.ycombinator.com/item?id=18445609">Comments</a>","link":"https://news.ycombinator.com/item?id=18445609","comments":"https://news.ycombinator.com/item?id=18445609","updated_at":"2018-11-13T22:41:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18445609","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Food taste 'not protected by copyright' rules EU court","description":"<a href="https://news.ycombinator.com/item?id=18445548">Comments</a>","link":"https://www.bbc.com/news/world-europe-46193818","comments":"https://news.ycombinator.com/item?id=18445548","updated_at":"2018-11-13T22:31:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18445548","link_host":"www.bbc.com","from":"hackernews"},{"title":"Trip report: Fall ISO C++ standards meeting","description":"<a href="https://news.ycombinator.com/item?id=18445201">Comments</a>","link":"https://herbsutter.com/2018/11/13/trip-report-fall-iso-c-standards-meeting-san-diego/","comments":"https://news.ycombinator.com/item?id=18445201","updated_at":"2018-11-13T21:43:58+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18445201","link_host":"herbsutter.com","from":"hackernews"},{"title":"Tensorflow 2.0: models migration and new design","description":"<a href="https://news.ycombinator.com/item?id=18444073">Comments</a>","link":"https://pgaleone.eu/tensorflow/gan/2018/11/04/tensorflow-2-models-migration-and-new-design/","comments":"https://news.ycombinator.com/item?id=18444073","updated_at":"2018-11-13T19:33:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18444073","link_host":"pgaleone.eu","from":"hackernews"},{"title":"User Defenders podcast – Radical Empathy with Seth Godin","description":"###Seth Godin shows us what radical empathy looks like. He reminds us to do work that matters, for people who care by focusing on serving a minimum viable audience. He teaches us that the way to stay indispensable in our work is to do work where you can’t write down the steps. He also reveals how faked empathy is just as good as real empathy for the true professional acting ‘as if’.\n\n[Listen now]\n(https://userdefenders.com/seth)","link":"https://www.designernews.co/stories/98587-user-defenders-podcast--radical-empathy-with-seth-godin","comments":"https://www.designernews.co/stories/98587-user-defenders-podcast--radical-empathy-with-seth-godin","updated_at":"2018-11-13T19:26:31+00:00","link_to_comments":"https://www.designernews.co/stories/98587-user-defenders-podcast--radical-empathy-with-seth-godin","link_host":null,"from":"designernews"},{"title":"Another Facebook Bug Could Have Exposed Your Private Information","description":"Another security vulnerability has been reported in Facebook that could have allowed attackers to obtain certain personal information about users and their friends, potentially putting the privacy of users of the world's most popular social network at risk.\n\nDiscovered by cybersecurity researchers from Imperva, the vulnerability resides in the way Facebook search feature displays results for<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=LZa9H_2yyXM:5Lt-Nc06aJ4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/LZa9H_2yyXM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/LZa9H_2yyXM/facebook-vulnerability-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/LZa9H_2yyXM/facebook-vulnerability-hack.html","updated_at":"2018-11-13T18:45:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/LZa9H_2yyXM/facebook-vulnerability-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Infinite procedurally-generated city with the Wave Function Collapse algorithm","description":"<a href="https://news.ycombinator.com/item?id=18443311">Comments</a>","link":"https://marian42.itch.io/wfc","comments":"https://news.ycombinator.com/item?id=18443311","updated_at":"2018-11-13T18:21:46+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18443311","link_host":"marian42.itch.io","from":"hackernews"},{"title":"Windows 10 October 2018 Update is back, this time without deleting your data","description":"Microsoft is opening up about some of its testing procedures, too.","link":"https://arstechnica.com/?p=1410715","comments":"https://arstechnica.com/?p=1410715","updated_at":"2018-11-13T18:21:06+00:00","link_to_comments":"https://arstechnica.com/?p=1410715","link_host":"arstechnica.com","from":"arssecurity"},{"title":"How Multi-Beam Flash Lidar Works","description":"<a href="https://news.ycombinator.com/item?id=18442775">Comments</a>","link":"https://www.ouster.io/blog-posts/2018/11/8/how-multi-beam-flash-lidar-works","comments":"https://news.ycombinator.com/item?id=18442775","updated_at":"2018-11-13T17:28:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18442775","link_host":"www.ouster.io","from":"hackernews"},{"title":"Sponsor: Live Now: UX / UI design with Olha Uzhykova, Marvin Schwaibold, and Melody Sabouri","description":"https://adobe.ly/2FpioQv","link":"https://www.designernews.co/stories/98585-sponsor-live-now-ux--ui-design-with-olha-uzhykova-marvin-schwaibold-and-melody-sabouri","comments":"https://www.designernews.co/stories/98585-sponsor-live-now-ux--ui-design-with-olha-uzhykova-marvin-schwaibold-and-melody-sabouri","updated_at":"2018-11-13T17:15:56+00:00","link_to_comments":"https://www.designernews.co/stories/98585-sponsor-live-now-ux--ui-design-with-olha-uzhykova-marvin-schwaibold-and-melody-sabouri","link_host":"adobe.ly","from":"designernews"},{"title":"Ask HN: What's the largest amount of bad code you have ever seen work?","description":"<a href="https://news.ycombinator.com/item?id=18442637">Comments</a>","link":"https://news.ycombinator.com/item?id=18442637","comments":"https://news.ycombinator.com/item?id=18442637","updated_at":"2018-11-13T17:14:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18442637","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Zippers for non-inductive types","description":"<a href="https://news.ycombinator.com/item?id=18441767">Comments</a>","link":"http://danghica.blogspot.com/2018/11/zippers-for-non-inductive-types.html","comments":"https://news.ycombinator.com/item?id=18441767","updated_at":"2018-11-13T15:41:57+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18441767","link_host":"danghica.blogspot.com","from":"hackernews"},{"title":"Story behind a redesign of Paperform V2","description":"https://phase.com/magazine/paperform-v2-how-to-redesign-a-website/","link":"https://www.designernews.co/stories/98577-story-behind-a-redesign-of-paperform-v2","comments":"https://www.designernews.co/stories/98577-story-behind-a-redesign-of-paperform-v2","updated_at":"2018-11-13T15:28:57+00:00","link_to_comments":"https://www.designernews.co/stories/98577-story-behind-a-redesign-of-paperform-v2","link_host":"phase.com","from":"designernews"},{"title":"Overcoming