[{"title":"EPA Official Accused of Helping Monsanto ‘Kill’ Cancer Study","description":"<a href="https://news.ycombinator.com/item?id=14659301">Comments</a>","link":"https://www.bloomberg.com/news/articles/2017-03-14/monsanto-accused-of-ghost-writing-papers-on-roundup-cancer-risk","comments":"https://news.ycombinator.com/item?id=14659301","updated_at":"2017-06-28T22:56:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14659301","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"ZeroKit for Realm: Easy End-To-End Encryption","description":"<a href="https://news.ycombinator.com/item?id=14659047">Comments</a>","link":"https://news.realm.io/news/end-to-end-encryption-for-realm-by-tresorit-zerokit/","comments":"https://news.ycombinator.com/item?id=14659047","updated_at":"2017-06-28T22:24:17+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14659047","link_host":"news.realm.io","from":"hackernews"},{"title":"Denied Entry","description":"<a href="https://news.ycombinator.com/item?id=14658950">Comments</a>","link":"https://daniel.haxx.se/blog/2017/06/28/denied-entry/","comments":"https://news.ycombinator.com/item?id=14658950","updated_at":"2017-06-28T22:11:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14658950","link_host":"daniel.haxx.se","from":"hackernews"},{"title":"Developing Bug-Free Machine Learning Systems with Formal Mathematics","description":"<a href="https://news.ycombinator.com/item?id=14658832">Comments</a>","link":"https://arxiv.org/abs/1706.08605","comments":"https://news.ycombinator.com/item?id=14658832","updated_at":"2017-06-28T21:53:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14658832","link_host":"arxiv.org","from":"hackernews"},{"title":"Is it possible to host Facebook on AWS?","description":"<a href="https://news.ycombinator.com/item?id=14658827">Comments</a>","link":"http://blog.sqlizer.io/posts/facebook-on-aws/","comments":"https://news.ycombinator.com/item?id=14658827","updated_at":"2017-06-28T21:53:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14658827","link_host":"blog.sqlizer.io","from":"hackernews"},{"title":"The Remote X: Tom of Myagi","description":"https://medium.com/mission-log/the-remote-x-tom-of-myagi-5810f5053f0d","link":"https://www.designernews.co/stories/85131-the-remote-x-tom-of-myagi","comments":"https://www.designernews.co/stories/85131-the-remote-x-tom-of-myagi","updated_at":"2017-06-28T21:16:51+00:00","link_to_comments":"https://www.designernews.co/stories/85131-the-remote-x-tom-of-myagi","link_host":"medium.com","from":"designernews"},{"title":"What would a better digital companion look like?","description":"https://words.motel.is/the-humanic-operating-system-part-2-ed20eea92fce","link":"https://www.designernews.co/stories/85130-what-would-a-better-digital-companion-look-like","comments":"https://www.designernews.co/stories/85130-what-would-a-better-digital-companion-look-like","updated_at":"2017-06-28T21:14:48+00:00","link_to_comments":"https://www.designernews.co/stories/85130-what-would-a-better-digital-companion-look-like","link_host":"words.motel.is","from":"designernews"},{"title":"Container Isolation Gone Wrong","description":"<a href="https://news.ycombinator.com/item?id=14658316">Comments</a>","link":"https://sysdig.com/blog/container-isolation-gone-wrong/","comments":"https://news.ycombinator.com/item?id=14658316","updated_at":"2017-06-28T20:57:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14658316","link_host":"sysdig.com","from":"hackernews"},{"title":"Bulletin (YC W17) is filling three open positions","description":"<a href="https://news.ycombinator.com/item?id=14658086">Comments</a>","link":"https://www.bulletinbrand.com/careers","comments":"https://news.ycombinator.com/item?id=14658086","updated_at":"2017-06-28T20:33:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14658086","link_host":"www.bulletinbrand.com","from":"hackernews"},{"title":"Tuesday’s massive ransomware outbreak was, in fact, something much worse","description":"Payload delivered in mass attack destroys data, with no hope of recovery.","link":"https://arstechnica.com/?p=1125911","comments":"https://arstechnica.com/?p=1125911","updated_at":"2017-06-28T20:30:45+00:00","link_to_comments":"https://arstechnica.com/?p=1125911","link_host":"arstechnica.com","from":"arssecurity"},{"title":"2D Syntax","description":"<a href="https://news.ycombinator.com/item?id=14657857">Comments</a>","link":"https://docs.racket-lang.org/2d/index.html","comments":"https://news.ycombinator.com/item?id=14657857","updated_at":"2017-06-28T20:12:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14657857","link_host":"docs.racketlang.org","from":"hackernews"},{"title":"The alarm clock design in iOS is broken","description":"http://twentysomethings.co/hey-apple-can-you-please-fix-the-alarm-clock-design/","link":"https://www.designernews.co/stories/85129-the-alarm-clock-design-in-ios-is-broken","comments":"https://www.designernews.co/stories/85129-the-alarm-clock-design-in-ios-is-broken","updated_at":"2017-06-28T19:22:34+00:00","link_to_comments":"https://www.designernews.co/stories/85129-the-alarm-clock-design-in-ios-is-broken","link_host":"twentysomethings.co","from":"designernews"},{"title":"Turns Out New Petya is Not a Ransomware, It’s a Destructive Wiper Malware","description":"What if I say the Tuesday's devastating global malware outbreak was not due to any ransomware infection?\n\nYes, the Petya ransomware attacks that began infecting computers in several countries, including Russia, Ukraine, France, India and the United States on Tuesday and demands $300 ransom was not designed with the intention of restoring the computers at all.\n\nAccording to a new analysis, the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=yoBOkffnGBY:DISyhwAOP8k:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/yoBOkffnGBY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/yoBOkffnGBY/petya-ransomware-wiper-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/yoBOkffnGBY/petya-ransomware-wiper-malware.html","updated_at":"2017-06-28T19:10:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/yoBOkffnGBY/petya-ransomware-wiper-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Canada's top court backs order for Google to remove firm's website from searches","description":"<a href="https://news.ycombinator.com/item?id=14657061">Comments</a>","link":"http://www.cbc.ca/news/canada/british-columbia/google-ruling-1.4181322","comments":"https://news.ycombinator.com/item?id=14657061","updated_at":"2017-06-28T18:45:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14657061","link_host":"www.cbc.ca","from":"hackernews"},{"title":"Why App Speed Matters: Revenue","description":"<a href="https://news.ycombinator.com/item?id=14656995">Comments</a>","link":"https://fly.io/articles/why-fast-pages-are-important/","comments":"https://news.ycombinator.com/item?id=14656995","updated_at":"2017-06-28T18:38:19+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14656995","link_host":"fly.io","from":"hackernews"},{"title":"Is it unethical for me to not tell my employer I've automated my job?","description":"<a href="https://news.ycombinator.com/item?id=14656945">Comments</a>","link":"https://workplace.stackexchange.com/q/93696/26528","comments":"https://news.ycombinator.com/item?id=14656945","updated_at":"2017-06-28T18:32:34+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14656945","link_host":"workplace.stackexchange.com","from":"hackernews"},{"title":"Vim Tutorial as an Adventure Game","description":"<a