[{"title":"Smart Devices Can Be Hijacked to Track Your Body Movements And Activities Remotely","description":"If your smartphones, tablets, smart refrigerators, smart TVs and other smart devices are smart enough to make your life easier, their smart behavior could also be leveraged by hackers to steal data, invade your privacy or spy on you, if not secured properly.\n\nOne such experiment has recently been performed by a team of student hackers, demonstrating a new attack method to turn smart devices<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=PLTMZtzWofY:U3s3Oca-CnQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/PLTMZtzWofY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/PLTMZtzWofY/hacking-track-movements.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PLTMZtzWofY/hacking-track-movements.html","updated_at":"2017-08-20T10:17:24+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/PLTMZtzWofY/hacking-track-movements.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Laverna: An open source Evernote alternative","description":"https://laverna.cc/","link":"https://www.designernews.co/stories/86736-laverna-an-open-source-evernote-alternative","comments":"https://www.designernews.co/stories/86736-laverna-an-open-source-evernote-alternative","updated_at":"2017-08-20T08:46:32+00:00","link_to_comments":"https://www.designernews.co/stories/86736-laverna-an-open-source-evernote-alternative","link_host":"laverna.cc","from":"designernews"},{"title":"JK Rowling shuts down Erik Spiekermann on Twitter","description":"https://twitter.com/jk_rowling/status/898946136161095681","link":"https://www.designernews.co/stories/86731-jk-rowling-shuts-down-erik-spiekermann-on-twitter","comments":"https://www.designernews.co/stories/86731-jk-rowling-shuts-down-erik-spiekermann-on-twitter","updated_at":"2017-08-19T17:32:31+00:00","link_to_comments":"https://www.designernews.co/stories/86731-jk-rowling-shuts-down-erik-spiekermann-on-twitter","link_host":"twitter.com","from":"designernews"},{"title":"Is it better for designers to be generalists or specialists?","description":"https://read.compassofdesign.com/is-it-better-to-be-a-generalist-or-specialist-5e4a805284b","link":"https://www.designernews.co/stories/86718-is-it-better-for-designers-to-be-generalists-or-specialists","comments":"https://www.designernews.co/stories/86718-is-it-better-for-designers-to-be-generalists-or-specialists","updated_at":"2017-08-19T00:13:49+00:00","link_to_comments":"https://www.designernews.co/stories/86718-is-it-better-for-designers-to-be-generalists-or-specialists","link_host":"read.compassofdesign.com","from":"designernews"},{"title":"Firefox Focus private browser for iOS and Android","description":"https://www.mozilla.org/en-US/firefox/focus/","link":"https://www.designernews.co/stories/86717-firefox-focus-private-browser-for-ios-and-android","comments":"https://www.designernews.co/stories/86717-firefox-focus-private-browser-for-ios-and-android","updated_at":"2017-08-18T20:46:51+00:00","link_to_comments":"https://www.designernews.co/stories/86717-firefox-focus-private-browser-for-ios-and-android","link_host":"www.mozilla.org","from":"designernews"},{"title":"Sketch bug keeps causing my keyboard shortcuts to stop working!","description":"Is anyone else getting this problem in the latest version of sketch?\n\nBasically, some of my keys just stop working after a while with certain docs, and I have to close them and re-open for them to come back. \n\nAt first, it was just holding alt to see the distance between objects wasn't working but now my arrow keys have ceased working for moving stuff, and backspace/delete. As I said I have to close and re-open the doc for it to fix it, but even then it only works for a short time. \n\nIs anyone else seeing this problem? Any idea of the cause/fix?\n\nthanks","link":"https://www.designernews.co/stories/86701-sketch-bug-keeps-causing-my-keyboard-shortcuts-to-stop-working","comments":"https://www.designernews.co/stories/86701-sketch-bug-keeps-causing-my-keyboard-shortcuts-to-stop-working","updated_at":"2017-08-18T13:36:18+00:00","link_to_comments":"https://www.designernews.co/stories/86701-sketch-bug-keeps-causing-my-keyboard-shortcuts-to-stop-working","link_host":null,"from":"designernews"},{"title":"Secret chips in replacement parts can completely hijack your phone’s security","description":"Booby-trapped touchscreens can log passwords, install malicious apps, and more.","link":"https://arstechnica.com/?p=1148889","comments":"https://arstechnica.com/?p=1148889","updated_at":"2017-08-18T12:27:29+00:00","link_to_comments":"https://arstechnica.com/?p=1148889","link_host":"arstechnica.com","from":"arssecurity"},{"title":"iAniMagic 2017 Animation Competition ","description":"https://anizone.kdanmobile.com/ianimagic2017/start","link":"https://www.designernews.co/stories/86698-ianimagic-2017-animation-competition-","comments":"https://www.designernews.co/stories/86698-ianimagic-2017-animation-competition-","updated_at":"2017-08-18T09:55:22+00:00","link_to_comments":"https://www.designernews.co/stories/86698-ianimagic-2017-animation-competition-","link_host":"anizone.kdanmobile.com","from":"designernews"},{"title":"Affinity Photo for iPad users - free update v1.6.4 now available","description":"https://affinity.serif.com/blog/affinity-photo-for-ipad-gets-new-update-and-lower-price-point/","link":"https://www.designernews.co/stories/86697-affinity-photo-for-ipad-users--free-update-v164-now-available","comments":"https://www.designernews.co/stories/86697-affinity-photo-for-ipad-users--free-update-v164-now-available","updated_at":"2017-08-18T09:43:36+00:00","link_to_comments":"https://www.designernews.co/stories/86697-affinity-photo-for-ipad-users--free-update-v164-now-available","link_host":"affinity.serif.com","from":"designernews"},{"title":"Product Graveyard","description":"http://productgraveyard.com/","link":"https://www.designernews.co/stories/86695-product-graveyard","comments":"https://www.designernews.co/stories/86695-product-graveyard","updated_at":"2017-08-18T08:41:20+00:00","link_to_comments":"https://www.designernews.co/stories/86695-product-graveyard","link_host":"productgraveyard.com","from":"designernews"},{"title":"Android Trojan Now Targets Non-Banking Apps that Require Card Payments","description":"The infamous mobile banking trojan that recently added ransomware features to steal sensitive data and lock user files at the same time has now been modified to steal credentials from Uber and other booking apps as well.