the fear of specializing a web design agency","description":"https://rezzz.com/podcast/sara-dunn-on-overcoming-the-fear-of-specialization/","link":"https://www.designernews.co/stories/98572-overcoming-the-fear-of-specializing-a-web-design-agency","comments":"https://www.designernews.co/stories/98572-overcoming-the-fear-of-specializing-a-web-design-agency","updated_at":"2018-11-13T13:35:13+00:00","link_to_comments":"https://www.designernews.co/stories/98572-overcoming-the-fear-of-specializing-a-web-design-agency","link_host":"rezzz.com","from":"designernews"},{"title":"A Brief History of Clip Art","description":"<a href="https://news.ycombinator.com/item?id=18440747">Comments</a>","link":"https://solomon.io/brief-history-of-clip-art/","comments":"https://news.ycombinator.com/item?id=18440747","updated_at":"2018-11-13T13:29:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18440747","link_host":"solomon.io","from":"hackernews"},{"title":"List articles on DN","description":"So does this guideline actually apply?\n\n"Unwelcome Stories - List-format articles, especially those intended for SEO purposes"\n\nAs of this writing, there are currently five list articles on the recent page. Is the content here actively moderated by the mods, or do they simply rely on stuff to be reported first before taking action?","link":"https://www.designernews.co/stories/98570-list-articles-on-dn","comments":"https://www.designernews.co/stories/98570-list-articles-on-dn","updated_at":"2018-11-13T13:24:06+00:00","link_to_comments":"https://www.designernews.co/stories/98570-list-articles-on-dn","link_host":null,"from":"designernews"},{"title":"How do you guys handle multiple variants of a component in a design system? ","description":"I'm struggling with this at my current place. I'm kind of reverse engineering a design library in place based on existing designs. The issue I have is for example a modal overlay will have loads of variations and states based on the context of the flow/process the user is in. \n\nSo, do I create a unique component based on the process its being used in or do I create an overall modal component with sub options based on those scenarios.\n\nReally interested on how you guys deal with this.","link":"https://www.designernews.co/stories/98568-how-do-you-guys-handle-multiple-variants-of-a-component-in-a-design-system-","comments":"https://www.designernews.co/stories/98568-how-do-you-guys-handle-multiple-variants-of-a-component-in-a-design-system-","updated_at":"2018-11-13T13:14:17+00:00","link_to_comments":"https://www.designernews.co/stories/98568-how-do-you-guys-handle-multiple-variants-of-a-component-in-a-design-system-","link_host":null,"from":"designernews"},{"title":"Cynet Review: Simplify Security with a True Security Platform","description":"In 1999, Bruce Schneier wrote, "Complexity is the worst enemy of security." That was 19 years ago (!) and since then, cyber security has only become more complex.\n\nToday, controls dramatically outnumber staff available to support them. The Bank of America has a $400-million cyber budget to hire security staff and implement a broad array of products. \n\nBut what if your budget and<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=trduj4LPg88:qm6zEaK3mHo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/trduj4LPg88" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/trduj4LPg88/cynet-cyber-security-solution.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/trduj4LPg88/cynet-cyber-security-solution.html","updated_at":"2018-11-13T12:34:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/trduj4LPg88/cynet-cyber-security-solution.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Compelled Decryption and the Privilege Against Self-Incrimination","description":"<a href="https://news.ycombinator.com/item?id=18440395">Comments</a>","link":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3248286","comments":"https://news.ycombinator.com/item?id=18440395","updated_at":"2018-11-13T12:18:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18440395","link_host":"papers.ssrn.com","from":"hackernews"},{"title":"How Podcasts Became a Seductive and Sometimes Slippery Mode of Storytelling","description":"<a href="https://news.ycombinator.com/item?id=18439977">Comments</a>","link":"https://www.newyorker.com/magazine/2018/11/19/how-podcasts-became-a-seductive-and-sometimes-slippery-mode-of-storytelling","comments":"https://news.ycombinator.com/item?id=18439977","updated_at":"2018-11-13T10:24:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18439977","link_host":"www.newyorker.com","from":"hackernews"},{"title":"TSM Website Concept [Case Study + Video]","description":"https://www.behance.net/gallery/71589251/TSM-Website-Concept","link":"https://www.designernews.co/stories/98561-tsm-website-concept-case-study--video","comments":"https://www.designernews.co/stories/98561-tsm-website-concept-case-study--video","updated_at":"2018-11-13T10:23:08+00:00","link_to_comments":"https://www.designernews.co/stories/98561-tsm-website-concept-case-study--video","link_host":"www.behance.net","from":"designernews"},{"title":"Non cogito, ergo sum","description":"<a href="https://news.ycombinator.com/item?id=18439577">Comments</a>","link":"https://www.1843magazine.com/content/ideas/ian-leslie/non-cogito-ergo-sum","comments":"https://news.ycombinator.com/item?id=18439577","updated_at":"2018-11-13T08:42:46+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18439577","link_host":"www.1843magazine.com","from":"hackernews"},{"title":"C library system-call wrappers, or the lack thereof","description":"<a href="https://news.ycombinator.com/item?id=18439100">Comments</a>","link":"https://lwn.net/SubscriberLink/771441/96f587a2dec5ba1a/","comments":"https://news.ycombinator.com/item?id=18439100","updated_at":"2018-11-13T06:36:03+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18439100","link_host":"lwn.net","from":"hackernews"},{"title":"Did you know Noto Serif and Noto Serif JP, KR are different?","description":"![Noto Serifs](https://image.ibb.co/eAZOtV/Screen-Shot-2018-11-13-at-3-48-56-pm.png)\n\nDoes anyone know why they are different? I really want to use the serif from Noto Serif JP or KR, but obviously they're bigger because they include Japanese or Korean letters. \n\nIs there a way to use only English types out of Noto Serif JP or KR?","link":"https://www.designernews.co/stories/98553-did-you-know-noto-serif-and-noto-serif-jp-kr-are-different","comments":"https://www.designernews.co/stories/98553-did-you-know-noto-serif-and-noto-serif-jp-kr-are-different","updated_at":"2018-11-13T04:53:26+00:00","link_to_comments":"https://www.designernews.co/stories/98553-did-you-know-noto-serif-and-noto-serif-jp-kr-are-different","link_host":"image.ibb.co","from":"designernews"},{"title":"Google's