href="https://news.ycombinator.com/item?id=14656591">Comments</a>","link":"https://vim-adventures.com/","comments":"https://news.ycombinator.com/item?id=14656591","updated_at":"2017-06-28T18:03:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14656591","link_host":"vimadventures.com","from":"hackernews"},{"title":"Does anyone else become infuriated when they visit forbes.com? ","description":"Forbes.com have some great articles, and come up at the top of my search results often. \n\nAnd like a fool, I always click saying to myself, "It's not that bad". Only to be bombarded by advertisements, unnecessary pagination and all in all a horrible reading experience. \n\nI understand that this is an attempt to increase the number of advertisements they can shove down peoples throats. The downside is that I end up leaving. Surely if they took the time to lay the advertisements in a less obtrusive manner people would stay longer, resulting in more impressions? \n\nThe page that got me wound up: https://www.forbes.com/sites/samabuelsamid/2017/04/03/2017-bmw-530i-the-just-right-german-sports-sedan/#5d462b78410f","link":"https://www.designernews.co/stories/85126-does-anyone-else-become-infuriated-when-they-visit-forbescom-","comments":"https://www.designernews.co/stories/85126-does-anyone-else-become-infuriated-when-they-visit-forbescom-","updated_at":"2017-06-28T17:55:13+00:00","link_to_comments":"https://www.designernews.co/stories/85126-does-anyone-else-become-infuriated-when-they-visit-forbescom-","link_host":null,"from":"designernews"},{"title":"Redesigning a remote","description":"http://www.elirousso.com/","link":"https://www.designernews.co/stories/85125-redesigning-a-remote","comments":"https://www.designernews.co/stories/85125-redesigning-a-remote","updated_at":"2017-06-28T17:17:55+00:00","link_to_comments":"https://www.designernews.co/stories/85125-redesigning-a-remote","link_host":"www.elirousso.com","from":"designernews"},{"title":"Why Color Schemas & Visual ID Systems Matter","description":"Because otherwise, this happens:\n![Image title](http://al.vvvvv.in/imgs/shesthecomicsansintheroom.png)","link":"https://www.designernews.co/stories/85124-why-color-schemas--visual-id-systems-matter","comments":"https://www.designernews.co/stories/85124-why-color-schemas--visual-id-systems-matter","updated_at":"2017-06-28T17:16:42+00:00","link_to_comments":"https://www.designernews.co/stories/85124-why-color-schemas--visual-id-systems-matter","link_host":null,"from":"designernews"},{"title":"The Future of App Development: Beyond Prototypes","description":"https://medium.com/qwikly/the-future-of-app-development-beyond-prototypes-c04668d3d334","link":"https://www.designernews.co/stories/85122-the-future-of-app-development-beyond-prototypes","comments":"https://www.designernews.co/stories/85122-the-future-of-app-development-beyond-prototypes","updated_at":"2017-06-28T17:04:50+00:00","link_to_comments":"https://www.designernews.co/stories/85122-the-future-of-app-development-beyond-prototypes","link_host":"medium.com","from":"designernews"},{"title":"Writing Parsers Like it is 2017 [pdf]","description":"<a href="https://news.ycombinator.com/item?id=14655528">Comments</a>","link":"http://spw17.langsec.org/papers/chifflier-parsing-in-2017.pdf","comments":"https://news.ycombinator.com/item?id=14655528","updated_at":"2017-06-28T16:29:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14655528","link_host":"spw17.langsec.org","from":"hackernews"},{"title":"Microsoft Adding Artificial-Intelligence Based Advanced Antivirus to Windows 10","description":"Microsoft is making every effort to make its Windows operating system more secure and advanced than ever before by beefing up its security practices and hardening it against hackers and cyber attacks in its next release.\n\nWith the launch of its Windows 10 Creator Update (also known as RedStone 3), which is expected to release sometime between September and October 2017, Microsoft is planning<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=YlxzmK4ag-c:d1WLtdoDieY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/YlxzmK4ag-c" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/YlxzmK4ag-c/windows10-artificial-intelligence-antivirus.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/YlxzmK4ag-c/windows10-artificial-intelligence-antivirus.html","updated_at":"2017-06-28T16:18:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/YlxzmK4ag-c/windows10-artificial-intelligence-antivirus.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Flawed reporting about WhatsApp","description":"<a href="https://news.ycombinator.com/item?id=14655433">Comments</a>","link":"https://www.theguardian.com/technology/commentisfree/2017/jun/28/flawed-reporting-about-whatsapp","comments":"https://news.ycombinator.com/item?id=14655433","updated_at":"2017-06-28T16:18:07+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14655433","link_host":"www.theguardian.com","from":"hackernews"},{"title":"Increasing Rust’s Reach","description":"<a href="https://news.ycombinator.com/item?id=14655389">Comments</a>","link":"http://blog.rust-lang.org/2017/06/27/Increasing-Rusts-Reach.html","comments":"https://news.ycombinator.com/item?id=14655389","updated_at":"2017-06-28T16:12:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14655389","link_host":"blog.rustlang.org","from":"hackernews"},{"title":"Analyzing Cryptocurrencies Using PostgreSQL","description":"<a href="https://news.ycombinator.com/item?id=14655382">Comments</a>","link":"https://blog.timescale.com/analyzing-ethereum-bitcoin-and-1200-cryptocurrencies-using-postgresql-3958b3662e51","comments":"https://news.ycombinator.com/item?id=14655382","updated_at":"2017-06-28T16:11:36+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14655382","link_host":"blog.timescale.com","from":"hackernews"},{"title":"Blue Apron, Struggling to Woo Investors, Lowers Price Range for IPO","description":"<a href="https://news.ycombinator.com/item?id=14655030">Comments</a>","link":"https://www.wsj.com/articles/blue-apron-chops-its-ipo-price-range-1498652104","comments":"https://news.ycombinator.com/item?id=14655030","updated_at":"2017-06-28T15:38:34+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14655030","link_host":"www.wsj.com","from":"hackernews"},{"title":"Sorting 2 Tons of Lego, Many Questions, Results","description":"<a href="https://news.ycombinator.com/item?id=14654223">Comments</a>","link":"http://jacquesmattheij.com/sorting-lego-many-questions-and-this-is-what-the-result-looks-like","comments":"https://news.ycombinator.com/item?id=14654223","updated_at":"2017-06-28T14:07:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14654223","link_host":"jacquesmattheij.com","from":"hackernews"},{"title":"'Shadow Brokers' Threatens to Unmask A Hacker Who Worked With NSA","description":"The Shadow Brokers, a notorious hacking group that leaked US cyberweapons — which were also abused by the recent ransomware disasters WannaCry and Petya or NotPetya — has now threatened to unmask the identity of a former hacker who worked for the NSA.\n\nBesides this, the Shadow Brokers group has also doubled the price for its monthly subscription model of NSA's built hacking tools and zero-day<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=mLxiMLoc2W0:LFLmk5xlbYs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/mLxiMLoc2W0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/mLxiMLoc2W0/shadowbrokers-nsa-hacker.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mLxiMLoc2W0/shadowbrokers-nsa-hacker.html","updated_at":"2017-06-28T14:05:39+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mLxiMLoc2W0/shadowbrokers-nsa-hacker.