Code & Design News Aggregator of Code, Security and Design news sites. Mon, 17 Jun 2019 21:12:03 +0000 Git Internals Mon, 17 Jun 2019 20:38:09 +0000 2019-06-17T20:38:09+00:00 Environment and the programming language Self (part two; language) Mon, 17 Jun 2019 20:29:43 +0000 2019-06-17T20:29:43+00:00 Leetcode problem 5: Longest Palindromic Substring [help needed] Mon, 17 Jun 2019 20:29:01 +0000 2019-06-17T20:29:01+00:00 As a Product Designer, what are your essential tools? There are countless lists and roundup articles about the **"Top XX UI/UX Design Tools"** and while Product Design can often encompass other roles such as UX design, I'd love to hear specifically from fellow Product Designers about the tools and apps you use in your day to day. Mon, 17 Jun 2019 20:26:18 +0000 2019-06-17T20:26:18+00:00 Ultimate Guide to Website Design Cost in 2019 Mon, 17 Jun 2019 20:17:20 +0000 2019-06-17T20:17:20+00:00 Mezzano - an OS written entirely in Common Lisp, supporting networking and GUI Mon, 17 Jun 2019 20:00:57 +0000 2019-06-17T20:00:57+00:00 Thomas Edison Was an Early Adopter of the Word ‘Bug’ Mon, 17 Jun 2019 20:00:51 +0000 2019-06-17T20:00:51+00:00 The CIA Spied on People Through Their Smart TVs, Leaked Documents Reveal (2017) <a href="">Comments</a> Mon, 17 Jun 2019 19:37:01 +0000 2019-06-17T19:37:01+00:00 How to Transform an Air Traffic API to GeoJSON to Render on a Map Mon, 17 Jun 2019 19:22:14 +0000 2019-06-17T19:22:14+00:00 Google Is Taking Charge of the RCS Rollout <a href="">Comments</a> Mon, 17 Jun 2019 19:21:39 +0000 2019-06-17T19:21:39+00:00 Humble Book Bundle: Programming by Packt Mon, 17 Jun 2019 18:41:44 +0000 2019-06-17T18:41:44+00:00 Demon Core <a href="">Comments</a> Mon, 17 Jun 2019 18:17:14 +0000 2019-06-17T18:17:14+00:00 Classes vs. Data Structures <a href="">Comments</a> Mon, 17 Jun 2019 18:01:44 +0000 2019-06-17T18:01:44+00:00 What Is Dynamic Programming With Python Examples Mon, 17 Jun 2019 17:58:06 +0000 2019-06-17T17:58:06+00:00 Fond (YC W12) Is Hiring an Engineering Manager in Portland <a href="">Comments</a> Mon, 17 Jun 2019 17:53:39 +0000 2019-06-17T17:53:39+00:00 How much are professors paid? <a href="">Comments</a> Mon, 17 Jun 2019 17:51:58 +0000 2019-06-17T17:51:58+00:00 SACK Panic – Multiple TCP-based remote denial-of-service issues <a href="">Comments</a> Mon, 17 Jun 2019 17:50:32 +0000 2019-06-17T17:50:32+00:00 Samsung TVs should be regularly virus-checked, the company says <a href="">Comments</a> Mon, 17 Jun 2019 17:15:06 +0000 2019-06-17T17:15:06+00:00 Presenting the Eshell <a href="">Comments</a> Mon, 17 Jun 2019 17:12:26 +0000 2019-06-17T17:12:26+00:00 Interview with the creators of <a href="">Comments</a> Mon, 17 Jun 2019 17:10:55 +0000 2019-06-17T17:10:55+00:00 Engineering Management: An Overview Mon, 17 Jun 2019 16:47:32 +0000 2019-06-17T16:47:32+00:00 Minnesota court decision means doctors can be sued by patients they don't treat <a href="">Comments</a> Mon, 17 Jun 2019 16:33:31 +0000 2019-06-17T16:33:31+00:00 iOS UI inspiration - design patterns gallery Mon, 17 Jun 2019 16:32:15 +0000 2019-06-17T16:32:15+00:00 Building a Web-Based Motion Graphics Editor <a href="">Comments</a> Mon, 17 Jun 2019 15:57:20 +0000 2019-06-17T15:57:20+00:00 Building & designing a web-based motion graphics editor Mon, 17 Jun 2019 15:54:55 +0000 2019-06-17T15:54:55+00:00 Load Balancer HAProxy 2.0 brings new features for HTTP and the cloud Mon, 17 Jun 2019 15:35:22 +0000 2019-06-17T15:35:22+00:00 Multi Producer & Multi Consumer Wait-Free Queue Mon, 17 Jun 2019 15:25:39 +0000 2019-06-17T15:25:39+00:00 Facebook’s Libra cryptocurrency: Privacy and stability concerns <a href="">Comments</a> Mon, 17 Jun 2019 15:22:33 +0000 2019-06-17T15:22:33+00:00 C++11 lock-free command