Code & Design News Aggregator of Code, Security and Design news sites. Sun, 24 May 2020 22:30:52 +0000 I Wacked My Boss For Fun | Whack Your Boss Sun, 24 May 2020 22:19:52 +0000 2020-05-24T22:19:52+00:00 [Self Promotion] I work with Genetic Algorithms in my professional life and loved them enough to make a series about it. Today marks the 6th video in the series, this video is on convergence! I've posted for previous videos and loved the feedback. If you're interested, please check it out. Sun, 24 May 2020 22:10:24 +0000 2020-05-24T22:10:24+00:00 Web Scraping using JavaScript (Node.js + Puppeteer) Sun, 24 May 2020 22:08:58 +0000 2020-05-24T22:08:58+00:00 Fmt – A Modern Formatting Library <a href="">Comments</a> Sun, 24 May 2020 22:07:41 +0000 2020-05-24T22:07:41+00:00 fast_io. A new C++ 20 Concepts I/O library that is at least 10x faster than stdio.h and iostream. 6x faster than fmt Sun, 24 May 2020 22:03:23 +0000 2020-05-24T22:03:23+00:00 Best Command Promote Tricks Sun, 24 May 2020 21:49:25 +0000 2020-05-24T21:49:25+00:00 Ask HN: If you could work remote where would you live? <a href="">Comments</a> Sun, 24 May 2020 21:06:50 +0000 2020-05-24T21:06:50+00:00 Implementing simple cooperative threads in C Sun, 24 May 2020 20:41:28 +0000 2020-05-24T20:41:28+00:00 With remote work plan, Facebook dashes hopes of paycheck arbitrage <a href="">Comments</a> Sun, 24 May 2020 20:28:21 +0000 2020-05-24T20:28:21+00:00 The Mediocre Programmer Sun, 24 May 2020 20:14:01 +0000 2020-05-24T20:14:01+00:00 The Chiral Puzzle of Life <a href="">Comments</a> Sun, 24 May 2020 20:07:58 +0000 2020-05-24T20:07:58+00:00 Revisiting Old Flash Games | The McDonald's Game Sun, 24 May 2020 20:01:08 +0000 2020-05-24T20:01:08+00:00 Hard-Coding Bottom-Up Code Generation Tables to Save Time and Space (1991) [pdf];jsessionid=8E1E2F91F95973FD5873D5ABEB80A536?doi= <a href="">Comments</a> Sun, 24 May 2020 20:00:31 +0000 2020-05-24T20:00:31+00:00 In-person services may never operate strictly in-person again <a href="">Comments</a> Sun, 24 May 2020 19:33:49 +0000 2020-05-24T19:33:49+00:00 GECODE - An open, free, efficient constraint solving toolkit Sun, 24 May 2020 19:00:55 +0000 2020-05-24T19:00:55+00:00 BaseSAFE: Baseband SAnitized Fuzzing Through Emulation <a href="">Comments</a> Sun, 24 May 2020 18:57:14 +0000 2020-05-24T18:57:14+00:00 Implementing simple cooperative threads in C <a href="">Comments</a> Sun, 24 May 2020 18:47:28 +0000 2020-05-24T18:47:28+00:00 Writing and the narrative fallacy (2018) <a href="">Comments</a> Sun, 24 May 2020 18:26:38 +0000 2020-05-24T18:26:38+00:00 Lets Draw Together <a href="">Comments</a> Sun, 24 May 2020 18:23:45 +0000 2020-05-24T18:23:45+00:00 Caffeine: A vitamin-like nutrient, or adaptogen <a href="">Comments</a> Sun, 24 May 2020 18:07:15 +0000 2020-05-24T18:07:15+00:00 Self Supervised Learning in NLP <a href="">Comments</a> Sun, 24 May 2020 17:07:17 +0000 2020-05-24T17:07:17+00:00 Pantai Remis Landslide <a href="">Comments</a> Sun, 24 May 2020 16:58:38 +0000 2020-05-24T16:58:38+00:00 Running Lisp in Production (2015) <a href="">Comments</a> Sun, 24 May 2020 16:55:24 +0000 2020-05-24T16:55:24+00:00 Most book clubs are doing it wrong (2017) <a href="">Comments</a> Sun, 24 May 2020 16:48:45 +0000 2020-05-24T16:48:45+00:00 Getting started with GraphQL and Apollo on iOS Sun, 24 May 2020 16:27:09 +0000 2020-05-24T16:27:09+00:00 A Simple Python Color Module | SCPrint | My First Module Sun, 24 May 2020 15:35:41 +0000 2020-05-24T15:35:41+00:00 Show HN: Bosconian (1981), in 3-D <a href="">Comments</a> Sun, 24 May 2020 14:43:53 +0000 2020-05-24T14:43:53+00:00 MongoDB fails to preserve snapshot isolation even at strongest r/w concerns Sun, 24 May 2020 13:58:06 +0000 2020-05-24T13:58:06+00:00 Adventures of porting MUSL to PS4 Sun, 24 May 2020 13:52:03 +0000 2020-05-24T13:52:03+00:00 The Big List of Naughty Strings <a href="">Comments</a> Sun, 24 May 2020 13:44:56 +0000 2020-05-24T13:44:56+00:00 One-Word Domains <a href="">Comments</a> Sun, 24 May 2020 13:26:12 +0000 2020-05-24T13:26:12+00:00 