new Web.Dev portal","description":"https://web.dev/","link":"https://www.designernews.co/stories/98550-googles-new-webdev-portal","comments":"https://www.designernews.co/stories/98550-googles-new-webdev-portal","updated_at":"2018-11-12T21:45:22+00:00","link_to_comments":"https://www.designernews.co/stories/98550-googles-new-webdev-portal","link_host":"web.dev","from":"designernews"},{"title":"Get the most from your work hours and boost your team productivity.","description":"https://flowmagic.co/teams","link":"https://www.designernews.co/stories/98549-get-the-most-from-your-work-hours-and--boost-your-team-productivity","comments":"https://www.designernews.co/stories/98549-get-the-most-from-your-work-hours-and--boost-your-team-productivity","updated_at":"2018-11-12T21:37:04+00:00","link_to_comments":"https://www.designernews.co/stories/98549-get-the-most-from-your-work-hours-and--boost-your-team-productivity","link_host":"flowmagic.co","from":"designernews"},{"title":"Why We Need Difficult Books","description":"<a href="https://news.ycombinator.com/item?id=18435642">Comments</a>","link":"https://www.theguardian.com/books/2018/nov/10/anna-burns-milkman-difficult-novel","comments":"https://news.ycombinator.com/item?id=18435642","updated_at":"2018-11-12T20:50:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18435642","link_host":"www.theguardian.com","from":"hackernews"},{"title":"UX Pattern: Unsaved File Affordance in Visual Studio Code","description":"https://www.waveguide.io/patterns/web/entry/unsaved-file-affordance","link":"https://www.designernews.co/stories/98547-ux-pattern-unsaved-file-affordance-in-visual-studio-code","comments":"https://www.designernews.co/stories/98547-ux-pattern-unsaved-file-affordance-in-visual-studio-code","updated_at":"2018-11-12T20:26:15+00:00","link_to_comments":"https://www.designernews.co/stories/98547-ux-pattern-unsaved-file-affordance-in-visual-studio-code","link_host":"www.waveguide.io","from":"designernews"},{"title":"Introducing Pantheon: A modern agency network","description":"https://onepantheon.com/","link":"https://www.designernews.co/stories/98544-introducing-pantheon-a-modern-agency-network","comments":"https://www.designernews.co/stories/98544-introducing-pantheon-a-modern-agency-network","updated_at":"2018-11-12T17:20:53+00:00","link_to_comments":"https://www.designernews.co/stories/98544-introducing-pantheon-a-modern-agency-network","link_host":"onepantheon.com","from":"designernews"},{"title":"Sponsor: A brainstorming tool for your next Product Name, Project Name or Business Name with instant Domain availability check!","description":"https://businessnamegenerator.com/product-name-generator/","link":"https://www.designernews.co/stories/98542-sponsor-a-brainstorming-tool-for-your-next-product-name-project-name-or-business-name-with-instant-domain-availability-check","comments":"https://www.designernews.co/stories/98542-sponsor-a-brainstorming-tool-for-your-next-product-name-project-name-or-business-name-with-instant-domain-availability-check","updated_at":"2018-11-12T16:35:47+00:00","link_to_comments":"https://www.designernews.co/stories/98542-sponsor-a-brainstorming-tool-for-your-next-product-name-project-name-or-business-name-with-instant-domain-availability-check","link_host":"businessnamegenerator.com","from":"designernews"},{"title":"Collection of tools for web designers that you've probably missed during October ","description":"https://designrevision.com/web-dev-resources-oct-2018/","link":"https://www.designernews.co/stories/98536-collection-of-tools-for-web-designers-that-youve-probably-missed-during-october-","comments":"https://www.designernews.co/stories/98536-collection-of-tools-for-web-designers-that-youve-probably-missed-during-october-","updated_at":"2018-11-12T13:54:10+00:00","link_to_comments":"https://www.designernews.co/stories/98536-collection-of-tools-for-web-designers-that-youve-probably-missed-during-october-","link_host":"designrevision.com","from":"designernews"},{"title":"Top 5 Factors That Increase Cyber Security Salary The Most","description":"Our partner Springboard, which provides online courses to help you advance your cybersecurity career with personalized mentorship from industry experts, recently researched current cybersecurity salaries and future earning potential in order to trace a path to how much money you can make. \n\nHere's what they found were the most important factors for making sure you earn as much as possible:\n\n\n1<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=eQzsjp0iEWo:IjUYG4B3TSs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/eQzsjp0iEWo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/eQzsjp0iEWo/cyber-security-jobs-salary.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eQzsjp0iEWo/cyber-security-jobs-salary.html","updated_at":"2018-11-12T13:12:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eQzsjp0iEWo/cyber-security-jobs-salary.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New APIs Suggest WPA3 Wi-Fi Security Support Coming Soon to Windows 10","description":"Windows 10 users don't have to wait much longer for the support of latest WPA3 Wi-Fi security standard, a new blog post from Microsoft apparently revealed.\n\nThe third version of Wi-Fi Protected Access, in-short WPA3, is the next generation of the wireless security protocol that has been designed to make it harder for attackers to hack WiFi password.\n\nWPA3 was officially launched earlier this<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Ye3G9jQvd2Y:xbsurptf2B0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Ye3G9jQvd2Y" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Ye3G9jQvd2Y/windows-10-wpa3-wifi-security.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Ye3G9jQvd2Y/windows-10-wpa3-wifi-security.html","updated_at":"2018-11-12T12:55:14+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Ye3G9jQvd2Y/windows-10-wpa3-wifi-security.