\n\nSecurity researchers at Kaspersky Lab have discovered a new variant of the Android banking Trojan called Faketoken that now has capabilities to detect and record an infected<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=S7UIDS50Ez0:xFLiGtsyxns:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/S7UIDS50Ez0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/S7UIDS50Ez0/android-banking-trojan.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/S7UIDS50Ez0/android-banking-trojan.html","updated_at":"2017-08-18T07:56:58+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/S7UIDS50Ez0/android-banking-trojan.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Integrating Animation into a Design System","description":"https://alistapart.com/article/integrating-animation-into-a-design-system","link":"https://www.designernews.co/stories/86693-integrating-animation-into-a-design-system","comments":"https://www.designernews.co/stories/86693-integrating-animation-into-a-design-system","updated_at":"2017-08-18T07:00:05+00:00","link_to_comments":"https://www.designernews.co/stories/86693-integrating-animation-into-a-design-system","link_host":"alistapart.com","from":"designernews"},{"title":"Formcarry | Now With Freemium and Low Volume Plans","description":"https://formcarry.com","link":"https://www.designernews.co/stories/86691-formcarry--now-with-freemium-and-low-volume-plans","comments":"https://www.designernews.co/stories/86691-formcarry--now-with-freemium-and-low-volume-plans","updated_at":"2017-08-18T06:20:58+00:00","link_to_comments":"https://www.designernews.co/stories/86691-formcarry--now-with-freemium-and-low-volume-plans","link_host":"formcarry.com","from":"designernews"},{"title":"Adult Literacy and E-Learning","description":"Adult Literacy and technology\n\n\t\tIlliteracy lies at the root of everything that hinders the progress of a country. Light of knowledge unites people to agitate for their demands and human rights, but illiteracy keeps them in darkness. It is merely not necessary to carry the torch of education to all corners of the world, but also to people of all ages, as age is just a number.\nIndian constitution lays down universal compulsory education as a directive principle of the state. The children, today, no doubt have some chances of getting educated, but the goon up adults never had the opportunity of feeling the light of knowledge and blindfolded, they move around their orbit of life.\n\nThe problem of adult education is a serious one. Because of their financial instability, the adults of the weaker sections of the society are busy earning their living, hence ignoring education completely. Night classes are not running successfully as the hardly get two square meals a day. Adult education without offering job and food is almost a mockery.\nThe literacy ration of any country is extremely important. A country with educated adult population is bound to achieve social, economic, technological and moral progress. And above all that, an educated person is able to overcome his individual poverty. Educated masses are capable of bringing mass changes in the society and gives them power to fight social evils as well. To promote further education, an educated adult can take up the job of teaching as their profession.\n\nPromoting adult education should be done effectively in order to secure a better future for the nation as well as the youth. Adult education can take place in many ways. An illiterate person can learn to read and write. Technology, these days has been proven beneficial for education in several ways. If technology is incorporated at primary and secondary levels of education, it can be used as a medium for adult education as well. With the growing use of technology, several websites and applications have launched to support the noble cause.\nGlossaread is a new step towards making education easy and affordable for all. The website offers quality content for every age group and every genre. Websites like Glossaread promote holistic learning at any time as internet is accessible round the clock, which makes it easier for people to join part time courses. In this way, they can learn and earn at the same time. Access to internet is also not limited at this point of time. Glossaread comes to help in the form of mobile applications as well, which makes learning on the go easier. At Glossaread, “chapters” of the books are available at a very nominal cost. The cost of these chapters is affordable for every section of the society and the chapters are easily accessible as well. The concept of breaking down books into “chapters” is a revolutionary one as instead of purchasing the whole book, which can sometimes be hard to find or heavy on pockets, students can just buy the chapters as per their need without affecting their time and pockets.\n\nWith these new technological aids, education for all can be a dream that can soon turn into realist.\n\nVisit: www.glossaread.com/books","link":"https://www.designernews.co/stories/86690-adult-literacy-and-elearning","comments":"https://www.designernews.co/stories/86690-adult-literacy-and-elearning","updated_at":"2017-08-18T05:31:56+00:00","link_to_comments":"https://www.designernews.co/stories/86690-adult-literacy-and-elearning","link_host":null,"from":"designernews"},{"title":"Dribbble is about to take our jobs!!","description":"![SP](http://i0.kym-cdn.com/entries/icons/facebook/000/011/129/RT.jpg)\n\n\nSup guys Im back to talk about the job postings. As you may remember, Im that dude that created the hottest debate of 2017 about how my leads were being taken from the ease of being able to change your location. \n\nhttps://www.designernews.co/stories/83366-ueno-is-about-to-destroy-my-dribbble-leads-\n\nSince then Dribbble has released Scout. To be honest this solution is cray.. Ive recently been asked to invite some designers onto a project I am working on right now for Toyota. High paying gig and would be great for some of the amazing Dribbblers in the community that Im homies with.\n\nSo when I went to go do a general search for people in the area, I was bombarded with a ton of results due to Dribbbles new ability to state where else you would be open to work. The problem is Users are now able to add other locations rather than where they live. Heres an example: \n![dribble](http://i.imgur.com/l1YThi8.png)\n\nYou literally have no limit of where you are willing to work.