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"WikiLeaks Reveals How CIA Malware Tracks Geo-Location of its Targeted","description":"WikiLeaks has just published a new batch of the ongoing Vault 7 leak, and this time the whistleblowing website has unveiled a classified malware for that tracks geo-location of targeted PCs and laptops running the Microsoft Windows operating system.\n\nIn short, the malware does it by capturing the IDs of nearby public hotspots and then matching them with the global database of public Wi-Fi<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=SwjVK_X8WC0:RL3zNmYf154:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/SwjVK_X8WC0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/SwjVK_X8WC0/wikileaks-cia-malware-geolocation.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SwjVK_X8WC0/wikileaks-cia-malware-geolocation.html","updated_at":"2017-06-28T13:25:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SwjVK_X8WC0/wikileaks-cia-malware-geolocation.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"The internet as existential threat","description":"<a href="https://news.ycombinator.com/item?id=14653817">Comments</a>","link":"https://www.raphkoster.com/2017/06/27/the-internet-as-existential-threat/","comments":"https://news.ycombinator.com/item?id=14653817","updated_at":"2017-06-28T13:22:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14653817","link_host":"www.raphkoster.com","from":"hackernews"},{"title":"When to interrupt a user flow","description":"https://reallygoodux.tumblr.com/post/162321720604/worthwhile-flow-interruption-the-confirmation","link":"https://www.designernews.co/stories/85110-when-to-interrupt-a-user-flow","comments":"https://www.designernews.co/stories/85110-when-to-interrupt-a-user-flow","updated_at":"2017-06-28T12:46:16+00:00","link_to_comments":"https://www.designernews.co/stories/85110-when-to-interrupt-a-user-flow","link_host":"reallygoodux.tumblr.com","from":"designernews"},{"title":"Remote-only junior positions jobs list","description":"https://remotejunior.com","link":"https://www.designernews.co/stories/85109-remoteonly-junior-positions-jobs-list","comments":"https://www.designernews.co/stories/85109-remoteonly-junior-positions-jobs-list","updated_at":"2017-06-28T12:26:06+00:00","link_to_comments":"https://www.designernews.co/stories/85109-remoteonly-junior-positions-jobs-list","link_host":"remotejunior.com","from":"designernews"},{"title":"Goodbye Mozilla","description":"<a href="https://news.ycombinator.com/item?id=14653469">Comments</a>","link":"http://chrislord.net/index.php/2017/06/28/goodbye-mozilla/","comments":"https://news.ycombinator.com/item?id=14653469","updated_at":"2017-06-28T12:24:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14653469","link_host":"chrislord.net","from":"hackernews"},{"title":"Organic Shape Animations with SVG clipPath","description":"https://tympanus.net/codrops/2017/06/28/organic-shape-animations-with-svg-clippath/","link":"https://www.designernews.co/stories/85107-organic-shape-animations-with-svg-clippath","comments":"https://www.designernews.co/stories/85107-organic-shape-animations-with-svg-clippath","updated_at":"2017-06-28T11:57:19+00:00","link_to_comments":"https://www.designernews.co/stories/85107-organic-shape-animations-with-svg-clippath","link_host":"tympanus.net","from":"designernews"},{"title":"Internal documents shed light on the guidelines that Facebook’s censors use","description":"<a href="https://news.ycombinator.com/item?id=14653304">Comments</a>","link":"https://www.propublica.org/article/facebook-hate-speech-censorship-internal-documents-algorithms","comments":"https://news.ycombinator.com/item?id=14653304","updated_at":"2017-06-28T11:51:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14653304","link_host":"www.propublica.org","from":"hackernews"},{"title":"Ends, Means, and Antitrust","description":"<a href="https://news.ycombinator.com/item?id=14653271">Comments</a>","link":"https://stratechery.com/2017/ends-means-and-antitrust/","comments":"https://news.ycombinator.com/item?id=14653271","updated_at":"2017-06-28T11:42:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14653271","link_host":"stratechery.com","from":"hackernews"},{"title":"How Storytelling Affects The Brain and How It Can Be Used In Emails?","description":"http://blog.chamaileon.io/storytelling-in-email-marketing/?utm_source=designernews&utm_medium=submission&utm_campaign=ch-storytelling-in-email","link":"https://www.designernews.co/stories/85106-how-storytelling-affects-the-brain-and-how-it-can-be-used-in-emails","comments":"https://www.designernews.co/stories/85106-how-storytelling-affects-the-brain-and-how-it-can-be-used-in-emails","updated_at":"2017-06-28T11:09:15+00:00","link_to_comments":"https://www.designernews.co/stories/85106-how-storytelling-affects-the-brain-and-how-it-can-be-used-in-emails","link_host":"blog.chamaileon.io","from":"designernews"},{"title":"Free audio and video assets for your design projects.","description":"http://stampede.it/winter.html","link":"https://www.designernews.co/stories/85105-free-audio-and-video-assets-for-your-design-projects","comments":"https://www.designernews.co/stories/85105-free-audio-and-video-assets-for-your-design-projects","updated_at":"2017-06-28T10:45:33+00:00","link_to_comments":"https://www.designernews.co/stories/85105-free-audio-and-video-assets-for-your-design-projects","link_host":"stampede.it","from":"designernews"},{"title":"Touch Bar Preview","description":"https://touchbar.github.io/","link":"https://www.designernews.co/stories/85104-touch-bar-preview","comments":"https://www.designernews.co/stories/85104-touch-bar-preview","updated_at":"2017-06-28T10:36:51+00:00","link_to_comments":"https://www.designernews.co/stories/85104-touch-bar-preview","link_host":"touchbar.github.io","from":"designernews"},{"title":"An easter egg for one user: Luke Skywalker","description":"<a href="https://news.ycombinator.com/item?id=14653017">Comments</a>","link":"http://einaregilsson.com/an-easter-egg-for-one-user-luke-skywalker/","comments":"https://news.ycombinator.com/item?id=14653017","updated_at":"2017-06-28T10:35:43+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14653017","link_host":"einaregilsson.com","from":"hackernews"},{"title":"Sketch Craft Plugin Performance","description":"Sketch startup and overall performance suffers a lot when I activate the Craft plugin :(\n\nDo you deal with the same problem?","link":"https://www.designernews.co/stories/85103-sketch-craft-plugin-performance","comments":"https://www.designernews.co/stories/85103-sketch-craft-plugin-performance","updated_at":"2017-06-28T10:31:14+00:00","link_to_comments":"https://www.designernews.co/stories/85103-sketch-craft-plugin-performance","link_host":null,"from":"designernews"},{"title":"Chatbot to compare pricing of your UX Stack - prototyping, user testing, design hand-off & collaboration ","description":"https://www.canvasflip.com/pricing.php#/compare","link":"https://www.designernews.co/stories/85102-chatbot-to-compare-pricing-of-your-ux-stack--prototyping-user-testing-design-handoff--collaboration-","comments":"https://www.designernews.co/stories/85102-chatbot-to-compare-pricing-of-your-ux-stack--prototyping-user-testing-design-handoff--collaboration-","updated_at":"2017-06-28T10:24:49+00:00","link_to_comments":"https://www.designernews.co/stories/85102-chatbot-to-compare-pricing-of-your-ux-stack--prototyping-user-testing-design-handoff--collaboration-","link_host":"www.canvasflip.com","from":"designernews"},{"title":"Ask