How to Create a Strong Value Proposition for B2B Sun, 24 May 2020 13:13:59 +0000 2020-05-24T13:13:59+00:00 The Chromium project finds that around 70% of our serious security bugs are memory safety problems. Our next major project is to prevent such bugs at source. Sun, 24 May 2020 12:57:07 +0000 2020-05-24T12:57:07+00:00 Don’t Be Afraid of RAID <a href="">Comments</a> Sun, 24 May 2020 12:13:13 +0000 2020-05-24T12:13:13+00:00 Habits of High-Functioning Teams <a href="">Comments</a> Sun, 24 May 2020 12:11:52 +0000 2020-05-24T12:11:52+00:00 Jepsen: MongoDB 4.2.6 <a href="">Comments</a> Sun, 24 May 2020 11:42:01 +0000 2020-05-24T11:42:01+00:00 Tuxedo Book BA15: AMD-only and Linux-preinstalled laptop <a href="">Comments</a> Sun, 24 May 2020 11:32:16 +0000 2020-05-24T11:32:16+00:00 Trie: Data Structure Explained Sun, 24 May 2020 11:06:22 +0000 2020-05-24T11:06:22+00:00 Mythical Man Month: Why more manpower doesn’t mean faster work Sun, 24 May 2020 10:42:09 +0000 2020-05-24T10:42:09+00:00 How to setup Selenium on Node Sun, 24 May 2020 09:37:10 +0000 2020-05-24T09:37:10+00:00 How the biggest consumer apps got their first 1k users <a href="">Comments</a> Sun, 24 May 2020 08:45:49 +0000 2020-05-24T08:45:49+00:00 Generating random numbers using C++ standard library: the solutions Sun, 24 May 2020 08:11:28 +0000 2020-05-24T08:11:28+00:00 Testing Distributed Systems with Deterministic Simulation (2014) [video] <a href="">Comments</a> Sun, 24 May 2020 06:26:54 +0000 2020-05-24T06:26:54+00:00 Guide to Concurrency in Python with Asyncio <a href="">Comments</a> Sun, 24 May 2020 06:18:22 +0000 2020-05-24T06:18:22+00:00 Analyzing The Simplest C++ Program (in gory detail) Sun, 24 May 2020 04:04:09 +0000 2020-05-24T04:04:09+00:00 Scaling SQLite to 4M QPS on a Single Server (EC2 vs Bare Metal) Sun, 24 May 2020 03:10:05 +0000 2020-05-24T03:10:05+00:00 Stackoverflow Architecture: 2013 vs 2016 Sun, 24 May 2020 03:09:24 +0000 2020-05-24T03:09:24+00:00 neut - a dependently-typed programming language with compile-time malloc/free determination Sun, 24 May 2020 02:33:03 +0000 2020-05-24T02:33:03+00:00 Assembly’s Perspective of C Sat, 23 May 2020 23:09:31 +0000 2020-05-23T23:09:31+00:00 Chrome: 70% of all security bugs are memory safety issues Sat, 23 May 2020 20:17:27 +0000 2020-05-23T20:17:27+00:00 Tutorial: how to create neomorphic web components/elements with only CSS and HTML Sat, 23 May 2020 13:31:59 +0000 2020-05-23T13:31:59+00:00 MiniConf: A Virtual Conference in a Box <a href="">Comments</a> Sat, 23 May 2020 11:35:26 +0000 2020-05-23T11:35:26+00:00 On the Observability of Pauli Crystals in Lithium <a href="">Comments</a> Sat, 23 May 2020 10:36:33 +0000 2020-05-23T10:36:33+00:00 The Challenge of Cross-language Interoperability (2013) <a href="">Comments</a> Sat, 23 May 2020 10:08:34 +0000 2020-05-23T10:08:34+00:00 Page Automator, Figma Plugin to automate creating pages! Sat, 23 May 2020 06:45:30 +0000 2020-05-23T06:45:30+00:00 Windows 10 quietly got a built-in network sniffer, how to use Sat, 23 May 2020 03:12:36 +0000 2020-05-23T03:12:36+00:00 Inspiration board on Figma Fri, 22 May 2020 17:43:26 +0000 2020-05-22T17:43:26+00:00 - an interactive CSS toolbox to make animations, box-shadows, colors, and more Fri, 22 May 2020 16:12:04 +0000 2020-05-22T16:12:04+00:00 Simple Hover Design on Adobe XD Fri, 22 May 2020 14:55:18 +0000 2020-05-22T14:55:18+00:00 New logo and website design for Capture One Fri, 22 May 2020 12:05:21 +0000 2020-05-22T12:05:21+00:00 A 1973 IBM Selectric typeball recorded dancers' body movements <a href="">Comments</a> Fri, 22 May 2020 11:08:37 +0000 2020-05-22T11:08:37+00:00 The illusion of fast function Fri, 22 May 2020 09:40:30 +0000 2020-05-22T09:40:30+00:00 Will My Job Give Me Covid-19? (from the creators of Will Robots Take My Job?) Fri, 22 May 2020 07:35:22 +0000 2020-05-22T07:35:22+00:00 My New FreeBSD Laptop: Dell Latitude 7390 <a href="">Comments</a> Fri, 22 May 2020 01:35:38 +0000 2020-05-22T01:35:38+00:00 Headspace UX Case study: balancing free and paid content