buffers for multi-thread rendering <a href="">Comments</a> Mon, 17 Jun 2019 15:19:13 +0000 2019-06-17T15:19:13+00:00 Mathematician Disproves Hedetniemi’s Graph Theory Conjecture <a href="">Comments</a> Mon, 17 Jun 2019 15:08:52 +0000 2019-06-17T15:08:52+00:00 The student loan crisis is really an underemployment catastrophe <a href="">Comments</a> Mon, 17 Jun 2019 14:48:54 +0000 2019-06-17T14:48:54+00:00 Asian countries take a stand against the rich world’s plastic waste <a href="">Comments</a> Mon, 17 Jun 2019 14:46:26 +0000 2019-06-17T14:46:26+00:00 SIM swap horror story: I've lost decades of data and Google won't help <a href="">Comments</a> Mon, 17 Jun 2019 14:45:23 +0000 2019-06-17T14:45:23+00:00 Clockwise — tool for teams to get more time for focus — launches with Accel + Greylock Mon, 17 Jun 2019 14:31:13 +0000 2019-06-17T14:31:13+00:00 How to Use Customer Interviews to Find Your Unmet Needs, Decide What to Build, and Refine Your Product Mon, 17 Jun 2019 14:28:30 +0000 2019-06-17T14:28:30+00:00 UX Design Portfolio: Best Practices Mon, 17 Jun 2019 13:49:03 +0000 2019-06-17T13:49:03+00:00 The Future of Docker Desktop for Windows <a href="">Comments</a> Mon, 17 Jun 2019 13:47:52 +0000 2019-06-17T13:47:52+00:00 New Hampshire installs first historical marker to honor computer programming - Honoring the creation of BASIC Mon, 17 Jun 2019 13:24:19 +0000 2019-06-17T13:24:19+00:00 racket/gui saves the day Mon, 17 Jun 2019 12:44:12 +0000 2019-06-17T12:44:12+00:00 New Hampshire installs historical marker to honor the creation of BASIC <a href="">Comments</a> Mon, 17 Jun 2019 12:32:49 +0000 2019-06-17T12:32:49+00:00 The Other Side of React Native — Limitations & Opportunities of React Native Mon, 17 Jun 2019 12:15:19 +0000 2019-06-17T12:15:19+00:00 Advice to Less Experienced Developers Mon, 17 Jun 2019 12:13:21 +0000 2019-06-17T12:13:21+00:00 Why does macOS Catalina use Zsh instead of Bash? Licensing Mon, 17 Jun 2019 12:07:54 +0000 2019-06-17T12:07:54+00:00 GraalVM 19.0: The Anticipated GA Release Mon, 17 Jun 2019 12:02:37 +0000 2019-06-17T12:02:37+00:00 Massimo Issue #25: Studio Dumbar — Todojunto — Diano Kitanovski — AFOM — Studio de Ronners Mon, 17 Jun 2019 11:22:56 +0000 2019-06-17T11:22:56+00:00 GCC should warn about 2^16 and 2^32 and 2^64 Mon, 17 Jun 2019 11:03:02 +0000 2019-06-17T11:03:02+00:00 Malaysia Airlines Flight MH370: Where Is It? <a href="">Comments</a> Mon, 17 Jun 2019 10:31:50 +0000 2019-06-17T10:31:50+00:00 How an Optimizing Compiler works Mon, 17 Jun 2019 09:14:00 +0000 2019-06-17T09:14:00+00:00 Trash talk: the Orinoco garbage collector for JavaScript Mon, 17 Jun 2019 09:12:16 +0000 2019-06-17T09:12:16+00:00 The Outsider's Guide to the Social World <a href="">Comments</a> Mon, 17 Jun 2019 09:12:12 +0000 2019-06-17T09:12:12+00:00 Fun comic website design for JotForm Mobile App Mon, 17 Jun 2019 07:59:31 +0000 2019-06-17T07:59:31+00:00 Death Of IE; Its Aftermath On Cross Browser Compatibility Mon, 17 Jun 2019 07:48:03 +0000 2019-06-17T07:48:03+00:00 Mazda is purging touchscreens from its vehicles <a href="">Comments</a> Mon, 17 Jun 2019 06:11:43 +0000 2019-06-17T06:11:43+00:00 Starting programming when you are +30 years old - my advices Mon, 17 Jun 2019 05:56:55 +0000 2019-06-17T05:56:55+00:00 Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception Mon, 17 Jun 2019 03:48:02 +0000 2019-06-17T03:48:02+00:00 Get NASA's Media Library of Videos and Images For Free Mon, 17 Jun 2019 03:31:19 +0000 2019-06-17T03:31:19+00:00 Towards the Automatic Anime Character Creation with Generative Adversarial Networks Mon, 17 Jun 2019 01:38:56 +0000 2019-06-17T01:38:56+00:00 VisiCalc's Spreadsheets Changed the World <a href="">Comments</a> Sun, 16 Jun 2019 18:24:46 +0000 