\n\nThe biggest problem for me is that takes away the community aspect, and meet ups for designer in their cities. I have lived in OC / SEA / and now LA. I have found it super awesome to meet new friends by just searching LA and finding other designers with similar interest and meeting up for drinks. Now I have to go through tons of other designer to find the ones actually based in LA.\n\nI know for a damn fact non of these dudes living even 2 hours from LA would be willing to drive to the office. Let alone the people living in Vermont saying they are open to work in LA. It has become a searching nightmare for me to hook up some dribblers in the LA for an amazing gig.\n\nI think that this push is awesome though and will bring a lot more jobs opportunities to designers on the platform, but its too many people that they have to filter through to just find someone in their location. Meaning those recruiters are going to give up trying to deal with the amount of people not willing to relocate.","link":"https://www.designernews.co/stories/86689-dribbble-is-about-to-take-our-jobs","comments":"https://www.designernews.co/stories/86689-dribbble-is-about-to-take-our-jobs","updated_at":"2017-08-18T00:15:59+00:00","link_to_comments":"https://www.designernews.co/stories/86689-dribbble-is-about-to-take-our-jobs","link_host":"i0.kymcdn.com","from":"designernews"},{"title":"Slack redesigned their website","description":"https://slack.com","link":"https://www.designernews.co/stories/86688-slack-redesigned-their-website","comments":"https://www.designernews.co/stories/86688-slack-redesigned-their-website","updated_at":"2017-08-17T22:57:45+00:00","link_to_comments":"https://www.designernews.co/stories/86688-slack-redesigned-their-website","link_host":"slack.com","from":"designernews"},{"title":"It’s About More than Pixels: Redefining \"Designer\"","description":"https://by.dialexa.com/more-than-pixels-redefining-designer","link":"https://www.designernews.co/stories/86687-its-about-more-than-pixels-redefining-designer","comments":"https://www.designernews.co/stories/86687-its-about-more-than-pixels-redefining-designer","updated_at":"2017-08-17T21:48:33+00:00","link_to_comments":"https://www.designernews.co/stories/86687-its-about-more-than-pixels-redefining-designer","link_host":"by.dialexa.com","from":"designernews"},{"title":"Mobile UI Kit Feedback","description":"Dear community! \n\nIt's a question of lifetime. At the moment I'm working on a hugest ecommerce mobile UI kit. Crafted in Figma it's developers' friendly. So they are free to export and grab CSS, iOS, Android code. Fits for all! I'll support it with animations and statements specs like no one before. With code and live GIF's. One handed usage and usability tested. So no more hamburgers at the top!\n\nWill you pay for this product?\n\nA - No \n\nB - $1-20 \n\nC - $20-50 \n\nD - $50-100\n\nThanks! \nHugs!\n\nPREVIEW\nhttps://dribbble.com/shots/3743430-Question-for-community-Please-participate","link":"https://www.designernews.co/stories/86686-mobile-ui-kit-feedback","comments":"https://www.designernews.co/stories/86686-mobile-ui-kit-feedback","updated_at":"2017-08-17T21:22:23+00:00","link_to_comments":"https://www.designernews.co/stories/86686-mobile-ui-kit-feedback","link_host":"dribbble.com","from":"designernews"},{"title":"Redesigning Banco Galicia's mobile experience ","description":"https://aerolab.co/banco-galicia","link":"https://www.designernews.co/stories/86680-redesigning-banco-galicias-mobile-experience-","comments":"https://www.designernews.co/stories/86680-redesigning-banco-galicias-mobile-experience-","updated_at":"2017-08-17T20:12:59+00:00","link_to_comments":"https://www.designernews.co/stories/86680-redesigning-banco-galicias-mobile-experience-","link_host":"aerolab.co","from":"designernews"},{"title":"Website Launch Checklist","description":"http://boxesandarrows.com/user-centered-design-is-everyones-responsibility-a-launch-checklist/","link":"https://www.designernews.co/stories/86679-website-launch-checklist","comments":"https://www.designernews.co/stories/86679-website-launch-checklist","updated_at":"2017-08-17T19:31:27+00:00","link_to_comments":"https://www.designernews.co/stories/86679-website-launch-checklist","link_host":"boxesandarrows.com","from":"designernews"},{"title":"Dead Domains — Share domains you are not using","description":"https://dead.domains/","link":"https://www.designernews.co/stories/86677-dead-domains--share-domains-you-are-not-using","comments":"https://www.designernews.co/stories/86677-dead-domains--share-domains-you-are-not-using","updated_at":"2017-08-17T18:40:20+00:00","link_to_comments":"https://www.designernews.co/stories/86677-dead-domains--share-domains-you-are-not-using","link_host":"dead.domains","from":"designernews"},{"title":"Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader","description":"Are you using Foxit PDF Reader? If yes, then you need to watch your back.\n\nSecurity researchers have discovered two critical zero-day security vulnerabilities in Foxit Reader software that could allow attackers to execute arbitrary code on a targeted computer, if not configured to open files in the Safe Reading Mode.\n\nThe first vulnerability (CVE-2017-10951) is a command injection bug<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=BcuzGrO3-XY:-FlSWPk8NnU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/BcuzGrO3-XY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/BcuzGrO3-XY/two-critical-zero-day-flaws-disclosed.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BcuzGrO3-XY/two-critical-zero-day-flaws-disclosed.html","updated_at":"2017-08-17T17:59:40+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BcuzGrO3-XY/two-critical-zero-day-flaws-disclosed.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Facebook Design's Desktop Kit","description":"http://facebook.design/desktopkit","link":"https://www.designernews.co/stories/86675-facebook-designs-desktop-kit","comments":"https://www.designernews.co/stories/86675-facebook-designs-desktop-kit","updated_at":"2017-08-17T17:17:19+00:00","link_to_comments":"https://www.designernews.co/stories/86675-facebook-designs-desktop-kit","link_host":"facebook.design","from":"designernews"},{"title":"New article out: The Falafel Method for UI Design","description":"http://hackingui.com/design/the-falafel-method-for-ui-design/","link":"https://www.designernews.co/stories/86674-new-article-out-the-falafel-method-for-ui-design","comments":"https://www.designernews.co/stories/86674-new-article-out-the-falafel-method-for-ui-design","updated_at":"2017-08-17T16:52:02+00:00","link_to_comments":"https://www.designernews.co/stories/86674-new-article-out-the-falafel-method-for-ui-design","link_host":"hackingui.com","from":"designernews"},{"title":"Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features","description":"Today, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, which means a majority of car's functions—from instrument cluster to steering, brakes, and accelerator—are electronically controlled.