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Best and Worst Cities for Nursing Homes in the US","description":"<a href="https://news.ycombinator.com/item?id=18432301">Comments</a>","link":"https://priceonomics.com/the-25-best-and-worst-cities-for-nursing-homes/","comments":"https://news.ycombinator.com/item?id=18432301","updated_at":"2018-11-12T12:54:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=18432301","link_host":"priceonomics.com","from":"hackernews"},{"title":"Page Flip Layout","description":"https://tympanus.net/codrops/2018/11/12/page-flip-layout/","link":"https://www.designernews.co/stories/98528-page-flip-layout","comments":"https://www.designernews.co/stories/98528-page-flip-layout","updated_at":"2018-11-12T12:05:26+00:00","link_to_comments":"https://www.designernews.co/stories/98528-page-flip-layout","link_host":"tympanus.net","from":"designernews"},{"title":"What tool did you used in your company to share a Design System internally?","description":"I designed the Design System of my current company with Sketch and I'm using Zeplin to share it to others, but Zeplin needs invitation and Sketch a program license, so they're not enough. We don't have a pattern library yet (the code side of the design system), so people who are not designers can't really make use of the design system. Which tool would you recommend to share a design system internally, so that people can refer to it?","link":"https://www.designernews.co/stories/98526-what-tool-did-you-used-in-your-company-to-share-a-design-system-internally","comments":"https://www.designernews.co/stories/98526-what-tool-did-you-used-in-your-company-to-share-a-design-system-internally","updated_at":"2018-11-12T09:32:07+00:00","link_to_comments":"https://www.designernews.co/stories/98526-what-tool-did-you-used-in-your-company-to-share-a-design-system-internally","link_host":null,"from":"designernews"},{"title":"Gestalt-Driven UX: The Patterns That Drive Our World","description":"https://hackernoon.com/design-psychology-gestalt-driven-ux-64ac01cd257a","link":"https://www.designernews.co/stories/98523-gestaltdriven-ux-the-patterns-that-drive-our-world","comments":"https://www.designernews.co/stories/98523-gestaltdriven-ux-the-patterns-that-drive-our-world","updated_at":"2018-11-12T07:24:33+00:00","link_to_comments":"https://www.designernews.co/stories/98523-gestaltdriven-ux-the-patterns-that-drive-our-world","link_host":"hackernoon.com","from":"designernews"},{"title":"What has been your experience with WebFlow?","description":"I plan on moving towards web flow to handle most of my client web designs - I was highly impressed with the kind of features they hold. \n\nWhat are you opinions on using WebFlow for a basic to a complex animation / a functional form to an Ecommerce website experience?","link":"https://www.designernews.co/stories/98521-what-has-been-your-experience-with-webflow","comments":"https://www.designernews.co/stories/98521-what-has-been-your-experience-with-webflow","updated_at":"2018-11-12T06:17:57+00:00","link_to_comments":"https://www.designernews.co/stories/98521-what-has-been-your-experience-with-webflow","link_host":null,"from":"designernews"},{"title":"The Art Institute of Chicago Has Put 50,000 High-Res Images from Their Collection Online","description":"https://kottke.org/18/11/the-art-institute-of-chicago-has-put-50000-high-res-images-from-their-collection-online","link":"https://www.designernews.co/stories/98519-the-art-institute-of-chicago-has-put-50000-highres-images-from-their-collection-online","comments":"https://www.designernews.co/stories/98519-the-art-institute-of-chicago-has-put-50000-highres-images-from-their-collection-online","updated_at":"2018-11-12T00:53:09+00:00","link_to_comments":"https://www.designernews.co/stories/98519-the-art-institute-of-chicago-has-put-50000-highres-images-from-their-collection-online","link_host":"kottke.org","from":"designernews"},{"title":"Any website that curates helpful books for designers?","description":"I'm looking to find some books to help me out. A few topics I'd like too improve on are 'being a better design leader' how to be more organised running an agency' and other leadership / management / self improvement books for designers?","link":"https://www.designernews.co/stories/98517-any-website-that-curates-helpful-books-for-designers","comments":"https://www.designernews.co/stories/98517-any-website-that-curates-helpful-books-for-designers","updated_at":"2018-11-11T16:50:56+00:00","link_to_comments":"https://www.designernews.co/stories/98517-any-website-that-curates-helpful-books-for-designers","link_host":null,"from":"designernews"},{"title":"Show DN - Personal Site","description":"Hello everyone!\n\nI'm super excited to get my new site live. I was hoping to get some final feedback from designers outside my network in order to put the finishing touches on this project. At this point, I've got a small list of tasks I'm crossing off but looking for some that I may have missed. \n\nURL: [timhouseholter.com](http://timhouseholter.com).\n\nThanks for your time and look forward to some feedback!\n\n-T","link":"https://www.designernews.co/stories/98513-show-dn--personal-site","comments":"https://www.designernews.co/stories/98513-show-dn--personal-site","updated_at":"2018-11-10T17:47:15+00:00","link_to_comments":"https://www.designernews.co/stories/98513-show-dn--personal-site","link_host":null,"from":"designernews"},{"title":"New iPad Pro website from Apple","description":"https://www.apple.com/ca/ipad-pro/","link":"https://www.designernews.co/stories/98512-new-ipad-pro-website-from-apple","comments":"https://www.designernews.co/stories/98512-new-ipad-pro-website-from-apple","updated_at":"2018-11-10T17:43:45+00:00","link_to_comments":"https://www.designernews.co/stories/98512-new-ipad-pro-website-from-apple","link_host":"www.apple.com","from":"designernews"},{"title":"iOS app designers using figma, how? (vector asset question)","description":"Hey guys, currently my teams work flow is\nSketch>Abstract/Zeplin and repeat. \n\nWe've been looking into using figma and dropping both zeplin and abstract but one main issue i've run into, you CANT export assets to pdf on figma?!\n\nI've seen sites/plugins used to export contents of an artboard into a pdf but that would require each symbol or element I needed exported as pdf would need their own artboard.\n\nI know that the Figma team has said its on their roadmap but until then, how are you guys designing for iOS and handing off to dev? Thanks!","link":"https://www.designernews.co/stories/98506-ios-app-designers-using-figma-how-vector-asset-question","comments":"https://www.designernews.co/stories/98506-ios-app-designers-using-figma-how-vector-asset-question","updated_at":"2018-11-09T21:25:58+00:00","link_to_comments":"https://www.designernews.co/stories/98506-ios-app-designers-using-figma-how-vector-asset-question","link_host":null,"from":"designernews"},{"title":"Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty","description":"A 23-year-old hacker from Utah pleaded guilty this week to launching a series of denial-of-service (DoS) attacks against multiple online services, websites, and online gaming companies between 2013 and 2014.