2019-06-16T18:24:46+00:00 What are the most important things you need to know about a company before applying for a remote design position with them? I'm curious about the most important things you feel you need to know about a company before you would go ahead and apply for a remote design position with them? - tooling, process, design team size etc Sun, 16 Jun 2019 16:24:58 +0000 2019-06-16T16:24:58+00:00 RPCS3 PS3 Emulator - April 2019 Progress Report Sun, 16 Jun 2019 16:13:25 +0000 2019-06-16T16:13:25+00:00 The Rise and Fall of Visual Basic (for all the retro feels) Sun, 16 Jun 2019 15:19:34 +0000 2019-06-16T15:19:34+00:00 Logic – Deductive and Inductive (1898) <a href="">Comments</a> Sun, 16 Jun 2019 04:36:04 +0000 2019-06-16T04:36:04+00:00 Abusing the CPU's Adder Circuits <a href="">Comments</a> Sat, 15 Jun 2019 13:56:19 +0000 2019-06-15T13:56:19+00:00 Calculators for Contractors, Builders, Remodelers, Carpenters, Woodworkers <a href="">Comments</a> Sat, 15 Jun 2019 10:59:26 +0000 2019-06-15T10:59:26+00:00 Self-Driving Cars Have a Problem: Safer Human-Driven Ones <a href="">Comments</a> Sat, 15 Jun 2019 10:38:58 +0000 2019-06-15T10:38:58+00:00 Receiving Dead Satellites with the RTL-SDR (2014) <a href="">Comments</a> Fri, 14 Jun 2019 19:00:01 +0000 2019-06-14T19:00:01+00:00 Sketch for Teams, Smart Layout and More Coming Soon Fri, 14 Jun 2019 16:33:25 +0000 2019-06-14T16:33:25+00:00 Psychology in design Fri, 14 Jun 2019 09:48:18 +0000 2019-06-14T09:48:18+00:00 Google Game Builder Fri, 14 Jun 2019 03:59:22 +0000 2019-06-14T03:59:22+00:00 What Contract Design Work is Still In Demand? I've been collecting and [hand-screening hundreds of contract design jobs]( from places like Dribbble, Behance, AngelList, WWR and more since 2013 - and have definitely noticed fluctuations in demand during that time. So I'm curious what the design community here thinks about the current market for contract design work? Have you noticed a shift in the design skills that are needed? I'd say currently the bulk of the work is in 3 main categories: - [Website Design]( (full websites for small to mid-sized businesses and non-profits) - [Product UI/UX]( (mostly startups and agencies) - [Visual / Graphic Design]( (for all of the above, startups, agencies, non-profits, and small businesses) They're all pretty close in terms of volume but if I had to rank them, I'd put them in this order Curious if anyone wants specific stats for any of this, I have [a database of thousands of design contracts]( and would be happy to share what I can. What do you feel is currently in demand? Thu, 13 Jun 2019 17:19:14 +0000 2019-06-13T17:19:14+00:00 When Time is of the Essence – Testing Controls Against the Latest Threats Faster A new threat has hit head the headlines (Robinhood anyone?), and you need to know if you're protected right now. What do you do? Traditionally, you would have to go with one of the options below. Option 1 – Manually check that IoCs have been updated across your security controls. This would require checking that security controls such as your email gateway, web gateway, and endpoint<img src="" height="1" width="1" alt=""/> Thu, 13 Jun 2019 15:11:12 +0000 2019-06-13T15:11:12+00:00 Roast my startup's website design Thu, 13 Jun 2019 14:18:54 +0000 2019-06-13T14:18:54+00:00 Critical Flaw Reported in Popular Evernote Extension for Chrome Users Cybersecurity researchers discover a critical flaw in the popular Evernote Chrome extension that could have allowed hackers to hijack your browser and steal sensitive information from any website you accessed. Evernote is a popular service that helps people taking notes and organize their to-do task lists, and over 4,610,000 users have been using its Evernote Web Clipper