HN: What are the best books on modern computer graphics?","description":"<a href="https://news.ycombinator.com/item?id=14652936">Comments</a>","link":"https://news.ycombinator.com/item?id=14652936","comments":"https://news.ycombinator.com/item?id=14652936","updated_at":"2017-06-28T10:15:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14652936","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Show DN: Quire 2.0 - collaborative tool redesigned for your creative team","description":"https://quire.io/blog/p/Quire-Mark-II-reimagined-and-rebuilt-for-your-dreams.html","link":"https://www.designernews.co/stories/85101-show-dn-quire-20--collaborative-tool-redesigned-for-your-creative-team","comments":"https://www.designernews.co/stories/85101-show-dn-quire-20--collaborative-tool-redesigned-for-your-creative-team","updated_at":"2017-06-28T10:03:13+00:00","link_to_comments":"https://www.designernews.co/stories/85101-show-dn-quire-20--collaborative-tool-redesigned-for-your-creative-team","link_host":"quire.io","from":"designernews"},{"title":"Sketch 45","description":"https://medium.com/@sketchapp/8de62b3d9abe","link":"https://www.designernews.co/stories/85099-sketch-45","comments":"https://www.designernews.co/stories/85099-sketch-45","updated_at":"2017-06-28T09:37:02+00:00","link_to_comments":"https://www.designernews.co/stories/85099-sketch-45","link_host":"medium.com","from":"designernews"},{"title":"ThinScript, an experimental programming language that can compile to WebAssembly","description":"<a href="https://news.ycombinator.com/item?id=14652714">Comments</a>","link":"https://github.com/evanw/thinscript","comments":"https://news.ycombinator.com/item?id=14652714","updated_at":"2017-06-28T09:13:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14652714","link_host":"github.com","from":"hackernews"},{"title":"Search across every word from 25 years of the Simpsons","description":"<a href="https://news.ycombinator.com/item?id=14652421">Comments</a>","link":"http://benschmidt.org/Simpsons/","comments":"https://news.ycombinator.com/item?id=14652421","updated_at":"2017-06-28T07:55:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14652421","link_host":"benschmidt.org","from":"hackernews"},{"title":"How can Ethereum systematically scale better?","description":"<a href="https://news.ycombinator.com/item?id=14652273">Comments</a>","link":"https://medium.com/@FEhrsam/scaling-ethereum-to-billions-of-users-f37d9f487db1","comments":"https://news.ycombinator.com/item?id=14652273","updated_at":"2017-06-28T07:19:23+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14652273","link_host":"medium.com","from":"hackernews"},{"title":"Critical Skype Bug Lets Hackers Remotely Execute Malicious Code","description":"A critical vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that could allow hackers to remotely execute malicious code and crash systems.\n\nSkype is a free online service that allows users to communicate with peers by voice, video, and instant messaging over the Internet. The service was acquired by Microsoft Corporation in<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=pnyJdiYzaRU:uToR3ZhEDX4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/pnyJdiYzaRU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/pnyJdiYzaRU/skype-crash-bug.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/pnyJdiYzaRU/skype-crash-bug.html","updated_at":"2017-06-28T07:17:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/pnyJdiYzaRU/skype-crash-bug.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"A Jordan Bookseller’s 24-Hour ‘Emergency Room for the Mind’","description":"<a href="https://news.ycombinator.com/item?id=14652125">Comments</a>","link":"http://www.atlasobscura.com/articles/amman-jordan-24-hour-bookstore","comments":"https://news.ycombinator.com/item?id=14652125","updated_at":"2017-06-28T06:39:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14652125","link_host":"www.atlasobscura.com","from":"hackernews"},{"title":"Looking for a cofounder...","description":"Hi, My name is Joanna. I am the founder of BetterDesign (www.betterdesign.io). \n\nBetterDesign is a social community to test your design and copy using polls and get feedback and comments in the meantime.\n\nI created this project out of passion. I found a lot of designers working isolated and they have difficulty to find people to get feedback from, including myself. So I started this project. However, as the only founder of this project, I found myself lost, or even helpless to push this project forward sometimes. I have a full-time job. I spent my weekends on this project, but there are still a lot of things need to be done but I don't have enough resources, time and energy to do this. We have a couple hundreds of users, there are people posting polls almost every day.\n\nSo if you are seriously looking for a project to work on, or simply just want to help out. Please contact me at contact@betterdesign.io. I would really appreciate.","link":"https://www.designernews.co/stories/85092-looking-for-a-cofounder","comments":"https://www.designernews.co/stories/85092-looking-for-a-cofounder","updated_at":"2017-06-28T06:11:14+00:00","link_to_comments":"https://www.designernews.co/stories/85092-looking-for-a-cofounder","link_host":null,"from":"designernews"},{"title":"Google News launched a new redesign (with fact checking)","description":"https://news.google.com","link":"https://www.designernews.co/stories/85091-google-news-launched-a-new-redesign-with-fact-checking","comments":"https://www.designernews.co/stories/85091-google-news-launched-a-new-redesign-with-fact-checking","updated_at":"2017-06-28T04:57:14+00:00","link_to_comments":"https://www.designernews.co/stories/85091-google-news-launched-a-new-redesign-with-fact-checking","link_host":"news.google.com","from":"designernews"},{"title":"Need help getting started, inspired, or want feedback? ","description":"Hey gang,\n\nA lot of people helped me out when I was getting started with design and front end development. If you're a younger designer, just getting started, or just want career advice I'd love to offer some of my time to help you out.\n\nhttps://calendly.com/coletownsend/merry-old-soul","link":"https://www.designernews.co/stories/85087-need-help-getting-started-inspired-or-want-feedback-","comments":"https://www.designernews.co/stories/85087-need-help-getting-started-inspired-or-want-feedback-","updated_at":"2017-06-27T22:26:21+00:00","link_to_comments":"https://www.designernews.co/stories/85087-need-help-getting-started-inspired-or-want-feedback-","link_host":"calendly.com","from":"designernews"},{"title":"Here's the rebuild of Designer News I did live using Webflow","description":"https://preview.webflow.com/preview/designer-news-demo?preview=4d0e0a9832ebbea23580f25443831485&m=1","link":"https://www.designernews.co/stories/85084-heres-the-rebuild-of-designer-news-i-did-live-using-webflow","comments":"https://www.designernews.co/stories/85084-heres-the-rebuild-of-designer-news-i-did-live-using-webflow","updated_at":"2017-06-27T21:25:56+00:00","link_to_comments":"https://www.designernews.co/stories/85084-heres-the-rebuild-of-designer-news-i-did-live-using-webflow","link_host":"preview.webflow.com","from":"designernews"},{"title":"Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry","description":"Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack.\n\nThe WannaCry ransomware is not dead yet and another large scale ransomware attack is making chaos worldwide, shutting down computers at corporates, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in bitcoins.\n\nAccording to multiple sources, a new<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=UWMhLS5FHjo:Hn3Ry71coeE:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/UWMhLS5FHjo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/UWMhLS5FHjo/petya-ransomware-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/UWMhLS5FHjo/petya-ransomware-attack.html","updated_at":"2017-06-27T19:56:23+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/UWMhLS5FHjo/petya-ransomware-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft bringing EMET back as a built-in part of Windows 10","description":"The built-in exploit mitigations are getting stronger and easier to configure.","link":"https://arstechnica.com/?p=1124813","comments":"https://arstechnica.com/?p=1124813","updated_at":"2017-06-27T19:47:31+00:00","link_to_comments":"https://arstechnica.com/?p=1124813","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Ohio Gov. Kasich’s website, dozens of others defaced using year-old exploit","description":""High risk" exploit patch was issued in May of 2016.","link":"https://arstechnica.com/?p=1124833","comments":"https://arstechnica.com/?p=1124833","updated_at":"2017-06-27T19:05:38+00:00","link_to_comments":"https://arstechnica.com/?p=1124833","link_host":"arstechnica.com","from":"arssecurity"},{"title":"A new ransomware outbreak similar to WCry is shutting down computers worldwide","description":"Like earlier ransomware worm, new attacks use potent exploit stolen from the NSA.","link":"https://arstechnica.com/?p=1124929","comments":"https://arstechnica.com/?p=1124929","updated_at":"2017-06-27T16:53:21+00:00","link_to_comments":"https://arstechnica.com/?p=1124929","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Facebook Sound Kit, now in Framer","description":"As of today, you can now add sound to your prototypes in Framer. In partnership with Facebook, we're happy to introduce their Sound Kit collection to Framer. Choose from a menu of interaction sounds to enhance buttons, navigation, errors, and more.\n\nRead the announcement: \nhttps://medium.com/p/eb8a22f88bfd","link":"https://www.designernews.co/stories/85068-facebook-sound-kit-now-in-framer","comments":"https://www.designernews.co/stories/85068-facebook-sound-kit-now-in-framer","updated_at":"2017-06-27T16:14:13+00:00","link_to_comments":"https://www.designernews.co/stories/85068-facebook-sound-kit-now-in-framer","link_host":null,"from":"designernews"},{"title":"Mapbox Cartogram — new drag-and-drop tool to create a custom map in seconds","description":"https://www.mapbox.com/cartogram/","link":"https://www.designernews.co/stories/85064-mapbox-cartogram--new-draganddrop-tool-to-create-a-custom-map-in-seconds","comments":"https://www.designernews.co/stories/85064-mapbox-cartogram--new-draganddrop-tool-to-create-a-custom-map-in-seconds","updated_at":"2017-06-27T15:20:11+00:00","link_to_comments":"https://www.designernews.co/stories/85064-mapbox-cartogram--new-draganddrop-tool-to-create-a-custom-map-in-seconds","link_host":"www.mapbox.com","from":"designernews"},{"title":"Thoughts on the Nintendo Switch User Interface","description":"https://medium.com/@charliedeets/thoughts-on-the-nintendo-switch-user-interface-b441129f063d","link":"https://www.designernews.co/stories/85062-thoughts-on-the-nintendo-switch-user-interface","comments":"https://www.designernews.co/stories/85062-thoughts-on-the-nintendo-switch-user-interface","updated_at":"2017-06-27T14:50:24+00:00","link_to_comments":"https://www.designernews.co/stories/85062-thoughts-on-the-nintendo-switch-user-interface","link_host":"medium.com","from":"designernews"},{"title":"Is the business of scientific publishing bad for science?","description":"<a href="https://news.ycombinator.com/item?id=14645561">Comments</a>","link":"https://www.theguardian.com/science/2017/jun/27/profitable-business-scientific-publishing-bad-for-science","comments":"https://news.ycombinator.com/item?id=14645561","updated_at":"2017-06-27T14:16:21+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14645561","link_host":"www.theguardian.com","from":"hackernews"},{"title":"Google Gets Record-Breaking $2.7 Billion Fine for Manipulating Search Results","description":"Google has just lost its biggest regulatory battle!\n\nGoogle has been hit with a record-breaking $2.7 billion (€2.42 billion) fine by the European antitrust officials for unfairly manipulating search results since 2008.\n\nAfter a lengthy seven-year investigation that was launched in 2010 after several rivals complaint, the European Commission on Tuesday imposed this 'biggest even financial<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=KOAzRNvIplc:OypdtrMIY1Q:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/KOAzRNvIplc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/KOAzRNvIplc/google-search-antitrust-fine.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/KOAzRNvIplc/google-search-antitrust-fine.html","updated_at":"2017-06-27T11:23:22+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/KOAzRNvIplc/google-search-antitrust-fine.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Russia Threatens to Ban Telegram Messaging App, Says It Was Used By Terrorists","description":"Russia has threatened to ban Telegram end-to-end encrypted messaging app, after Pavel Durov, its founder, refused to sign up to the country's new data protection laws.\n\nRussian intelligence service, the FSB, said on Monday that the terrorists that killed 15 people in Saint Petersburg in April had used the Telegram encrypted messaging service to plot their attacks.\n&lt;!-- adsense --&gt;\nAccording to<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=mnlUgJyvs0M:i_eIzxAMX60:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/mnlUgJyvs0M" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/mnlUgJyvs0M/russia-telegram-data-law.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mnlUgJyvs0M/russia-telegram-data-law.html","updated_at":"2017-06-27T09:16:03+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/mnlUgJyvs0M/russia-telegram-data-law.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"This Windows Defender bug was so gaping its PoC exploit had to be encrypted","description":"Is there a fuzzer in the house?","link":"https://arstechnica.com/?p=1124679","comments":"https://arstechnica.com/?p=1124679","updated_at":"2017-06-27T00:10:23+00:00","link_to_comments":"https://arstechnica.com/?p=1124679","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Field Notes from my Dementia","description":"<a href="https://news.ycombinator.com/item?id=14640179">Comments</a>","link":"http://lithub.com/field-notes-from-my-dementia/","comments":"https://news.ycombinator.com/item?id=14640179","updated_at":"2017-06-26T20:40:55+00:00","link_to_comments":"https://news.ycombinator.com/item?id=14640179","link_host":"lithub.com","from":"hackernews"},{"title":"Some beers, anger at former employer, and root access add up to a year in prison","description":"Ex-tech pleads guilty to smart meter network attack; changed a password to "f***you."","link":"https://arstechnica.com/?p=1124265","comments":"https://arstechnica.com/?p=1124265","updated_at":"2017-06-26T17:05:26+00:00","link_to_comments":"https://arstechnica.com/?p=1124265","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Sponsor: Now you can see how your visitors are truly using your website","description":"http://synd.co/2u8wpIi","link":"https://www.designernews.co/stories/85009-sponsor-now-you-can-see-how-your-visitors-are-truly-using-your-website","comments":"https://www.designernews.co/stories/85009-sponsor-now-you-can-see-how-your-visitors-are-truly-using-your-website","updated_at":"2017-06-26T14:34:13+00:00","link_to_comments":"https://www.designernews.co/stories/85009-sponsor-now-you-can-see-how-your-visitors-are-truly-using-your-website","link_host":"synd.co","from":"designernews"},{"title":"UK Parliament Hit by Cyberattack, Up to 90 MPs' E-mail Accounts Hacked","description":"A cyber attack has hit the email system of UK Houses of Parliament on Friday morning that breached at least 90 emails accounts protected by weak passwords belonging to MPs, lawmakers, and other parliamentary staff.