\n\nAccording to a Justice Department (DoJ) press release, Austin Thompson, a.k.a. "DerpTroll," took down servers of several major gaming platforms including Electronic Arts' Origin service,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=4mhvlfYF1WU:GM4EV_TxEHQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/4mhvlfYF1WU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/4mhvlfYF1WU/gaming-server-ddos-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/4mhvlfYF1WU/gaming-server-ddos-attack.html","updated_at":"2018-11-09T08:22:25+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/4mhvlfYF1WU/gaming-server-ddos-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Flaws in Popular Self-Encrypting SSDs Let Attackers Decrypt Data","description":"We all have something to hide, something to protect. But if you are also relying on self-encrypting drives for that, then you should read this news carefully.\n\nSecurity researchers have discovered multiple critical vulnerabilities in some of the popular self-encrypting solid state drives (SSD) that could allow an attacker to decrypt disk encryption and recover protected data without knowing<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ShX_Q42M9a8:2grNIMJwJlI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ShX_Q42M9a8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ShX_Q42M9a8/self-encrypting-ssd-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ShX_Q42M9a8/self-encrypting-ssd-hacking.html","updated_at":"2018-11-08T19:09:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ShX_Q42M9a8/self-encrypting-ssd-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Here's How Hackers Could Have Spied On Your DJI Drone Account","description":"Cybersecurity researchers at Check Point today revealed details of a potential dangerous vulnerability in DJI Drone web app that could have allowed attackers access user accounts and synced sensitive information within it, including flight records, location, live video camera feed, and photos taken during a flight.\n\nThought the vulnerability was discovered and responsibly reported by the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=yqaS4fCTd8k:ksvei8Ictog:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/yqaS4fCTd8k" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/yqaS4fCTd8k/dji-drone-hack_8.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/yqaS4fCTd8k/dji-drone-hack_8.html","updated_at":"2018-11-08T19:08:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/yqaS4fCTd8k/dji-drone-hack_8.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Android API Lets Developers Push Updates Within their Apps","description":"You might have read somewhere online today that Google is granting Android app developers powers to forcefully install app updates…but it is not true.\n\nInstead, the tech giant is providing a new feature that will help users to have up-to-date Android apps all the time and yes, it's optional.\n\nAlong with the launch of a number of new tools and features at its Android Dev Summit 2018, Google has<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=mTIM6g-SW9A:NhUrwkQAUXA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/mTIM6g-SW9A" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/mTIM6g-SW9A/android-in-app-updates-api.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mTIM6g-SW9A/android-in-app-updates-api.html","updated_at":"2018-11-08T15:21:35+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mTIM6g-SW9A/android-in-app-updates-api.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"StatCounter Analytics Code Hijacked to Steal Bitcoins from Cryptocurrency Users","description":"Late last week an unknown hacker or a group of hackers successfully targeted a cryptocurrency exchange with an aim to steal Bitcoins by compromising the web analytics service it was using.\n\nESET malware researcher Matthieu Faou this weekend spotted malicious JavaScript code on up to 700,000 websites that were bundled with the traffic tracking code from the leading web analytics platform<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Q-9qVLyipzg:MhkzxgihZ0o:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Q-9qVLyipzg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Q-9qVLyipzg/statcounter-cryptocurrency-cyberattack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Q-9qVLyipzg/statcounter-cryptocurrency-cyberattack.html","updated_at":"2018-11-08T11:13:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Q-9qVLyipzg/statcounter-cryptocurrency-cyberattack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Unpatched VirtualBox Zero-Day Vulnerability and Exploit Released Online","description":"An independent exploit developer and vulnerability researcher has publicly disclosed a zero-day vulnerability in VirtualBox—a popular open source virtualization software developed by Oracle—that could allow a malicious program to escape virtual machine (guest OS) and execute code on the operating system of the host machine.\n\nThe vulnerability occurs due to memory corruption issues and affects<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=lNzxctK2id8:zyBZuOVfE1c:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/lNzxctK2id8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/lNzxctK2id8/virtualbox-zero-day-exploit.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/lNzxctK2id8/virtualbox-zero-day-exploit.html","updated_at":"2018-11-08T09:25:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/lNzxctK2id8/virtualbox-zero-day-exploit.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Popular WooCommerce WordPress Plugin Patches Critical Vulnerability","description":"If you own an eCommerce website built on WordPress and powered by WooCommerce plugin, then beware of a new vulnerability that could compromise your online store.\n\nSimon Scannell, a researcher at RIPS Technologies GmbH, discovered an arbitrary file deletion vulnerability in the popular WooCommerce plugin that could allow a malicious or compromised privileged user to gain full control over the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=-_tjAb7u59Y:fTevckLkJXo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-_tjAb7u59Y" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-_tjAb7u59Y/woocommerce-wordpress-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-_tjAb7u59Y/woocommerce-wordpress-hacking.html","updated_at":"2018-11-07T09:01:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-_tjAb7u59Y/woocommerce-wordpress-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Apple's New MacBook Disconnects Microphone \"Physically\" When Lid is Closed","description":"Apple introduces a new privacy feature for all new MacBooks that "at some extent" will prevent hackers and malicious applications from eavesdropping on your conversations.