Extension for Chrome<img src="" height="1" width="1" alt=""/> Thu, 13 Jun 2019 13:11:53 +0000 2019-06-13T13:11:53+00:00 Telegram Suffers 'Powerful DDoS Attack' From China During Hong Kong Protests Telegram, one of the most popular encrypted messaging app, briefly went offline yesterday for hundreds of thousands of users worldwide after a powerful distributed denial-of-service (DDoS) attack hit its servers. Telegram founder Pavel Durov later revealed that the attack was mainly coming from the IP addresses located in China, suggesting the Chinese government could be behind it to sabotage<img src="" height="1" width="1" alt=""/> Thu, 13 Jun 2019 10:42:13 +0000 2019-06-13T10:42:13+00:00 Rich Energy May Have To Change Its Logo After Losing A Copyright Claim Thu, 13 Jun 2019 09:39:44 +0000 2019-06-13T09:39:44+00:00 The New Wilderness <a href="">Comments</a> Thu, 13 Jun 2019 08:23:06 +0000 2019-06-13T08:23:06+00:00 The State of CSS 2019 Thu, 13 Jun 2019 03:48:04 +0000 2019-06-13T03:48:04+00:00 Clarity 2.0 is now available with major new components & patterns, support for Figma, Angular 8.0, and more Wed, 12 Jun 2019 20:52:54 +0000 2019-06-12T20:52:54+00:00 Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities Real-time visibility into IT assets and activities introduces speed and efficiency to many critical productivity and security tasks organizations are struggling with—from conventional asset inventory reporting to proactive elimination of exposed attack surfaces. However, gaining such visibility is often highly resource consuming and entails manual integration of various feeds. Cynet is now<img src="" height="1" width="1" alt=""/> Wed, 12 Jun 2019 17:52:45 +0000 2019-06-12T17:52:45+00:00 Android's Built-in Security Key Now Works With iOS Devices For Secure Login In April this year, a software update from Google overnight turned all Android phones, running Android 7.0 Nougat and up, into a FIDO-certified hardware security key as part of a push to encourage two-step verification. The feature made it possible for users to confirm their identity when logging into a Google account more effortless and secure, without separately managing and plugging-in a<img src="" height="1" width="1" alt=""/> Wed, 12 Jun 2019 17:31:47 +0000 2019-06-12T17:31:47+00:00 Easy way to implement 3D and AR to a website Wed, 12 Jun 2019 17:21:41 +0000 2019-06-12T17:21:41+00:00 Listen Together - Collaborative Listening Concept for Spotify Hi guys! Posting here today because probably like most of you, I constantly share music. Some times with friends who are far away. I got fed up with how impractical the state of sharing music was, and realized there’s been little change in social for music streaming. I thought it’d be cool if there was a way for my friends and I to listen to our favorite jams simultaneously, in real time. Add to the queue, react to our picks, reintroduce the experience of bonding over music with friends, but in the digital space. My hope is that Listen Together can start a conversation on collaborative listening, and see where music streaming can be pushed further! What do you guys think? Would you like to see something like this exist? Check out the entire concept at <a href=""></a> Wed, 12 Jun 2019 15:02:05 +0000 2019-06-12T15:02:05+00:00 Updated Google Fonts website Wed, 12 Jun 2019 13:34:40 +0000 2019-06-12T13:34:40+00:00 Appradius website design Wed, 12 Jun 2019 10:49:43 +0000 2019-06-12T10:49:43+00:00 RAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory A team of cybersecurity researchers yesterday revealed details of a new side-channel attack on dynamic random-access memory (DRAM) that could allow malicious programs installed on a modern system to read sensitive memory data from