\n\nNo doubt these auto-control systems make your driving experience much better, but at the same time, they also increase the risk of getting hacked.\n\nCar Hacking<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=fZC-0vRjwo8:_wG9O27ATXc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/fZC-0vRjwo8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/fZC-0vRjwo8/car-safety-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fZC-0vRjwo8/car-safety-hacking.html","updated_at":"2017-08-17T16:01:39+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/fZC-0vRjwo8/car-safety-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Prince gets his own Pantone color","description":"http://kottke.org/17/08/prince-gets-his-own-pantone-color","link":"https://www.designernews.co/stories/86669-prince-gets-his-own-pantone-color","comments":"https://www.designernews.co/stories/86669-prince-gets-his-own-pantone-color","updated_at":"2017-08-17T14:18:43+00:00","link_to_comments":"https://www.designernews.co/stories/86669-prince-gets-his-own-pantone-color","link_host":"kottke.org","from":"designernews"},{"title":"Product redesigns: how to not mess 'em up","description":"https://www.appcues.com/blog/launching-product-redesign?utm_source=designernews&utm_medium=community&utm_campaign=launching-product-redesign","link":"https://www.designernews.co/stories/86667-product-redesigns-how-to-not-mess-em-up","comments":"https://www.designernews.co/stories/86667-product-redesigns-how-to-not-mess-em-up","updated_at":"2017-08-17T13:44:28+00:00","link_to_comments":"https://www.designernews.co/stories/86667-product-redesigns-how-to-not-mess-em-up","link_host":"www.appcues.com","from":"designernews"},{"title":"Oopss! HBO Itself Accidentally Leaked 'Game of Thrones' Season 7 Episode 6","description":"HBO doesn't need hackers to leak its widely watched "Game of Thrones" episodes, as it is sufficient enough to leak them by its own.\n\nIn what seems to be a terrible blunder, HBO Spain appeared to have accidentally broadcast the next episode—Episode 6—of Game of Thrones season 7 five days before its official premiere.\n\nAnd as expected, the GoT episode 6 quickly began circulating online.\n&lt;!--<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ThGV32UXTVs:-mu-DvC5azg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ThGV32UXTVs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ThGV32UXTVs/game-of-thrones-season7.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ThGV32UXTVs/game-of-thrones-season7.html","updated_at":"2017-08-17T10:14:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ThGV32UXTVs/game-of-thrones-season7.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Game of Thrones and HBO — Twitter, Facebook Accounts Hacked","description":"The Game of Thrones hacking saga continues, but this time it's the HBO's and GOT's official Twitter and Facebook accounts got compromised, rather than upcoming episodes.\n\nAs if the leak of episodes by hackers and the accidental airing of an upcoming episode of Game of Thrones by HBO itself were not enough, a notorious group of hackers took over the official Twitter and Facebook accounts for<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Y5BpJVHVH9o:yKkjEoq3t48:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Y5BpJVHVH9o" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y5BpJVHVH9o/game-of-thrones-hbo-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y5BpJVHVH9o/game-of-thrones-hbo-hack.html","updated_at":"2017-08-17T10:12:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y5BpJVHVH9o/game-of-thrones-hbo-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"1 year without littlebigdetails.com","description":"1 year without any post on http://littlebigdetails.com/! I really love the little things it was bringing, do you know something like that? (and alive)","link":"https://www.designernews.co/stories/86653-1-year-without-littlebigdetailscom","comments":"https://www.designernews.co/stories/86653-1-year-without-littlebigdetailscom","updated_at":"2017-08-17T09:05:20+00:00","link_to_comments":"https://www.designernews.co/stories/86653-1-year-without-littlebigdetailscom","link_host":"woops, can't parse","from":"designernews"},{"title":"Bonsai Expenses for Creatives","description":"https://www.hellobonsai.com/freelance-expenses","link":"https://www.designernews.co/stories/86651-bonsai-expenses-for-creatives","comments":"https://www.designernews.co/stories/86651-bonsai-expenses-for-creatives","updated_at":"2017-08-17T08:48:44+00:00","link_to_comments":"https://www.designernews.co/stories/86651-bonsai-expenses-for-creatives","link_host":"www.hellobonsai.com","from":"designernews"},{"title":"Corrupt Federal Agent, Who Stole Bitcoins From Silk Road, Pleads Guilty To Money Laundering","description":"A former the United States Secret Service agent who stole hundreds of thousands of dollars worth of Bitcoins during an investigation into then-largest underground marketplace Silk Road has now pleaded guilty to money laundering.\n\nShaun W. Bridges is one of two former US undercover agents who pleaded guilty in 2015 to one count of money laundering and one count of obstruction and was sentenced<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=dwnJ7O1sDqE:kIPwiremnnM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/dwnJ7O1sDqE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/dwnJ7O1sDqE/money-laundering-silkroad-agent.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dwnJ7O1sDqE/money-laundering-silkroad-agent.html","updated_at":"2017-08-16T12:45:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dwnJ7O1sDqE/money-laundering-silkroad-agent.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"8 More Chrome Extensions Hijacked to Target 4.8 Million Users","description":"Google's Chrome web browser Extensions are under attack with a series of developers being hacked within last one month.