\n\nApple's custom T2 security chip in the latest MacBooks includes a new hardware feature that physically disconnects the MacBook's built-in microphone whenever the user closes the lid, the company revealed yesterday at its event<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=BEuP4kQAZg8:dIvbWmtJG4c:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/BEuP4kQAZg8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/BEuP4kQAZg8/apple-macbook-microphone.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BEuP4kQAZg8/apple-macbook-microphone.html","updated_at":"2018-11-04T17:51:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BEuP4kQAZg8/apple-macbook-microphone.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data","description":"A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with simultaneous multi-threading feature enabled.\n\nThe vulnerability, codenamed PortSmash (CVE-2018-5407), has joined the list of other<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=KLdNFOP5OtE:0rhrh8NIfPA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/KLdNFOP5OtE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/KLdNFOP5OtE/portsmash-intel-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/KLdNFOP5OtE/portsmash-intel-vulnerability.html","updated_at":"2018-11-04T09:24:03+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/KLdNFOP5OtE/portsmash-intel-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Accused CIA Leaker Faces New Charges of Leaking Information From Prison","description":"Joshua Adam Schulte, a 30-year-old former CIA computer programmer who was indicted over four months ago for masterminding the largest leak of classified information in the agency's history, has now been issued three new charges.\n\nThe news comes just hours after Schulte wrote a letter to the federal judge presiding over his case, accusing officials at Manhattan Metropolitan Correctional Center of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=EsOdxdJsqTw:r3HknMUBioQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/EsOdxdJsqTw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/EsOdxdJsqTw/cia-joshuaa-wikileaks.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/EsOdxdJsqTw/cia-joshuaa-wikileaks.html","updated_at":"2018-11-02T09:16:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/EsOdxdJsqTw/cia-joshuaa-wikileaks.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks","description":"Security researchers have unveiled details of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in millions of access points and networking devices used by enterprises around the world.\n\nDubbed BleedingBit, the set of two vulnerabilities could allow remote attackers to execute arbitrary code and take full control of vulnerable devices without authentication, including<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=_OgmQVFokZ4:ILT0MC7AwK8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_OgmQVFokZ4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_OgmQVFokZ4/bluetooth-chip-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_OgmQVFokZ4/bluetooth-chip-hacking.html","updated_at":"2018-11-01T18:48:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_OgmQVFokZ4/bluetooth-chip-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer","description":"Cybersecurity researchers have revealed an unpatched logical flaw in Microsoft Office 2016 and older versions that could allow an attacker to embed malicious code inside a document file, tricking users into running malware onto their computers.\n\nDiscovered by researchers at Cymulate, the bug abuses the 'Online Video' option in Word documents, a feature that allows users to embedded an online<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=_tz2_SoPYEs:xaCB2y3sFos:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_tz2_SoPYEs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_tz2_SoPYEs/microsoft-office-online-video.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_tz2_SoPYEs/microsoft-office-online-video.html","updated_at":"2018-10-31T08:50:25+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_tz2_SoPYEs/microsoft-office-online-video.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New iPhone Passcode Bypass Found Hours After Apple Releases iOS 12.1","description":"It's only been a few hours since Apple releases iOS 12.1 and an iPhone enthusiast has managed to find a passcode bypass hack, once again, that could allow anyone to see all contacts' private information on a locked iPhone.\n\nJose Rodriguez, a Spanish security researcher, contacted The Hacker News and confirmed that he discovered an iPhone passcode bypass bug in the latest version of its iOS<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=XnxUDjbkxWA:vxjBOdNnr4U:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/XnxUDjbkxWA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/XnxUDjbkxWA/iphone-ios-passcode-bypass.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XnxUDjbkxWA/iphone-ios-passcode-bypass.html","updated_at":"2018-10-30T20:01:32+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XnxUDjbkxWA/iphone-ios-passcode-bypass.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Windows 10 Bug Let UWP Apps Access All Files Without Users' Consent","description":"Microsoft silently patched a bug in its Windows 10 operating system with the October 2018 update (version 1809) that allowed Microsoft Store apps with extensive file system permission to access all files on users' computers without their consent.\n\nWith Windows 10, Microsoft introduced a common platform, called Universal Windows Platform (UWP), that allows apps to run on any device running<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=5Q3xovAB1pA:R2YCVooZsfw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/5Q3xovAB1pA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/5Q3xovAB1pA/windows10-uwp-apps.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/5Q3xovAB1pA/windows10-uwp-apps.html","updated_at":"2018-10-30T14:58:47+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/5Q3xovAB1pA/windows10-uwp-apps.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Signal Secure Messaging App Now Encrypts Sender's Identity As Well","description":"Signal, the popular end-to-end encrypted messaging app, is planning to roll out a new feature that aims to hide the sender's identity from potential attackers trying to intercept the communication.\n\nAlthough messages send via secure messaging services, like Signal, WhatsApp, and Telegram, are fully end-to-end encrypted as they transmit across their servers, each message leaves behind some of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=TgDQdeFNdOo:NvwIVByjQGA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/TgDQdeFNdOo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/TgDQdeFNdOo/signal-secure-messaging-metadata.