Thu, 21 May 2020 15:08:32 +0000 2020-05-21T15:08:32+00:00 The Easiest Guide to Webflow for Beginners Hi DesignerNews! Webflow is getting massively popular. And in my eyes an incredible way how to step up your web design/prototyping game. So I've decided to write down all of the important bits and pieces about Webflow that I learned and incorporated into my daily work. These will help you jump quickly into creating without wondering which elements you should use and struggling to find a way around the interface. I've also recorded all of the tips in a relatively short Youtube video! Let me know what do you think and if you are planning on moving to Webflow as well! *P.S.: This guide is completely non-technical, in fact — I moved to Webflow as a designer and can’t on my own write a single line of code, yet I'm now delivering clients fully functional websites.* **Medium Article**: **Youtube Video**: Thu, 21 May 2020 12:07:16 +0000 2020-05-21T12:07:16+00:00 How Cybersecurity Enables Government, Health, EduTech Cope With COVID-19 The advent of the Covid-19 pandemic and the impact on our society has resulted in many dramatic changes to how people are traveling, interacting with each other, and collaborating at work. There are several trends taking place as a consequence of the outbreak, which has only continued to heighten the need for the tightest possible cybersecurity. Tools for Collaboration There has been a<img src="" height="1" width="1" alt=""/> Thu, 21 May 2020 11:34:21 +0000 2020-05-21T11:34:21+00:00 Awesome European Racing Cars from 80' illustrated Thu, 21 May 2020 09:20:34 +0000 2020-05-21T09:20:34+00:00 Iranian APT Group Targets Governments in Kuwait and Saudi Arabia Today, cybersecurity researchers shed light on an Iranian cyber espionage campaign directed against critical infrastructures in Kuwait and Saudi Arabia. Bitdefender said the intelligence-gathering operations were conducted by Chafer APT (also known as APT39 or Remix Kitten), a threat actor known for its attacks on telecommunication and travel industries in the Middle East to collect personal<img src="" height="1" width="1" alt=""/> Thu, 21 May 2020 08:11:42 +0000 2020-05-21T08:11:42+00:00 New Bluetooth Vulnerability Exposes Billions of Devices to Hackers Academics from École Polytechnique Fédérale de Lausanne (EPFL) disclosed a security vulnerability in Bluetooth that could potentially allow an attacker to spoof a remotely paired device, exposing over a billion of modern devices to hackers. The attacks, dubbed Bluetooth Impersonation AttackS or BIAS, concern Bluetooth Classic, which supports Basic Rate (BR) and Enhanced Data Rate (EDR) for<img src="" height="1" width="1" alt=""/> Thu, 21 May 2020 07:02:37 +0000 2020-05-21T07:02:37+00:00 Hello Worthi Hello Design Gang, Ventures Studio launched today a new product to help people grow skills and know what skills they can use to transfer to a new role. Give it a try! Thu, 21 May 2020 06:34:49 +0000 2020-05-21T06:34:49+00:00 Cute Illustrations - Created on Procreate Wed, 20 May 2020 20:12:26 +0000 2020-05-20T20:12:26+00:00 Detailed Logo Design Tutorial using Procreate Wed, 20 May 2020 13:49:42 +0000 2020-05-20T13:49:42+00:00 [Guide] Finding Best Security Outsourcing Alternative for Your Organization As cyberattacks continue to proliferate in volume and increase in sophistication, many organizations acknowledge that some part of their breach protection must be outsourced, introducing a million-dollar question of what type of service to choose form. Today, Cynet releases the Security Outsourcing Guide (download here), providing IT Security executives with clear and actionable guidance on<img src="" height="1" width="1" alt=""/> Wed, 20 May 2020 13:11:45 +0000 2020-05-20T13:11:45+00:00 Design Articles Without The Paywall: Open Stories Wed, 20 May 2020 11:48:28 +0000 2020-05-20T11:48:28+00:00 New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service (DDoS) attacks to takedown targeted websites. Called NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker's choice,<img src="" height="1" width="1" alt=""/> Wed, 20 May 2020 11:16:00 +0000 2020-05-20T11:16:00+00:00 Ukrainian Police Arrest Hacker Who Tried Selling Billions of Stolen Records The Ukrainian police have arrested a hacker who made headlines in January last year by posting a massive database containing some 773 million stolen email addresses and 21 million unique plaintext passwords for sale on various underground hacking forums. In an official statement released on Tuesday, the Security Service of Ukraine (SBU) said it identified the hacker behind the pseudonym "Sanix<img src="" height="1" width="1" alt=""/> Wed, 20 May 2020 10:33:03 +0000 2020-05-20T10:33:03+00:00 Plaster 2 - Mobile Design Kit for Android & iOS Wed, 20 May 2020 09:11:19 +0000 2020-05-20T09:11:19+00:00 What was most annoying part of preparing UX Case Study for your portfolio? Like on Medium or Behance or for your personal website. Wed, 20 May 2020 06:51:26 +0000 2020-05-20T06:51:26+00:00 The COVID-19 Freelancer Email Template Tue, 19 May 2020 22:44:21 +0000 2020-05-19T22:44:21+00:00 Webflow announces its World Tour 2020 Tue, 19 May 2020 16:42:04 +0000 2020-05-19T16:42:04+00:00 Smooth & Beautiful Scroll Animation Using Vanilla Javascript Plugin Lax.js Tutorial is here [Watch Now]( Tue, 19 May 2020 16:35:15 +0000 2020-05-19T16:35:15+00:00 Brazil's Biggest Cosmetic Brand Natura Exposes Personal Details of Its Users Brazil's biggest cosmetics company Natura accidentally left hundreds of gigabytes of its customers' personal and payment-related information publicly accessible online that could have been accessed by anyone without authentication. SafetyDetective researcher Anurag Sen last month discovered two unprotected Amazon-hosted servers—with 272GB and 1.3TB in size—belonging to Natura that consisted of<img src="" height="1" width="1" alt=""/> Tue, 19 May 2020 16:18:47 +0000 2020-05-19T16:18:47+00:00 Framer Web now available Tue, 19 May 2020 15:07:57 +0000 2020-05-19T15:07:57+00:00 British Airline EasyJet Suffers Data Breach Exposing 9 Million Customers' Data British low-cost airline EasyJet today admitted that the company has fallen victim to a cyber-attack, which it labeled "highly sophisticated," exposing email addresses and travel details of around 9 million of its customers. In an official statement released today, EasyJet confirmed that of the 9 million affected users, a small subset of customers, i.e., 2,208 customers, have also had their<img src="" height="1" width="1" alt=""/> Tue, 19 May 2020 13:50:41 +0000 2020-05-19T13:50:41+00:00 5 Things to Know to Become a Successful Digital Product Designer Tue, 19 May 2020 09:55:59 +0000 2020-05-19T09:55:59+00:00 YouTube Videos for Designers and Developers Tue, 19 May 2020 09:21:02 +0000 2020-05-19T09:21:02+00:00 Sponsor: Biggest Lessons Learned From Experience Design Experts Mon, 18 May 2020 14:41:54 +0000 2020-05-18T14:41:54+00:00 HTTP Status Codes Command This Malware How to Control Hacked Systems A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe. The cyberespionage malware—traced to Turla APT with "medium-to-low level of confidence" based on the history of compromised victims—spread via an initial dropper that masks itself as<img src="" height="1" width="1" alt=""/> Fri, 15 May 2020 09:43:00 +0000 2020-05-15T09:43:00+00:00 Effective Business Continuity Plans Require CISOs to Rethink WAN Connectivity As more businesses leverage remote, mobile, and temporary workforces, the elements of business continuity planning are evolving and requiring that IT professionals look deep into the nuts and bolts of connectivity. CISOs and their team members are facing new challenges each and every day, many of which have been driven by digital transformation, as well as the adoption of other<img src="" height="1" width="1" alt=""/> Thu, 14 May 2020 11:16:02 +0000 2020-05-14T11:16:02+00:00 Improper Microsoft Patch for Reverse RDP Attacks Leaves 3rd-Party RDP Clients Vulnerable Remember the Reverse RDP Attack—wherein a client system vulnerable to a path