\n\nAlmost two weeks ago, we reported how unknown attackers managed to compromise the Chrome Web Store account of a developer team and hijacked Copyfish extension, and then modified it to distribute spam correspondence to users.\n\nJust two days after that incident, some unknown<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=bg1qf5F3nyg:L7MdRHY2-Es:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bg1qf5F3nyg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bg1qf5F3nyg/chrome-extension-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bg1qf5F3nyg/chrome-extension-hacking.html","updated_at":"2017-08-16T12:22:04+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bg1qf5F3nyg/chrome-extension-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Backdoor Found in Popular Server Management Software used by Hundreds of Companies","description":"Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They are now adopting more clandestine techniques that come with limitless attack vectors and are harder to detect.\n\nRecently, cyber crooks managed to infiltrate the update mechanism for a popular server management software package and altered it to include an advanced backdoor, which lasts for at least 17<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=_cIK8Qt5XIk:I941UYfDwgM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_cIK8Qt5XIk" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_cIK8Qt5XIk/netsarang-server-management.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_cIK8Qt5XIk/netsarang-server-management.html","updated_at":"2017-08-16T07:14:34+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_cIK8Qt5XIk/netsarang-server-management.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Faulty Firmware Auto-Update Breaks Hundreds of 'Smart Locks'","description":"More features, more problems!\n\nToday, we are living in a digital age that is creating a digital headache for people by connecting every other unnecessary home appliance to the Internet.\n\nLast week, nearly hundreds of Internet-connected locks became inoperable after a faulty software update hit some models.\n\nUsers of remotely accessible smart locks made by Colorado-based company LockState have<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=oVDv1UJxA-U:9fl4ZtQ-Rxg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/oVDv1UJxA-U" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/oVDv1UJxA-U/firmware-smart-locks.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/oVDv1UJxA-U/firmware-smart-locks.html","updated_at":"2017-08-15T17:10:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/oVDv1UJxA-U/firmware-smart-locks.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Warning: Two Dangerous Ransomware Are Back – Protect Your Computers","description":"Ransomware has been around for a few years but has become an albatross around everyone's neck—from big businesses and financial institutions to hospitals and individuals worldwide—with cyber criminals making millions of dollars.\n\nIn just past few months, we saw a scary strain of ransomware attacks including WannaCry, Petya and LeakerLocker, which made chaos worldwide by shutting down hospitals<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=WrbBq6HWpg0:ZM-lGRyy1kw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/WrbBq6HWpg0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/WrbBq6HWpg0/locky-mamba-ransomware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/WrbBq6HWpg0/locky-mamba-ransomware.html","updated_at":"2017-08-15T11:14:23+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/WrbBq6HWpg0/locky-mamba-ransomware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests","description":"An infamous Russian-linked cyber-espionage group has been found re-using the same leaked NSA hacking tool that was deployed in the WannaCry and NotPetya outbreaks—this time to target Wi-Fi networks to spy on hotel guests in several European countries.\n\nSecurity researchers at FireEye have uncovered an ongoing campaign that remotely steals credentials from high-value guests using Wi-Fi networks<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=v0HFT6t_wyU:HZvpgII0PNg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/v0HFT6t_wyU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/v0HFT6t_wyU/hotel-wifi-hacking-tools.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/v0HFT6t_wyU/hotel-wifi-hacking-tools.html","updated_at":"2017-08-15T10:31:27+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/v0HFT6t_wyU/hotel-wifi-hacking-tools.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Building America’s Trust Act would amp up privacy concerns at the border","description":"Civil libertarians tell Ars they’re worried about “mass surveillance expansion.”","link":"https://arstechnica.com/?p=1146953","comments":"https://arstechnica.com/?p=1146953","updated_at":"2017-08-15T08:00:38+00:00","link_to_comments":"https://arstechnica.com/?p=1146953","link_host":"arstechnica.com","from":"arssecurity"},{"title":"How Just Opening A Malicious PowerPoint File Could Compromise Your PC","description":"A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office.\n\nThe Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object Linking and Embedding (OLE) interface for which a patch was issued in April this year, but threat actors are still abusing the flaw through the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=TJZU1c9OQn8:uG8nK1EoDoI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/TJZU1c9OQn8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/TJZU1c9OQn8/powerpoint-malware-ms-office.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TJZU1c9OQn8/powerpoint-malware-ms-office.html","updated_at":"2017-08-14T18:45:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/TJZU1c9OQn8/powerpoint-malware-ms-office.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious Links","description":"Phishing — is an older style of cyber-attack but remains one of the most common and efficient attack vectors for attackers, as a majority of banking malware and various ransomware attacks begin with a user clicking on a malicious link or opening a dangerous attachment in an email.\n\nPhishing has evolved than ever before in the past few years – which is why it remains one of those threats that<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xh7Wc03Xz5Y:nGraPQSxdl8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xh7Wc03Xz5Y" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xh7Wc03Xz5Y/gmail-anti-phishing.