Code & Design News Aggregator of Code, Security and Design news sites. Sun, 20 Aug 2017 12:00:02 +0100 Smart Devices Can Be Hijacked to Track Your Body Movements And Activities Remotely If your smartphones, tablets, smart refrigerators, smart TVs and other smart devices are smart enough to make your life easier, their smart behavior could also be leveraged by hackers to steal data, invade your privacy or spy on you, if not secured properly. One such experiment has recently been performed by a team of student hackers, demonstrating a new attack method to turn smart devices<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Sun, 20 Aug 2017 11:17:24 +0100 2017-08-20T11:17:24+01:00 Laverna: An open source Evernote alternative Sun, 20 Aug 2017 09:46:32 +0100 2017-08-20T09:46:32+01:00 JK Rowling shuts down Erik Spiekermann on Twitter Sat, 19 Aug 2017 18:32:31 +0100 2017-08-19T18:32:31+01:00 Is it better for designers to be generalists or specialists? Sat, 19 Aug 2017 01:13:49 +0100 2017-08-19T01:13:49+01:00 Firefox Focus private browser for iOS and Android Fri, 18 Aug 2017 21:46:51 +0100 2017-08-18T21:46:51+01:00 Sketch bug keeps causing my keyboard shortcuts to stop working! Is anyone else getting this problem in the latest version of sketch? Basically, some of my keys just stop working after a while with certain docs, and I have to close them and re-open for them to come back. At first, it was just holding alt to see the distance between objects wasn't working but now my arrow keys have ceased working for moving stuff, and backspace/delete. As I said I have to close and re-open the doc for it to fix it, but even then it only works for a short time. Is anyone else seeing this problem? Any idea of the cause/fix? thanks Fri, 18 Aug 2017 14:36:18 +0100 2017-08-18T14:36:18+01:00 Secret chips in replacement parts can completely hijack your phone’s security Booby-trapped touchscreens can log passwords, install malicious apps, and more. Fri, 18 Aug 2017 13:27:29 +0100 2017-08-18T13:27:29+01:00 iAniMagic 2017 Animation Competition Fri, 18 Aug 2017 10:55:22 +0100 2017-08-18T10:55:22+01:00 Affinity Photo for iPad users - free update v1.6.4 now available Fri, 18 Aug 2017 10:43:36 +0100 2017-08-18T10:43:36+01:00 Product Graveyard Fri, 18 Aug 2017 09:41:20 +0100 2017-08-18T09:41:20+01:00 Android Trojan Now Targets Non-Banking Apps that Require Card Payments The infamous mobile banking trojan that recently added ransomware features to steal sensitive data and lock user files at the same time has now been modified to steal credentials from Uber and other booking apps as well. Security researchers at Kaspersky Lab have discovered a new variant of the Android banking Trojan called Faketoken that now has capabilities to detect and record an infected<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Fri, 18 Aug 2017 08:56:58 +0100 2017-08-18T08:56:58+01:00 Integrating Animation into a Design System Fri, 18 Aug 2017 08:00:05 +0100 2017-08-18T08:00:05+01:00 Formcarry | Now With Freemium and Low Volume Plans Fri, 18 Aug 2017 07:20:58 +0100 2017-08-18T07:20:58+01:00 Adult Literacy and E-Learning Adult Literacy and technology Illiteracy lies at the root of everything that hinders the progress of a country. Light of knowledge unites people to agitate for their demands and human rights, but illiteracy keeps them in darkness. It is merely not necessary to carry the torch of education to all corners of the world, but also to people of all ages, as age is just a number. Indian constitution lays down universal compulsory education as a directive principle of the state. The children, today, no doubt have some chances of getting educated, but the goon up adults never had the opportunity of feeling the light of knowledge and blindfolded, they move around their orbit of life. The problem of adult education is a serious one. Because of their financial instability, the adults of the weaker sections of the society are busy earning their living, hence ignoring education completely. Night classes are not running successfully as the hardly get two square meals a day. Adult education without offering job and food is almost a mockery. The literacy ration of any country is extremely important. A country with educated adult population is bound to achieve social, economic, technological and moral progress. And above all that, an educated person is able to overcome his individual poverty. Educated masses are capable of bringing mass changes in the society and gives them power to fight social evils as well. To promote further education, an educated adult can take up the job of teaching as their profession. Promoting adult education should be done effectively in order to secure a better future for the nation as well as the youth. Adult education can take place in many ways. An illiterate person can learn to read and write. Technology, these days has been proven beneficial for education in several ways. If technology is incorporated at primary and secondary levels of education, it can be used as a medium for adult education as well. With the growing use of technology, several websites and applications have launched to support the noble cause. Glossaread is a new step towards making education easy and affordable for all. The website offers quality content for every age group and every genre. Websites like Glossaread promote holistic learning at any time as internet is accessible round the clock, which makes it easier for people to join part time courses. In this way, they can learn and earn at the same time. Access to internet is also not limited at this point of time. Glossaread comes to help in the form of mobile applications as well, which makes learning on the go easier. At Glossaread, “chapters” of the books are available at a very nominal cost. The cost of these chapters is affordable for every section of the society and the chapters are easily accessible as well. The concept of breaking down books into “chapters” is a