traversal vulnerability could get compromised when remotely accessing a server over Microsoft's Remote Desktop Protocol? Though Microsoft had patched the vulnerability (CVE-2019-0887) as part of its July 2019 Patch Tuesday update, it turns out researchers were able to bypass the patch just by replacing the backward<img src="" height="1" width="1" alt=""/> Thu, 14 May 2020 10:24:50 +0000 2020-05-14T10:24:50+00:00 U.S Defense Warns of 3 New Malware Used by North Korean Hackers Yesterday, on the 3rd anniversary of the infamous global WannaCry ransomware outbreak for which North Korea was blamed, the U.S. government released information about three new malware strains used by state-sponsored North Korean hackers. Called COPPERHEDGE, TAINTEDSCRIBE, and PEBBLEDASH, the malware variants are capable of remote reconnaissance and exfiltration of sensitive information from<img src="" height="1" width="1" alt=""/> Wed, 13 May 2020 15:04:23 +0000 2020-05-13T15:04:23+00:00 Researcher Spots New Malware Claimed to be 'Tailored for Air‑Gapped Networks' A cybersecurity researcher at ESET today published an analysis of a new piece of malware, a sample of which they spotted on the Virustotal malware scanning engine and believe the hacker behind it is likely interested in some high-value computers protected behind air‑gapped networks. Dubbed 'Ramsay,' the malware is still under development with two more variants (v2.a and v2.b) spotted in the<img src="" height="1" width="1" alt=""/> Wed, 13 May 2020 14:54:43 +0000 2020-05-13T14:54:43+00:00 Cynet Offers IR Specialists Grants up to $1500 for each IR Engagement In the past, the autonomous breach protection company Cynet announced that it is making Cynet 360 threat detection and response platform available at no charge for IR (incident response) service providers and consultants. Today Cynet takes another step and announces a $500 grant for Incident Responders for each IR engagement in which Cynet 360 was used, with an additional $1,000 grant if the<img src="" height="1" width="1" alt=""/> Tue, 12 May 2020 23:09:05 +0000 2020-05-12T23:09:05+00:00 Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase Databases More than 4,000 Android apps that use Google's cloud-hosted Firebase databases are 'unknowingly' leaking sensitive information on their users, including their email addresses, usernames, passwords, phone numbers, full names, chat messages and location data. The investigation, led by Bob Diachenko from Security Discovery in partnership with Comparitech, is the result of an analysis of 15,735<img src="" height="1" width="1" alt=""/> Tue, 12 May 2020 10:37:18 +0000 2020-05-12T10:37:18+00:00 An Undisclosed Critical Vulnerability Affect vBulletin Forums — Patch Now If you are running an online discussion forum based on vBulletin software, make sure it has been updated to install a newly issued security patch that fixes a critical vulnerability. Maintainers of the vBulletin project recently announced an important patch update but didn't reveal any information on the underlying security vulnerability, identified as CVE-2020-12720. Written in PHP<img src="" height="1" width="1" alt=""/> Mon, 11 May 2020 19:11:00 +0000 2020-05-11T19:11:00+00:00 7 New Flaws Affect All Thunderbolt-equipped Computers Sold in the Last 9 Years A cybersecurity researcher today uncovers a set of 7 new unpatchable hardware vulnerabilities that affect all desktops and laptops sold in the past 9 years with Thunderbolt, or Thunderbolt-compatible USB-C ports. Collectively dubbed 'ThunderSpy,' the vulnerabilities can be exploited in 9 realistic evil-maid attack scenarios, primarily to steal data or read/write all of the system memory of a<img src="" height="1" width="1" alt=""/> Mon, 11 May 2020 16:28:30 +0000 2020-05-11T16:28:30+00:00 DigitalOcean Data Leak Incident Exposed Some of Its Customers Data DigitalOcean, one of the biggest modern web hosting platforms, recently hit with a concerning data leak incident that exposed some of its customers' data to unknown and unauthorized