\n\nMeanwhile, as a precaution, the Security service has temporarily shut down the remote access (outside the Westminster) to its network to protect email accounts.\n&lt;!-- adsense --&gt;<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ybybwGiuNCA:SgPoCJjQAP4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ybybwGiuNCA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ybybwGiuNCA/uk-parliament-emails-hacked.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ybybwGiuNCA/uk-parliament-emails-hacked.html","updated_at":"2017-06-26T11:15:58+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ybybwGiuNCA/uk-parliament-emails-hacked.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft's Private Windows 10 Internal Builds and Partial Source Code Leaked Online","description":"A massive archive of Microsoft's top-secret Windows 10 builds, and the source codes for private software has been reportedly leaked online, which could lead to a nasty wave of Windows 10 exploits, journalist at the Reg claims.\n\nThe Leaked files – uploaded on BetaArchive website – contains more than 32 terabytes of data, which includes many non-public Windows 10 and Windows Server 2016 builds<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=uKRywbNJvZI:bQLN7nDZk8E:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/uKRywbNJvZI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/uKRywbNJvZI/windows10-builds-source-code.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/uKRywbNJvZI/windows10-builds-source-code.html","updated_at":"2017-06-24T11:09:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/uKRywbNJvZI/windows10-builds-source-code.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Obama reportedly ordered implants to be deployed in key Russian networks","description":"Covert program draws on the NSA, CIA, and US Cyber Command.","link":"https://arstechnica.com/?p=1123527","comments":"https://arstechnica.com/?p=1123527","updated_at":"2017-06-23T20:51:52+00:00","link_to_comments":"https://arstechnica.com/?p=1123527","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Check Point says Fireball malware hit 250 million; Microsoft says no","description":"Either way, Microsoft assures us that Windows 10 S would have been immune.","link":"https://arstechnica.com/?p=1122335","comments":"https://arstechnica.com/?p=1122335","updated_at":"2017-06-23T12:00:44+00:00","link_to_comments":"https://arstechnica.com/?p=1122335","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Two British Men Arrested For Hacking Microsoft","description":"British police have arrested two men in the UK conspiring to hack into the computer networks of US tech giant Microsoft with plans to steal customers’ data from the software giant.\n\nThe suspects — 22-year-old from Sleaford and a 25-year-old from Bracknell — were arrested by the detectives from the Britain's South East Regional Organised Crime Unit (SEROCU) Thursday morning (22 June 2017).\n\nThe<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=PDwV6LZto2U:cF3jxQN3MwY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/PDwV6LZto2U" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/PDwV6LZto2U/hacker-arrested-for-hacking-microsoft.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PDwV6LZto2U/hacker-arrested-for-hacking-microsoft.html","updated_at":"2017-06-23T10:22:29+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PDwV6LZto2U/hacker-arrested-for-hacking-microsoft.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New GhostHook Attack Bypasses Windows 10 PatchGuard Protections","description":"Vulnerabilities discovered in Microsoft PatchGuard kernel protection could allow hackers to plant rootkits on computers running the company's latest and secure operating system, Windows 10.\n\nResearchers at CyberArk Labs have developed a new attack technique which could allow hackers to completely bypass PatchGuard, and hook a malicious kernel code (rootkits) at the kernel level.\n\nPatchGuard,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=JZXs2xJoKYI:IDZyZSyAJuo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/JZXs2xJoKYI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/JZXs2xJoKYI/ghosthook-windows-10-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JZXs2xJoKYI/ghosthook-windows-10-hacking.html","updated_at":"2017-06-23T05:49:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JZXs2xJoKYI/ghosthook-windows-10-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How the CIA infects air-gapped networks","description":"Sprawling “Brutal Kangaroo“ spreads malware using booby-trapped USB drives.","link":"https://arstechnica.com/?p=1122913","comments":"https://arstechnica.com/?p=1122913","updated_at":"2017-06-22T23:55:57+00:00","link_to_comments":"https://arstechnica.com/?p=1122913","link_host":"arstechnica.com","from":"arssecurity"},{"title":"No, WannaCry Is Not Dead! Hits Honda & Traffic Light Camera System","description":"It's been over a month since the WannaCry ransomware caused chaos worldwide and people have started counting its name as 'the things of past,' but… \n\n...WannaCry is not DEAD!\n\nThe self-spreading ransomware is still alive and is working absolutely fine.\n\nThe latest victims of WannaCry are Honda Motor Company and 55 speed and traffic light cameras in Australia.\n\nThe WannaCry ransomware shuts<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=udIMN0ISlgk:OpG64vKFsp0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/udIMN0ISlgk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/udIMN0ISlgk/honda-wannacry-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/udIMN0ISlgk/honda-wannacry-attack.html","updated_at":"2017-06-22T14:34:56+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/udIMN0ISlgk/honda-wannacry-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Brutal Kangaroo: CIA-developed Malware for Hacking Air-Gapped Networks Covertly","description":"WikiLeaks has published a new batch of the ongoing Vault 7 leak, this time detailing a tool suite – which is being used by the CIA for Microsoft Windows that targets "closed networks by air gap jumping using thumb drives," mainly implemented in enterprises and critical infrastructures.\n\nAir-gapped computers that are isolated from the Internet or other external networks are believed to be the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=-R7FXY1ml_o:GZovTTebMTs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-R7FXY1ml_o" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-R7FXY1ml_o/wikileaks-Brutal-Kangaroo-airgap-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-R7FXY1ml_o/wikileaks-Brutal-Kangaroo-airgap-malware.html","updated_at":"2017-06-22T12:29:55+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-R7FXY1ml_o/wikileaks-Brutal-Kangaroo-airgap-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Critical RCE Flaw Found in OpenVPN that Escaped Two Recent Security Audits","description":"A security researcher has found four vulnerabilities, including a critical remote code execution bug, in OpenVPN, those were not even caught in the two big security audits of the open source VPN software this year.