other processes running on the same hardware. Dubbed RAMBleed and identified as CVE-2019-0174, the new attack is based on a well-known class of DRAM side channel<img src="" height="1" width="1" alt=""/> Wed, 12 Jun 2019 10:16:20 +0000 2019-06-12T10:16:20+00:00 Firefox: The Evolution Of A Brand Wed, 12 Jun 2019 08:40:38 +0000 2019-06-12T08:40:38+00:00 Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities After Adobe, the technology giant Microsoft today—on June 2019 Patch Tuesday—also released its monthly batch of software security updates for various supported versions of Windows operating systems and other Microsoft products. This month's security updates include patches for a total of 88 vulnerabilities, 21 are rated Critical, 66 are Important, and one is rated Moderate in severity. The<img src="" height="1" width="1" alt=""/> Tue, 11 Jun 2019 18:49:11 +0000 2019-06-11T18:49:11+00:00 Adobe Issues Critical Patches for ColdFusion, Flash Player, Campaign It's Patch Tuesday week! Adobe has just released the latest June 2019 software updates to address a total 11 security vulnerabilities in its three widely-used products Adobe ColdFusion, Flash Player, and Adobe Campaign. Out of these, three vulnerabilities affect Adobe ColdFusion, a commercial rapid web application development platform—all critical in severity—that could lead to arbitrary<img src="" height="1" width="1" alt=""/> Tue, 11 Jun 2019 18:45:36 +0000 2019-06-11T18:45:36+00:00 New Flaw in WordPress Live Chat Plugin Lets Hackers Steal and Hijack Sessions Security researchers have been warning about a critical vulnerability they discovered in one of a popular WordPress Live Chat plugin, which, if exploited, could allow unauthorized remote attackers to steal chat logs or manipulate chat sessions. The vulnerability, identified as CVE-2019-12498, resides in the "WP Live Chat Support" that is currently being used by over 50,000 businesses to<img src="" height="1" width="1" alt=""/> Tue, 11 Jun 2019 10:41:22 +0000 2019-06-11T10:41:22+00:00 Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor Linux users, beware! If you haven't recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim. Security researcher Armin Razmjou recently discovered a high-severity arbitrary OS command execution vulnerability (CVE-2019-12735) in Vim and Neovim—two most popular and powerful command-line<img src="" height="1" width="1" alt=""/> Mon, 10 Jun 2019 18:26:48 +0000 2019-06-10T18:26:48+00:00 Hacker Discloses Second Zero-Day to Bypass Patch for Windows EoP Flaw An anonymous security researcher going by the name of SandboxEscaper today publicly shared a second zero-day exploit that can be used to bypass a recently patched elevation of privilege vulnerability in the Microsoft Windows operating system. SandboxEscaper is known for publicly dropping zero-day exploits for unpatched Windows vulnerabilities. In the past year, the hacker has disclosed over half<img src="" height="1" width="1" alt=""/> Fri, 07 Jun 2019 10:52:16 +0000 2019-06-07T10:52:16+00:00 New Brute-Force Botnet Targeting Over 1.5 Million RDP Servers Worldwide Security researchers have discovered an ongoing sophisticated botnet campaign that is currently brute-forcing more than 1.5 million publicly accessible Windows RDP servers on the Internet. Dubbed GoldBrute, the botnet scheme has been designed in a way to escalate gradually by adding every new cracked system to its network, forcing them to further find new available RDP servers and then brute<img src="" height="1" width="1" alt=""/> Fri, 07 Jun 2019 09:22:07 +0000 2019-06-07T09:22:07+00:00 The clever cryptography behind Apple’s “Find My” feature You can track down your stolen MacBook, but no one else can—not even Apple. Thu, 06 