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xh7Wc03Xz5Y/gmail-anti-phishing.html","updated_at":"2017-08-14T16:00:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xh7Wc03Xz5Y/gmail-anti-phishing.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Sponsor: Claim a Free .design Domain Name as a Member of Designer News","description":"A .design domain name and email hosting are yours for a year!* (SSL certs and WHOIS privacy are always free.) Additional domains are just $5 (code: DESIGNERNEWS).\n\n*Does not apply to premium names (e.g., nyc.design, smith.design, visual.design). Domains renew annually at $35.\n\n---\n\n**How do I claim my domain?**\n\nEasy, just visit the [DN Deals](https://www.designernews.co/me/deals#design-domains).\n\n**What if I don't have a DN account?**\n\n[Signup for a free account](https://www.designernews.co/signup) first, then join the community and access your codes/discounts.\n\n**Questions? Having trouble with checkout?**\n\nFret not! [Contact support](https://web.design/support), they're happy to help!","link":"https://www.designernews.co/stories/86538-sponsor-claim-a-free-design-domain-name-as-a-member-of-designer-news","comments":"https://www.designernews.co/stories/86538-sponsor-claim-a-free-design-domain-name-as-a-member-of-designer-news","updated_at":"2017-08-14T13:48:13+00:00","link_to_comments":"https://www.designernews.co/stories/86538-sponsor-claim-a-free-design-domain-name-as-a-member-of-designer-news","link_host":null,"from":"designernews"},{"title":"Facebook Covertly Launches A Photo-Sharing App In China","description":"The Chinese market is no doubt a pot of gold for big technology giants with over 700 million internet users, but the Chinese government heavily controls the Internet within its borders through its Golden Shield project – the Great Firewall of China.\n\nThe Great Firewall has blocked some 171 out of the world's leading websites, including Google, Facebook, Instagram, Twitter, Tumblr, Dropbox, and<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=hJ_GO7lkW_c:QJVE2bpV5rI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/hJ_GO7lkW_c" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/hJ_GO7lkW_c/facebook-moment-colorful-balloons.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hJ_GO7lkW_c/facebook-moment-colorful-balloons.html","updated_at":"2017-08-14T13:42:49+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hJ_GO7lkW_c/facebook-moment-colorful-balloons.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"IPS as a Service Blocks WannaCry Spread Across the WAN","description":"One of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagating capability exploiting a vulnerability in the file access protocol, SMB v1.\n\nMost enterprises defences are externally-facing, focused on stopping incoming email and web attacks. But, once attackers gain a foothold inside the network through malware, there are very few security controls that<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=-YHU8X3M8cY:iCyfTu_-PDU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-YHU8X3M8cY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-YHU8X3M8cY/wannacry-network-security.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-YHU8X3M8cY/wannacry-network-security.html","updated_at":"2017-08-14T13:10:01+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-YHU8X3M8cY/wannacry-network-security.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Launches Ethereum-Based 'Coco Framework' to Speed Up Blockchain Network","description":"A growing number of enterprises are showing their interest in blockchains, but the underlying software fails to meet key enterprise requirements like performance, confidentiality, governance, and required processing power.\n\nHowever, Microsoft wants to help solve these issues and make it easier for the enterprises to build their networks using any distributed ledger.\n\nMicrosoft has unveiled a<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=0TiTpyxwPiE:pYxnbFmZbtw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/0TiTpyxwPiE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/0TiTpyxwPiE/microsoft-ethereum-coco-framework.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/0TiTpyxwPiE/microsoft-ethereum-coco-framework.html","updated_at":"2017-08-14T08:31:31+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/0TiTpyxwPiE/microsoft-ethereum-coco-framework.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"HBO Offered Hackers $250,000 As Ransom to Prevent More Leaks","description":"Hackers who recently hacked into HBO network and stole scripts, shows, and employee information documents, have now provided an email in which the United States cable channel offered them $250,000.\n\nThe company offered the payment as a "bounty payment" reward in which companies reward white-hat hackers for discovering cyber security vulnerabilities in their computer networks.\n\nLate last month,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=-c-K4IMkEvM:8d2PjZiO1b4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-c-K4IMkEvM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-c-K4IMkEvM/hbo-hackers-game-of-thrones.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-c-K4IMkEvM/hbo-hackers-game-of-thrones.html","updated_at":"2017-08-12T13:26:45+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-c-K4IMkEvM/hbo-hackers-game-of-thrones.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"More than 1,000 Spyware Apps Found On Android App Stores","description":"If you think you are downloading apps from Google Play Store and you are secure, then watch out!\n\nSomeone has managed to flood third-party app stores and Google Play Store with more than a thousand malicious apps, which can monitor almost anything a user does on their mobile device from silently recording calls to make outbound calls without the user’s interaction.