third parties. Though the hosting company has not yet publicly released a statement, it did has started warning affected customers of the scope of the breach via an email. According to the breach notification<img src="" height="1" width="1" alt=""/> Fri, 08 May 2020 22:03:00 +0000 2020-05-08T22:03:00+00:00 This Asia-Pacific Cyber Espionage Campaign Went Undetected for 5 Years An advanced group of Chinese hackers has recently been spotted to be behind a sustained cyber espionage campaign targeting government entities in Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar, and Brunei—which went undetected for at least five years and is still an ongoing threat. The group, named 'Naikon APT,' once known as one of the most active APTs in Asia until 2015,<img src="" height="1" width="1" alt=""/> Thu, 07 May 2020 09:59:30 +0000 2020-05-07T09:59:30+00:00 Facebook Launches 'Discover,' A Secure Proxy to Browse the Internet for Free More than six years after Facebook launched its ambitious Free Basics program to bring the Internet to the masses, the social network is back at it again with a new zero-rating initiative called Discover. The service, available as a mobile web and Android app, allows users to browse the Internet using free daily data caps. Facebook Discover is currently being tested in Peru in partnership<img src="" height="1" width="1" alt=""/> Wed, 06 May 2020 13:19:38 +0000 2020-05-06T13:19:38+00:00 Hackers Breach LineageOS, Ghost, DigiCert Servers Using SaltStack Vulnerability Days after cybersecurity researchers sounded the alarm over two critical vulnerabilities in the SaltStack configuration framework, a hacking campaign has already begun exploiting the flaws to breach servers of LineageOS, Ghost, and DigiCert. Tracked as CVE-2020-11651 and CVE-2020-11652, the disclosed flaws could allow an adversary to execute arbitrary code on remote servers deployed in data<img src="" height="1" width="1" alt=""/> Wed, 06 May 2020 08:18:06 +0000 2020-05-06T08:18:06+00:00 Download: 'Coronavirus Cyber Security for Management' Template for CISOs The Coronavirus crisis introduces critical operational challenges to business continuity, placing high stress on organizations' management. As a result, CIOs and CISOs face a double challenge on the cyber risk front – apart from the new risks that the mass transfer of employees working remotely brings, capturing the management mindshare for further investments in security becomes harder than<img src="" height="1" width="1" alt=""/> Tue, 05 May 2020 16:57:29 +0000 2020-05-05T16:57:29+00:00 Warning: Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets Since the past few weeks, software giant Citrix has privately been rolling out a critical software update to its enterprise customers that patches multiple security vulnerabilities affecting Citrix ShareFile content collaboration platform. The security advisory—about which The Hacker News learned from Dimitri van de Giessen, an ethical hacker and system engineer—is scheduled to be available<img src="" height="1" width="1" alt=""/> Tue, 05 May 2020 16:14:59 +0000 2020-05-05T16:14:59+00:00 Change This Browser Setting to Stop Xiaomi from Spying On Your Incognito Activities If you own a Xiaomi smartphone or have installed the Mi browser app on any of your other brand Android device, you should enable a newly introduced privacy setting immediately to prevent the company from spying on your online activities. The smartphone maker has begun rolling out an update to its Mi Browser/Mi Browser Pro (v12.1.4) and Mint Browser (v3.4.3) after concerns were raised over its<img src="" height="1" width="1" alt=""/> Tue, 05 May 2020 14:44:35 +0000 2020-05-05T14:44:35+00:00 New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers Cybersecurity researcher Mordechai Guri from Israel's Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices. Dubbed 'POWER-SUPPLaY,' the latest research builds on a series of<img src="" height="1" width="1" alt=""/> Mon, 04 May 2020 14:57:58 +0000 2020-05-04T14:57:58+00:00