Jun 2019 19:16:01 +0000 2019-06-06T19:16:01+00:00 Cryptocurrency Firm Itself Hacked Its Customers to Protect Their Funds From Hackers Are you using Komodo's Agama Wallet to store your KMD and BTC cryptocurrencies? Were your funds also unauthorisedly transferred overnight to a new address? If yes, don't worry, it's probably safe, and if you are lucky, you will get your funds back. Here's what exactly happened… Komodo, a cryptocurrency project and developer of Agama wallet, adopted a surprisingly unique way to protect its<img src="" height="1" width="1" alt=""/> Thu, 06 Jun 2019 13:14:53 +0000 2019-06-06T13:14:53+00:00 CompTIA Certification Training — Get Online Courses @ 95% OFF The Information Technology industry has seen exponential growth over the years. It is essential for everyone to earn cybersecurity certification if you want to be a part of this growing industry. Organizations always prefer employees with strong internationally-recognized professional certifications. It proofs your skills, knowledge, and gives more credibility to advance your career. IT<img src="" height="1" width="1" alt=""/> Thu, 06 Jun 2019 13:07:20 +0000 2019-06-06T13:07:20+00:00 Critical Flaws Found in Widely Used IPTV Software for Online Streaming Services Security researchers have discovered multiple critical vulnerabilities in a popular IPTV middleware platform that is currently being used by more than a thousand regional and international online media streaming services to manage their millions of subscribers. Discovered by security researchers at CheckPoint, the vulnerabilities reside in the administrative panel of Ministra TV platform,<img src="" height="1" width="1" alt=""/> Thu, 06 Jun 2019 09:54:52 +0000 2019-06-06T09:54:52+00:00 Unpatched Bug Let Attackers Bypass Windows Lock Screen On RDP Sessions A security researcher today revealed details of a newly unpatched vulnerability in Microsoft Windows Remote Desktop Protocol (RDP). Tracked as CVE-2019-9510, the reported vulnerability could allow client-side attackers to bypass the lock screen on remote desktop (RD) sessions. Discovered by Joe Tammariello of Carnegie Mellon University Software Engineering Institute (SEI), the flaw exists<img src="" height="1" width="1" alt=""/> Wed, 05 Jun 2019 09:30:13 +0000 2019-06-05T09:30:13+00:00 Firefox Web Browser Now Blocks Third-Party Tracking Cookies By Default As promised, Mozilla has finally enabled "Enhanced Tracking Protection" feature on its Firefox browser by default, which from now onwards would automatically block all third-party tracking cookies that allow advertisers and websites to track you across the web. Tracking cookies, also known as third-party cookies, allows advertisers to monitor your online behavior and interests, using which<img src="" height="1" width="1" alt=""/> Tue, 04 Jun 2019 17:57:11 +0000 2019-06-04T17:57:11+00:00 Apple Launches Privacy-Focused 'Sign in with Apple ID' Feature at WWDC 2019 Just like 'login with Google,' 'login with Facebook,' Twitter, LinkedIn or any other social media site, you would now be able to quickly sign-up and log into third-party websites and apps using your Apple ID. What's the difference? Well, Apple claims that signing-in with Apple ID would protect users' privacy by not disclosing their actual email addresses to the 3rd-party services and also<img src="" height="1" width="1" alt=""/> Tue, 04 Jun 2019 16:37:30 +0000 2019-06-04T16:37:30+00:00 macOS 0-Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks A security researcher who last year bypassed Apple's then-newly introduced macOS privacy feature has once again found a new way to bypass security warnings by performing 'Synthetic Clicks' on behalf of users without requiring their interaction. Last