\n\nDubbed SonicSpy, the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=D9sQeiPyRA4:MGtFZCUmwOU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/D9sQeiPyRA4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/D9sQeiPyRA4/android-spyware-apps-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/D9sQeiPyRA4/android-spyware-apps-hack.html","updated_at":"2017-08-11T16:16:08+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/D9sQeiPyRA4/android-spyware-apps-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ukrainian Man Arrested For Distributing NotPetya Ransomware And Helping Tax Evaders","description":"Ukrainian authorities have arrested a 51-year-old man accused of distributing the infamous Petya ransomware (Petya.A, also known as NotPetya) — the same computer virus that massively hit numerous businesses, organisations and banks in Ukraine as well as different parts of Europe around 45 days ago.\n\nHowever, the story is not as simple as it seems, which portrayed this man as a criminal. I<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xaJWr3mHSoQ:R-ZYQ0Q6wjM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xaJWr3mHSoQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xaJWr3mHSoQ/ukraine-petya-ransomware-hacker.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xaJWr3mHSoQ/ukraine-petya-ransomware-hacker.html","updated_at":"2017-08-10T21:15:13+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xaJWr3mHSoQ/ukraine-petya-ransomware-hacker.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Online CISSP Certification Training Course — Learn from Experts","description":"If you dream of making it big in the IT security community, the CISSP certification is a necessary milestone.\n\nCertified Information Systems Security Professional (CISSP) is a globally recognised certification in the field of information security, which has become a gold standard of achievement that is acknowledged worldwide.\n\nCISSP certification deals with a range of information security<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=qhKX4uLK9Yw:5-PlpYcwxyc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/qhKX4uLK9Yw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/qhKX4uLK9Yw/online-cissp-certification-training.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/qhKX4uLK9Yw/online-cissp-certification-training.html","updated_at":"2017-08-10T12:51:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/qhKX4uLK9Yw/online-cissp-certification-training.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time","description":"After disclosing CIA's strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA's ability to spy on video streams remotely in real-time.\n\nDubbed 'CouchPotato,' document leaked from the CIA details how the CIA agents use a remote tool to stealthy collect RTSP/H.264 video streams.\n&lt;!-- adsense --&gt;<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=kMWcF6wPnbA:l-5W_B4Mx_Y:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/kMWcF6wPnbA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/kMWcF6wPnbA/cia-hacking-tool-video.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/kMWcF6wPnbA/cia-hacking-tool-video.html","updated_at":"2017-08-10T11:31:54+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/kMWcF6wPnbA/cia-hacking-tool-video.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Chinese Quantum Satellite Sends First ‘Unhackable’ Data to Earth","description":"In what appears to be the world's first quantum satellite transmission, China has successfully sent an "unbreakable" code over a long distance from an orbiting satellite to the Earth, achieving a milestone in the next generation encryption based on "quantum cryptography."\n\nIn August last year, China launched the world's first quantum communication satellite into the Earth’s orbit aboard a Long<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=O3QdQel8hnM:rTqVEFmapM8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/O3QdQel8hnM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/O3QdQel8hnM/quantum-satellite-data.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/O3QdQel8hnM/quantum-satellite-data.html","updated_at":"2017-08-10T10:28:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/O3QdQel8hnM/quantum-satellite-data.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Malware Encoded Into DNA Hacks the Computer that Reads It","description":"Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years?\n\nEven in March this year, a team of researchers successfully stored digital data — an entire operating system, a movie, an Amazon gift card, a study and a computer virus — in the strands of DNA.\n\nBut what if someone stores a malicious program into the DNA, just like an infected USB storage, to hijack the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=jS-LWtHA4ws:ej3Bh0TesKs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/jS-LWtHA4ws" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/jS-LWtHA4ws/hacking-computer-with-dna.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jS-LWtHA4ws/hacking-computer-with-dna.html","updated_at":"2017-08-10T08:10:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jS-LWtHA4ws/hacking-computer-with-dna.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How Top Companies Accidentally Leaking Terabytes of Sensitive Data Online","description":"An anti-malware detection service provider and premium security firm has been accused of leaking terabytes of confidential data from several Fortune 1000 companies, including customer credentials, financial records, network intelligence and other sensitive data.\n\nHowever, in response to the accusations, the security firm confirmed that they are not pulling sensitive files from its customers;<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=32fUSUCfyZw:LO7YB0StSaU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/32fUSUCfyZw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/32fUSUCfyZw/fortune-1000-data-leak.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/32fUSUCfyZw/fortune-1000-data-leak.html","updated_at":"2017-08-09T17:25:58+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/32fUSUCfyZw/fortune-1000-data-leak.