\n\nOpenVPN is one of the most popular and widely used open source VPN software solutions mostly used for various connectivity needs, but it is especially popular for anonymous and<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ZUIbCLB_oNc:mcHaIIqgzGk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ZUIbCLB_oNc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZUIbCLB_oNc/openvpn-security-flaw_21.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZUIbCLB_oNc/openvpn-security-flaw_21.html","updated_at":"2017-06-22T08:19:38+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZUIbCLB_oNc/openvpn-security-flaw_21.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Honda shuts down factory after finding NSA-derived Wcry in its networks","description":"Automaker briefly stops making cars to contain worm that first struck in May.","link":"https://arstechnica.com/?p=1121939","comments":"https://arstechnica.com/?p=1121939","updated_at":"2017-06-21T17:46:59+00:00","link_to_comments":"https://arstechnica.com/?p=1121939","link_host":"arstechnica.com","from":"arssecurity"},{"title":"WebSites Found Collecting Data from Online Forms Even Before You Click Submit","description":"'Do I really need to give this website so much about me?'\n\nThat's exactly what I usually think after filling but before submitting a web form online asking for my personal details to continue.\n\nI am sure most of you would either close the whole tab or would edit already typed details (or filled up by browser's auto-fill feature) before clicking 'Submit' — Isn't it?\n\nBut closing the tab or<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=1dV0UuUrajY:8guzsCY-Tg0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1dV0UuUrajY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1dV0UuUrajY/online-form-privacy.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1dV0UuUrajY/online-form-privacy.html","updated_at":"2017-06-21T09:11:36+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1dV0UuUrajY/online-form-privacy.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"NSA Opens Github Account — Lists 32 Projects Developed by the Agency","description":"The National Security Agency (NSA) — the United States intelligence agency which is known for its secrecy and working in the dark — has finally joined GitHub and launched an official GitHub page.\n\nThe NSA employs genius-level coders and brightest mathematicians, who continually work to break codes, gather intelligence on everyone, and develop hacking tools like EternalBlue that was leaked by<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=jU4Ne6axw8I:xxkZs9JLWmQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/jU4Ne6axw8I" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/jU4Ne6axw8I/nsa-github-projects.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jU4Ne6axw8I/nsa-github-projects.html","updated_at":"2017-06-21T07:01:16+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jU4Ne6axw8I/nsa-github-projects.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"More Android apps from dangerous Ztorg family sneak into Google Play","description":"Almost 100 such apps, with &#62;1 million downloads, found so far (but not by Google).","link":"https://arstechnica.com/?p=1121589","comments":"https://arstechnica.com/?p=1121589","updated_at":"2017-06-20T21:36:55+00:00","link_to_comments":"https://arstechnica.com/?p=1121589","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Next Windows 10 Version May Have Built-in EMET Anti-Exploit Program","description":"It seems Microsoft is planning to build its EMET anti-exploit tool into the kernel of Windows 10 Creator Update (also known as RedStone 3), which is expected to release in September/October 2017.\n\nSo you may not have to separately download and install EMET in the upcoming version of the Windows 10.\n\nIf true, this would be the second big change Microsoft is making in its Windows 10 Fall update<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Shtsgi-kf6c:fBJ-Cn7Mj_Q:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Shtsgi-kf6c" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Shtsgi-kf6c/windows10-built-in-emet.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Shtsgi-kf6c/windows10-built-in-emet.html","updated_at":"2017-06-20T20:11:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Shtsgi-kf6c/windows10-built-in-emet.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft to Remove SMBv1 Protocol in Next Windows 10 Version (RedStone 3)","description":"The Server Message Block version 1 (SMBv1) — a 30-year-old file sharing protocol which came to light last month after the devastating WannaCry outbreak — will be removed from the upcoming Windows 10 (1709) Redstone 3 Update.\n\nThe SMBv1 is one of the internet's most ancient networking protocols that allows the operating systems and applications to read and write data to a system and a system to<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=RCXecmWNkbE:9G1tHQN5LXI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/RCXecmWNkbE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/RCXecmWNkbE/windows-10-redstone3-smb.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RCXecmWNkbE/windows-10-redstone3-smb.html","updated_at":"2017-06-20T16:13:54+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RCXecmWNkbE/windows-10-redstone3-smb.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Web Hosting Company Pays $1 Million to Ransomware Hackers to Get Files Back","description":"South Korean web hosting provider has agreed to pay $1 million in bitcoins to hackers after a Linux ransomware infected its 153 servers, encrypting 3,400 business websites and their data, hosted on them.\n\nAccording to a blog post published by NAYANA, the web hosting company, this unfortunate event happened on 10th June when ransomware malware hit its hosting servers and attacker demanded 550<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=b6jxjtBnCU0:dcP8C0693H4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/b6jxjtBnCU0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/b6jxjtBnCU0/web-hosting-ransomware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/b6jxjtBnCU0/web-hosting-ransomware.html","updated_at":"2017-06-20T13:01:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/b6jxjtBnCU0/web-hosting-ransomware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug Discovered","description":"Security researchers have discovered more than a decade-old vulnerability in several Unix-based operating systems — including Linux, OpenBSD, NetBSD, FreeBSD and Solaris — which can be exploited by attackers to escalate their privileges to root, potentially leading to a full system takeover.\n\nDubbed Stack Clash, the vulnerability (CVE-2017-1000364) has been discovered in the way memory was<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=QynFs9r4xtU:JSF0Qn1lvvc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/QynFs9r4xtU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/QynFs9r4xtU/linux-root-privilege-escalation.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/QynFs9r4xtU/linux-root-privilege-escalation.html","updated_at":"2017-06-20T07:57:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/QynFs9r4xtU/linux-root-privilege-escalation.