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TgDQdeFNdOo/signal-secure-messaging-metadata.html","updated_at":"2018-10-30T08:18:56+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TgDQdeFNdOo/signal-secure-messaging-metadata.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"IBM Buys \"Red Hat\" Open-Source Software Company for $34 Billion","description":"It's been quite a year for the open source platforms.\n\nEarlier this year, Microsoft acquired popular code repository hosting service GitHub for $7.5 billion, and now IBM has just announced the biggest open-source business deal ever.\n\nIBM today confirmed that it would be acquiring open source Linux firm Red Hat for $190 per share in cash, working out to a total value of approximately $34<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=gtshwPd05zY:aQOdeyB-eHY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/gtshwPd05zY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/gtshwPd05zY/ibm-redhat-tech-acquisition.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/gtshwPd05zY/ibm-redhat-tech-acquisition.html","updated_at":"2018-10-29T15:03:10+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/gtshwPd05zY/ibm-redhat-tech-acquisition.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Windows Built-in Antivirus Gets Secure Sandbox Mode – Turn It ON","description":"Microsoft Windows built-in anti-malware tool, Windows Defender, has become the very first antivirus software to have the ability to run inside a sandbox environment.\n\nSandboxing is a process that runs an application in a safe environment isolated from the rest of the operating system and applications on a computer. So that if a sandboxed application gets compromised, the technique prevents its<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=8WG8MUmdgvk:nhgQjulGPLw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8WG8MUmdgvk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/8WG8MUmdgvk/windows-defender-antivirus-sandbox.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8WG8MUmdgvk/windows-defender-antivirus-sandbox.html","updated_at":"2018-10-29T14:51:28+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8WG8MUmdgvk/windows-defender-antivirus-sandbox.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Privilege Escalation Flaw Affects Most Linux Distributions","description":"An Indian security researcher has discovered a highly critical flaw in X.Org Server package that impacts OpenBSD and most Linux distributions, including Debian, Ubuntu, CentOS, Red Hat, and Fedora.\n\nXorg X server is a popular open-source implementation of the X11 system (display server) that offers a graphical environment to a wider range of hardware and OS platforms. It serves as an<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=cCD2ZZ2FcAQ:HtfdTzpiRC4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/cCD2ZZ2FcAQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/cCD2ZZ2FcAQ/privilege-escalation-linux.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/cCD2ZZ2FcAQ/privilege-escalation-linux.html","updated_at":"2018-10-26T13:59:32+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/cCD2ZZ2FcAQ/privilege-escalation-linux.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Facebook Fined £500,000 for Cambridge Analytica Data Scandal","description":"Facebook has finally been slapped with its first fine of £500,000 for allowing political consultancy firm Cambridge Analytica to improperly gather and misuse data of 87 million users.\n\nThe fine has been imposed by the UK's Information Commissioner's Office (ICO) and was calculated using the UK's old Data Protection Act 1998 which can levy a maximum penalty of £500,000 — ironically that’s<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=hMtsY_CWLnk:kdlIQw6tyaE:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/hMtsY_CWLnk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/hMtsY_CWLnk/facebook-cambridge-analytica.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hMtsY_CWLnk/facebook-cambridge-analytica.html","updated_at":"2018-10-25T13:26:01+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hMtsY_CWLnk/facebook-cambridge-analytica.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Google Makes 2 Years of Android Security Updates Mandatory for Device Makers","description":"When it comes to security updates, Android is a real mess.\n\nEven after Google timely rolls out security patches for its Android platform, a major part of the Android ecosystem remains exposed to hackers because device manufacturers do not deliver patches regularly and on a timely basis to their customers.\n\nTo deal with this issue, Google at its I/O Developer Conference May 2018 revealed the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=7Wox5iAZJA8:u0sDYvz1t9I:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/7Wox5iAZJA8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/7Wox5iAZJA8/android-security-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/7Wox5iAZJA8/android-security-updates.html","updated_at":"2018-10-25T09:57:49+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/7Wox5iAZJA8/android-security-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Another Windows 0-day flaw has been published on Twitter","description":"And on GitHub there's a proof-of-concept that'll render your system unbootable.","link":"https://arstechnica.com/?p=1399385","comments":"https://arstechnica.com/?p=1399385","updated_at":"2018-10-24T15:50:29+00:00","link_to_comments":"https://arstechnica.com/?p=1399385","link_host":"arstechnica.com","from":"arssecurity"},{"title":"How to make elections secure in the age of digital operatives","description":"Former Facebook CSO Alex Stamos tells us what he learned in 2016 and what comes next.","link":"https://arstechnica.com/?p=1396633","comments":"https://arstechnica.com/?p=1396633","updated_at":"2018-10-24T13:10:38+00:00","link_to_comments":"https://arstechnica.com/?p=1396633","link_host":"arstechnica.com","from":"arssecurity"},{"title":"FireEye: Russian Research Lab Aided the Development of TRITON Industrial Malware","description":"Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the TRITON malware that caused some industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia.\n\nTRITON, also known as Trisis, is a piece of ICS malware designed to target the Triconex Safety<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=g-PdHmWvZDA:M7FLNv4CnKo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/g-PdHmWvZDA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/g-PdHmWvZDA/russia-triton-ics-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/g-PdHmWvZDA/russia-triton-ics-malware.html","updated_at":"2018-10-24T11:32:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/g-PdHmWvZDA/russia-triton-ics-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Meet Helm, the startup taking on Gmail with a server that runs in your home","description":"Fee-based service couples the security of a private server with the reliability of the cloud.","link":"https://arstechnica.com/?p=1395757","comments":"https://arstechnica.com/?p=1395757","updated_at":"2018-10-17T17:52:29+00:00","link_to_comments":"https://arstechnica.com/?p=1395757","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Apple, Google, Microsoft, and Mozilla come together to end TLS 1.0","description":"Almost everyone has now migrated to TLS 1.2, and a few have moved to TLS 1.3.","link":"https://arstechnica.com/?p=1395081","comments":"https://arstechnica.com/?p=1395081","updated_at":"2018-10-16T22:00:32+00:00","link_to_comments":"https://arstechnica.com/?p=1395081","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Already facing an uphill misinformation fight, Facebook loses to scammers, too","description":"Facebook's focus on misinformation is leaving an opening for another type of scam.","link":"https://arstechnica.com/?p=1394641","comments":"https://arstechnica.com/?p=1394641","updated_at":"2018-10-16T00:42:37+00:00","link_to_comments":"https://arstechnica.com/?p=1394641","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Apple to Congress: Chinese spy-chip story is “simply wrong”","description":""Our internal investigations directly contradict every consequential assertion."","link":"https://arstechnica.com/?p=1389661","comments":"https://arstechnica.com/?p=1389661","updated_at":"2018-10-08T18:25:11+00:00","link_to_comments":"https://arstechnica.com/?p=1389661","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Bloomberg: Super Micro motherboards used by Apple, Amazon contained Chinese spy chips","description":"Super Micro, Amazon, and Apple deny everything in the report.","link":"https://arstechnica.com/?p=1387815","comments":"https://arstechnica.com/?p=1387815","updated_at":"2018-10-04T16:08:56+00:00","link_to_comments":"https://arstechnica.com/?p=1387815","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google taking new steps to prevent malicious Chrome extensions","description":"Company plans stricter rules for developers and greater control for users.","link":"https://arstechnica.com/?p=1386063","comments":"https://arstechnica.com/?p=1386063","updated_at":"2018-10-02T17:10:45+00:00","link_to_comments":"https://arstechnica.com/?p=1386063","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google backtracks—a bit—on controversial Chrome sign-in feature","description":"Privacy-conscious users were unhappy at being signed in to browser without consent.","link":"https://arstechnica.com/?p=1383633","comments":"https://arstechnica.com/?p=1383633","updated_at":"2018-09-27T21:26:10+00:00","link_to_comments":"https://arstechnica.com/?p=1383633","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft offers completely passwordless authentication for online apps","description":"Phone-based authentication is the way forward instead.","link":"https://arstechnica.com/?p=1381265","comments":"https://arstechnica.com/?p=1381265","updated_at":"2018-09-24T13:00:08+00:00","link_to_comments":"https://arstechnica.com/?p=1381265","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New modification of the old cold boot attack leaves most systems vulnerable","description":"The defenses put in place to thwart the 2008 attack turn out to be very weak.","link":"https://arstechnica.com/?p=1374349","comments":"https://arstechnica.com/?p=1374349","updated_at":"2018-09-13T20:26:02+00:00","link_to_comments":"https://arstechnica.com/?p=1374349","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Georgia says switching back to all-paper voting is logistically impossible","description":"In <em>Curling v. Kemp</em>, both sides are set to duke it out in court on Wednesday.","link":"https://arstechnica.com/?p=1372123","comments":"https://arstechnica.com/?p=1372123","updated_at":"2018-09-12T08:30:35+00:00","link_to_comments":"https://arstechnica.com/?p=1372123","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 support extended again: September releases now get 30 months","description":"And Microsoft is offering enterprises dedicated app compatibility support.","link":"https://arstechnica.com/?p=1369565","comments":"https://arstechnica.com/?p=1369565","updated_at":"2018-09-06T15:55:06+00:00","link_to_comments":"https://arstechnica.com/?p=1369565","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google wants to get rid of URLs but doesn’t know what to use instead","description":"Their complexity makes them a security hazard; their ubiquity makes replacement nigh impossible.","link":"https://arstechnica.com/?p=1368805","comments":"https://arstechnica.com/?p=1368805","updated_at":"2018-09-05T14:04:02+00:00","link_to_comments":"https://arstechnica.com/?p=1368805","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft obliquely acknowledges Windows 0-day bug published on Twitter","description":"Flaw allows a local user to obtain System privileges.","link":"https://arstechnica.com/?p=1365821","comments":"https://arstechnica.com/?p=1365821","updated_at":"2018-08-29T16:18:32+00:00","link_to_comments":"https://arstechnica.com/?p=1365821","link_host":"arstechnica.com","from":"arssecurity"},{"title":"The adventures of lab ED011—“Nobody would be able to duplicate what happened there”","description":"One Romanian campus computer lab both pentested the world and eventually helped protect it.","link":"https://arstechnica.com/?p=1352453","comments":"https://arstechnica.com/?p=1352453","updated_at":"2018-08-27T13:00:56+00:00","link_to_comments":"https://arstechnica.com/?p=1352453","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Chrome 69 will take the next step to killing Flash, roll out new design","description":"Flash will have to be enabled every time a site tries to use it.","link":"https://arstechnica.com/?p=1362157","comments":"https://arstechnica.com/?p=1362157","updated_at":"2018-08-21T17:26:03+00:00","link_to_comments":"https://arstechnica.com/?p=1362157","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel’s SGX blown wide open by, you guessed it, a speculative execution attack","description":"Speculative execution attacks truly are the gift that keeps on giving.","link":"https://arstechnica.com/?p=1358223","comments":"https://arstechnica.com/?p=1358223","updated_at":"2018-08-14T19:18:31+00:00","link_to_comments":"https://arstechnica.com/?p=1358223","link_host":"arstechnica.com","from":"arssecurity"}]