June, Apple introduced a core security feature in MacOS that made it mandatory for all applications to take permission ("allow" or "deny") from<img src="" height="1" width="1" alt=""/> Mon, 03 Jun 2019 16:08:51 +0000 2019-06-03T16:08:51+00:00 SUPRA Smart TV Flaw Lets Attackers Hijack Screens With Any Video I have said it before, and I will say it again — Smart devices are one of the dumbest technologies, so far, when it comes to protecting users' privacy and security. As more and more smart devices are being sold worldwide, consumers should be aware of security and privacy risks associated with the so-called intelligent devices. When it comes to internet-connected devices, smart TVs are the<img src="" height="1" width="1" alt=""/> Mon, 03 Jun 2019 09:15:13 +0000 2019-06-03T09:15:13+00:00 Hackers Stole Customers' Credit Cards from 103 Checkers and Rally's Restaurants If you have swiped your payment card at the popular Checkers and Rally's drive-through restaurant chains in past 2-3 years, you should immediately request your bank to block your card and notify it if you notice any suspicious transaction. Checkers, one of the largest drive-through restaurant chains in the United States, disclosed a massive long-running data breach yesterday that affected an<img src="" height="1" width="1" alt=""/> Fri, 31 May 2019 08:20:27 +0000 2019-05-31T08:20:27+00:00 Hackers Infect 50,000 MS-SQL and PHPMyAdmin Servers with Rootkit Malware Cyber Security researchers at Guardicore Labs today published a detailed report on a widespread cryptojacking campaign attacking Windows MS-SQL and PHPMyAdmin servers worldwide. Dubbed Nansh0u, the malicious campaign is reportedly being carried out by an APT-style Chinese hacking group who has already infected nearly 50,000 servers and are installing a sophisticated kernel-mode rootkit on<img src="" height="1" width="1" alt=""/> Wed, 29 May 2019 18:53:49 +0000 2019-05-29T18:53:49+00:00 Top 5 Last-Minute Memorial Day Deals at THN Store → Get 60% Extra OFF Memorial Day has come and gone, but you still have time to land some of the best deals on some of the best apps and tech training bundles around. Whether you're looking for a world-class VPN or want to begin a career as a high-paid ethical hacker or IT pro, this list of ultra-discounted apps and course bundles has you covered. Ethical Hacking A to Z Training Bundle MSRP: $1273 - Sale Price<img src="" height="1" width="1" alt=""/> Wed, 29 May 2019 18:06:46 +0000 2019-05-29T18:06:46+00:00 Flipboard Database Hacked — Users' Account Information Exposed Flipboard, a popular social sharing and news aggregator service used by over 150 million people, has disclosed that its databases containing account information of certain users have been hacked. According to a public note published yesterday by the company, unknown hackers managed to gain unauthorized access to its systems for nearly 10 months—between June 2, 2018, and March 23, 2019, and<img src="" height="1" width="1" alt=""/> Wed, 29 May 2019 10:27:10 +0000 2019-05-29T10:27:10+00:00 Nearly 1 Million Computers Still Vulnerable to "Wormable" BlueKeep RDP Flaw Nearly 1 million Windows systems are still unpatched and have been found vulnerable to a recently disclosed critical, wormable, remote code execution vulnerability in the Windows Remote Desktop Protocol (RDP)—two weeks after Microsoft releases the security patch. If exploited, the vulnerability could allow an attacker to easily cause havoc around the world, potentially much worse than what<img src="" height="1" width="1" alt=""/> Tue, 28 May 2019 12:08:09 +0000 2019-05-28T12:08:09+00:00 Windows 10 May 2019 Update now rolling out to everyone… slowly Unless you explicitly want it installed, you probably