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"After phishing attacks, Chrome extensions push adware to millions","description":"Compromised accounts push fraudulent extension updates to unsuspecting users.","link":"https://arstechnica.com/?p=1142099","comments":"https://arstechnica.com/?p=1142099","updated_at":"2017-08-03T15:45:25+00:00","link_to_comments":"https://arstechnica.com/?p=1142099","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft expands bug bounty program to cover any Windows flaw","description":"Now every part of Windows is covered by a bug bounty scheme.","link":"https://arstechnica.com/?p=1138451","comments":"https://arstechnica.com/?p=1138451","updated_at":"2017-07-26T20:28:19+00:00","link_to_comments":"https://arstechnica.com/?p=1138451","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 will try to combat ransomware by locking up your data","description":"But how to protect files from users who have access to those files remains tricky.","link":"https://arstechnica.com/?p=1126335","comments":"https://arstechnica.com/?p=1126335","updated_at":"2017-06-29T19:25:19+00:00","link_to_comments":"https://arstechnica.com/?p=1126335","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Ryzen Pro: AMD takes on Intel on the corporate desktop, with one key omission","description":"AMD wants to go after Intel vPro while avoiding Intel's excessive product segmentation.","link":"https://arstechnica.com/?p=1120511","comments":"https://arstechnica.com/?p=1120511","updated_at":"2017-06-29T13:00:32+00:00","link_to_comments":"https://arstechnica.com/?p=1120511","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft bringing EMET back as a built-in part of Windows 10","description":"The built-in exploit mitigations are getting stronger and easier to configure.","link":"https://arstechnica.com/?p=1124813","comments":"https://arstechnica.com/?p=1124813","updated_at":"2017-06-27T19:47:31+00:00","link_to_comments":"https://arstechnica.com/?p=1124813","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 S security brought down by, of course, Word macros","description":"Analysis: Windows 10 S promises many good things. It currently doesn't deliver.","link":"https://arstechnica.com/?p=1123201","comments":"https://arstechnica.com/?p=1123201","updated_at":"2017-06-23T20:11:21+00:00","link_to_comments":"https://arstechnica.com/?p=1123201","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Check Point says Fireball malware hit 250 million; Microsoft says no","description":"Either way, Microsoft assures us that Windows 10 S would have been immune.","link":"https://arstechnica.com/?p=1122335","comments":"https://arstechnica.com/?p=1122335","updated_at":"2017-06-23T12:00:44+00:00","link_to_comments":"https://arstechnica.com/?p=1122335","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft’s decision to patch Windows XP is a mistake","description":"There will always be one more emergency.","link":"http://arstechnica.com/?p=455551","comments":"http://arstechnica.com/?p=455551","updated_at":"2017-06-14T02:20:12+00:00","link_to_comments":"http://arstechnica.com/?p=455551","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Sneaky hackers use Intel management tools to bypass Windows firewall","description":"Serial ports don’t have firewalls.","link":"https://arstechnica.com/?p=1113911","comments":"https://arstechnica.com/?p=1113911","updated_at":"2017-06-09T00:11:09+00:00","link_to_comments":"https://arstechnica.com/?p=1113911","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Radio-controlled pacemakers aren’t as hard to hack as you (may) think","description":"The four major makers aren't properly securing critical cardiac devices, report says.","link":"https://arstechnica.com/?p=1105539","comments":"https://arstechnica.com/?p=1105539","updated_at":"2017-05-26T17:55:12+00:00","link_to_comments":"https://arstechnica.com/?p=1105539","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Cockpit access codes for United Airlines spill online","description":""The safety of our customers and crew is our top priority," United says.","link":"https://arstechnica.com/?p=1097749","comments":"https://arstechnica.com/?p=1097749","updated_at":"2017-05-15T18:00:55+00:00","link_to_comments":"https://arstechnica.com/?p=1097749","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Punching holes in nomx, the world’s “most secure” communications protocol","description":"Extraordinary claims require extraordinary proof, and nomx implodes under scrutiny.","link":"https://arstechnica.com/?p=1085021","comments":"https://arstechnica.com/?p=1085021","updated_at":"2017-04-27T17:05:01+00:00","link_to_comments":"https://arstechnica.com/?p=1085021","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft turns two-factor authentication into one-factor by ditching password","description":"As long as you can log in to your phone, you can log in to your Microsoft Account.","link":"https://arstechnica.com/?p=1079287","comments":"https://arstechnica.com/?p=1079287","updated_at":"2017-04-19T16:03:00+00:00","link_to_comments":"https://arstechnica.com/?p=1079287","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Meet PINLogger, the drive-by exploit that steals smartphone PINs","description":"Sensors in phones running both iOS and Android reveal all kinds of sensitive info.","link":"https://arstechnica.com/?p=1078179","comments":"https://arstechnica.com/?p=1078179","updated_at":"2017-04-18T17:20:51+00:00","link_to_comments":"https://arstechnica.com/?p=1078179","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows admins, has Microsoft completely screwed up its security reports?","description":"The old bulletins are gone, and now there's a searchable database.","link":"https://arstechnica.com/?p=1077341","comments":"https://arstechnica.com/?p=1077341","updated_at":"2017-04-17T18:15:03+00:00","link_to_comments":"https://arstechnica.com/?p=1077341","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Lawyers, malware, and money: The antivirus market’s nasty fight over Cylance","description":"On the front lines of the antivirus industry's "testing wars."","link":"https://arstechnica.com/?p=1063733","comments":"https://arstechnica.com/?p=1063733","updated_at":"2017-04-17T11:00:12+00:00","link_to_comments":"https://arstechnica.com/?p=1063733","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New processors are now blocked from receiving updates on old Windows","description":"The promised update block is now in effect.","link":"https://arstechnica.com/?p=1076177","comments":"https://arstechnica.com/?p=1076177","updated_at":"2017-04-13T17:41:15+00:00","link_to_comments":"https://arstechnica.com/?p=1076177","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft Word 0-day used to push dangerous Dridex malware on millions","description":"Blast could give a boost to Dridex, one of the Internet's worst bank fraud threats.","link":"https://arstechnica.com/?p=1074917","comments":"https://arstechnica.com/?p=1074917","updated_at":"2017-04-11T06:01:08+00:00","link_to_comments":"https://arstechnica.com/?p=1074917","link_host":"arstechnica.com","from":"arssecurity"}]