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Web host agrees to pay $1m after it’s hit by Linux-targeting ransomware","description":"Windfall payment by poorly secured host is likely to inspire new ransomware attacks.","link":"https://arstechnica.com/?p=1120855","comments":"https://arstechnica.com/?p=1120855","updated_at":"2017-06-19T22:52:59+00:00","link_to_comments":"https://arstechnica.com/?p=1120855","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Serious privilege escalation bug in Unix OSes imperils servers everywhere","description":"“Stack Clash” poses threat to Linux, FreeBSD, OpenBSD, and other OSes.","link":"https://arstechnica.com/?p=1120643","comments":"https://arstechnica.com/?p=1120643","updated_at":"2017-06-19T17:50:06+00:00","link_to_comments":"https://arstechnica.com/?p=1120643","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Database of Over 198 Million U.S. Voters Left Exposed On Unsecured Server","description":"Information on more than 198 Million United States citizens, that's over 60% of the US population, was exposed in what's believed to be the largest ever known exposure of voter-related to date.\n\nThis blunder was caused by Deep Root Analytics (DRA), a data analytics firm employed by the US Republican National Committee (RNC), who "mistakenly" left sensitive personal details of more than 198<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=JqNrIIjHp2E:CB7JQ9n3qXQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/JqNrIIjHp2E" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/JqNrIIjHp2E/us-voters-data-leaked.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JqNrIIjHp2E/us-voters-data-leaked.html","updated_at":"2017-06-19T16:38:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JqNrIIjHp2E/us-voters-data-leaked.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Mexican Govt. Allegedly Used Spyware Against Journalists, Activists & A Child","description":"After the disclosure of sophisticated global espionage and disinformation campaign aimed to discredit enemies of the state, Citizen Lab researchers exposed the dirty game of the Mexican government and its politics.\n\nThe report — "Government Spy: Systematic monitoring of journalists and human rights defenders in Mexico" — published by Citizen Lab today revealed how the Mexican government used<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=iM4UJrb54B8:GwFUfTKpxsg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/iM4UJrb54B8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/iM4UJrb54B8/mexican-spyware-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/iM4UJrb54B8/mexican-spyware-malware.html","updated_at":"2017-06-19T13:02:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/iM4UJrb54B8/mexican-spyware-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How to install Linux on a Chromebook (and why you should)","description":"Crouton and Gallium OS turn Chromebooks into Linux laptops.","link":"https://arstechnica.com/?p=1120419","comments":"https://arstechnica.com/?p=1120419","updated_at":"2017-06-19T12:52:23+00:00","link_to_comments":"https://arstechnica.com/?p=1120419","link_host":"arstechnica.com","from":"arssecurity"},{"title":"European Parliament Proposes Ban On Encryption Backdoors","description":"Prime Minister Theresa May wants tech companies, like Facebook, Apple, and Google, to create controversial 'backdoors' for police, but even somewhere she knows that it's not that easy as it sounds.\n\nThe Civil Liberties, Justice and Home Affairs Committee of the European Parliament has released a draft proposal [PDF] for new laws on privacy and electronic communications, recommending end-to-end (<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xfaZNoAJTrU:wpk3aV0HjSQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xfaZNoAJTrU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xfaZNoAJTrU/encryption-backdoor.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xfaZNoAJTrU/encryption-backdoor.html","updated_at":"2017-06-19T11:52:39+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xfaZNoAJTrU/encryption-backdoor.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How to Speed Up Firefox With Multi-Process, If It's Not Working By Default","description":"After years of waiting, Mozilla last week launched Firefox 54 for Windows, Mac, Linux, and Android, with multi-process support — a "major improvement" to improve your browsing experience — but many users are still struggling to take advantage of this feature.\n\nMozilla's multi-process support in Firefox has been in development for over eight years as part of a project, codenamed Electrolysis or<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=LQ-7DGtUL5A:qppGHc0vsU0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/LQ-7DGtUL5A" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/LQ-7DGtUL5A/electrolysis-firefox-mutiprocess.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/LQ-7DGtUL5A/electrolysis-firefox-mutiprocess.html","updated_at":"2017-06-19T08:43:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/LQ-7DGtUL5A/electrolysis-firefox-mutiprocess.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Google Play is fighting an uphill battle against Android adware","description":"Google hasn’t yet removed all of the apps, which have as many as 6 million downloads.","link":"https://arstechnica.com/?p=1119943","comments":"https://arstechnica.com/?p=1119943","updated_at":"2017-06-16T19:30:05+00:00","link_to_comments":"https://arstechnica.com/?p=1119943","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Advanced CIA firmware has been infecting Wi-Fi routers for years","description":"Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.","link":"https://arstechnica.com/?p=1119403","comments":"https://arstechnica.com/?p=1119403","updated_at":"2017-06-15T22:39:01+00:00","link_to_comments":"https://arstechnica.com/?p=1119403","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Login-stealing phishing sites conceal their evil with lots of hyphens in URL","description":"Compromised domains target Android users with fake login pages for cloud services.","link":"https://arstechnica.com/?p=1118713","comments":"https://arstechnica.com/?p=1118713","updated_at":"2017-06-15T13:49:33+00:00","link_to_comments":"https://arstechnica.com/?p=1118713","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Georgia’s lax voting security exposed just in time for crucial special election","description":"Report uncovers a litany of lapses in voting system used state-wide.","link":"https://arstechnica.com/?p=1118673","comments":"https://arstechnica.com/?p=1118673","updated_at":"2017-06-15T00:37:52+00:00","link_to_comments":"https://arstechnica.com/?p=1118673","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Fileless malware targeting US restaurants went undetected by most AV","description":"Ongoing campaign shows more hackers are adopting sneaky attack technique.","link":"https://arstechnica.com/?p=1118169","comments":"https://arstechnica.com/?p=1118169","updated_at":"2017-06-14T14:21:21+00:00","link_to_comments":"https://arstechnica.com/?p=1118169","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft’s decision to patch Windows XP is a mistake","description":"There will always be one more emergency.","link":"http://arstechnica.com/?p=455551","comments":"http://arstechnica.com/?p=455551","updated_at":"2017-06-14T02:20:12+00:00","link_to_comments":"http://arstechnica.com/?p=455551","link_host":"arstechnica.com","from":"arssecurity"}]