won't get this update. Tue, 21 May 2019 20:50:24 +0000 2019-05-21T20:50:24+00:00 >20,000 Linksys routers leak historic record of every device ever connected Linksys said it fixed flaw in 2014. Researcher Troy Mursch disagrees. Sat, 18 May 2019 11:45:24 +0000 2019-05-18T11:45:24+00:00 The radio navigation planes use to land safely is insecure and can be hacked Radios that sell for $600 can spoof signals planes use to find runways. Wed, 15 May 2019 10:00:36 +0000 2019-05-15T10:00:36+00:00 New speculative execution bug leaks data from Intel chips’ internal buffers Intel-specific vulnerability was found by researchers both inside and outside the company. Tue, 14 May 2019 18:10:55 +0000 2019-05-14T18:10:55+00:00 Bloomberg alleges Huawei routers and network gear are backdoored Details are scarce, but the "backdoor" appears to be benign. Tue, 30 Apr 2019 18:37:04 +0000 2019-04-30T18:37:04+00:00 Password1, Password2, Password3 no more: Microsoft drops password expiration rec For years, Microsoft's baseline security policy has expired passwords after 60 days. Thu, 25 Apr 2019 17:46:08 +0000 2019-04-25T17:46:08+00:00 McAfee joins Sophos, Avira, Avast—the latest Windows update breaks them all A range of fixes and workarounds have been published. Fri, 19 Apr 2019 16:26:59 +0000 2019-04-19T16:26:59+00:00 Hackers could read non-corporate, Hotmail for six months Hackers and Microsoft seem to disagree on key details of the hack. Mon, 15 Apr 2019 15:14:19 +0000 2019-04-15T15:14:19+00:00 To catch a drug thief, hospital secretly recorded births, women’s surgeries 81 women claim their privacy was violated as hospital tried to trap a drug thief. Wed, 03 Apr 2019 15:41:05 +0000 2019-04-03T15:41:05+00:00 Woman from China, with malware in tow, illegally entered Trump’s Mar-a-Lago Event raises serious questions about security practices of the US Secret Service. Wed, 03 Apr 2019 00:30:06 +0000 2019-04-03T00:30:06+00:00 How Microsoft found a Huawei driver that opened systems to attack Monitoring systems were looking for attacks using technique popularized by the NSA. Tue, 26 Mar 2019 19:03:08 +0000 2019-03-26T19:03:08+00:00 Microsoft ships antivirus for macOS as Windows Defender becomes Microsoft Defender Microsoft is expanding the reach of its device management services. Thu, 21 Mar 2019 15:57:59 +0000 2019-03-21T15:57:59+00:00 Google, Microsoft work together for a year to figure out new type of Windows flaw Researcher finds building blocks for privilege escalation: Can they be assembled to create a flaw? Mon, 18 Mar 2019 18:36:59 +0000 2019-03-18T18:36:59+00:00 Epic says its Game Store is not spying on you But Sweeney says it will stop accessing Steam friends lists without permission. Fri, 15 Mar 2019 16:43:12 +0000 2019-03-15T16:43:12+00:00 An email marketing company left 809 million records exposed online 150GB database included mortgage amounts, info on credit ratings. Sat, 09 Mar 2019 18:36:53 +0000 2019-03-09T18:36:53+00:00 The rise of tech-worker activism Video: Leigh Honeywell created Never Again pledge and a company devoted to tech-worker safety. Fri, 01 Mar 2019 14:00:19 +0000 2019-03-01T14:00:19+00:00 Microsoft’s latest security service uses human intelligence, not artificial Computers are good at processing vast amounts of data, but humans still have their uses. Thu, 28 Feb 2019 17:21:26 +0000 2019-02-28T17:21:26+00:00 Google: Software is never going to be able to fix Spectre-type bugs Researchers also devise a Spectre-like attack with no known mitigation. Sat, 23 Feb 2019 17:30:15 +0000 2019-02-23T17:30:15+00:00 Mandatory update coming to Windows 7, 2008 to kill off weak update hashes Microsoft is phasing out SHA-1 hashes on its patches. Tue, 19 Feb 2019 17:10:23 +0000 2019-02-19T17:10:23+00:00