revolutionary one as instead of purchasing the whole book, which can sometimes be hard to find or heavy on pockets, students can just buy the chapters as per their need without affecting their time and pockets. With these new technological aids, education for all can be a dream that can soon turn into realist. Visit: Fri, 18 Aug 2017 06:31:56 +0100 2017-08-18T06:31:56+01:00 Dribbble is about to take our jobs!! ![SP]( Sup guys Im back to talk about the job postings. As you may remember, Im that dude that created the hottest debate of 2017 about how my leads were being taken from the ease of being able to change your location. Since then Dribbble has released Scout. To be honest this solution is cray.. Ive recently been asked to invite some designers onto a project I am working on right now for Toyota. High paying gig and would be great for some of the amazing Dribbblers in the community that Im homies with. So when I went to go do a general search for people in the area, I was bombarded with a ton of results due to Dribbbles new ability to state where else you would be open to work. The problem is Users are now able to add other locations rather than where they live. Heres an example: ![dribble]( You literally have no limit of where you are willing to work. The biggest problem for me is that takes away the community aspect, and meet ups for designer in their cities. I have lived in OC / SEA / and now LA. I have found it super awesome to meet new friends by just searching LA and finding other designers with similar interest and meeting up for drinks. Now I have to go through tons of other designer to find the ones actually based in LA. I know for a damn fact non of these dudes living even 2 hours from LA would be willing to drive to the office. Let alone the people living in Vermont saying they are open to work in LA. It has become a searching nightmare for me to hook up some dribblers in the LA for an amazing gig. I think that this push is awesome though and will bring a lot more jobs opportunities to designers on the platform, but its too many people that they have to filter through to just find someone in their location. Meaning those recruiters are going to give up trying to deal with the amount of people not willing to relocate. Fri, 18 Aug 2017 01:15:59 +0100 2017-08-18T01:15:59+01:00 Slack redesigned their website Thu, 17 Aug 2017 23:57:45 +0100 2017-08-17T23:57:45+01:00 It’s About More than Pixels: Redefining "Designer" Thu, 17 Aug 2017 22:48:33 +0100 2017-08-17T22:48:33+01:00 Mobile UI Kit Feedback Dear community! It's a question of lifetime. At the moment I'm working on a hugest ecommerce mobile UI kit. Crafted in Figma it's developers' friendly. So they are free to export and grab CSS, iOS, Android code. Fits for all! I'll support it with animations and statements specs like no one before. With code and live GIF's. One handed usage and usability tested. So no more hamburgers at the top! Will you pay for this product? A - No B - $1-20 C - $20-50 D - $50-100 Thanks! Hugs! PREVIEW Thu, 17 Aug 2017 22:22:23 +0100 2017-08-17T22:22:23+01:00 Redesigning Banco Galicia's mobile experience Thu, 17 Aug 2017 21:12:59 +0100 2017-08-17T21:12:59+01:00 Website Launch Checklist Thu, 17 Aug 2017 20:31:27 +0100 2017-08-17T20:31:27+01:00 Dead Domains — Share domains you are not using Thu, 17 Aug 2017 19:40:20 +0100 2017-08-17T19:40:20+01:00 Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader Are you using Foxit PDF Reader? If yes, then you need to watch your back. Security researchers have discovered two critical zero-day security vulnerabilities in Foxit Reader software that could allow attackers to execute arbitrary code on a targeted computer, if not configured to open files in the Safe Reading Mode. The first vulnerability (CVE-2017-10951) is a command injection bug<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 17 Aug 2017 18:59:40 +0100 2017-08-17T18:59:40+01:00 Facebook Design's Desktop Kit Thu, 17 Aug 2017 18:17:19 +0100 2017-08-17T18:17:19+01:00 New article out: The Falafel Method for UI Design Thu, 17 Aug 2017 17:52:02 +0100 2017-08-17T17:52:02+01:00 Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features Today, many automobiles companies are offering vehicles that run on the mostly drive-by-wire system, which means a majority of car's functions—from instrument cluster to steering, brakes, and accelerator—are electronically controlled. No doubt these auto-control systems make your driving experience much better, but at the same time, they also increase the risk of getting hacked. Car Hacking<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 17 Aug 2017 17:01:39 +0100 2017-08-17T17:01:39+01:00 Prince gets his own Pantone color Thu, 17 Aug 2017 15:18:43 +0100 2017-08-17T15:18:43+01:00 Product redesigns: how to not mess 'em up Thu, 17 Aug 2017 14:44:28 +0100 2017-08-17T14:44:28+01:00 Oopss! HBO Itself Accidentally Leaked 'Game of Thrones' Season 7 Episode 6 HBO doesn't need hackers to leak its widely watched "Game of Thrones" episodes, as it is sufficient enough to leak them by its own. In what seems to be a terrible blunder, HBO Spain appeared to have accidentally broadcast the next episode—Episode 6—of Game of Thrones season 7 five days before its official premiere. And as expected, the GoT episode 6 quickly began circulating online. <!--<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 17 Aug 2017 11:14:12 +0100 2017-08-17T11:14:12+01:00 Game of Thrones and HBO — Twitter, Facebook Accounts Hacked The Game of Thrones hacking saga continues, but this time it's the HBO's and GOT's official Twitter and Facebook accounts got compromised, rather than upcoming episodes. As if the leak of episodes by hackers and the accidental airing of an upcoming episode of Game of Thrones by HBO itself were not enough, a notorious group of hackers took over the official Twitter and Facebook accounts for<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 17 Aug 2017 11:12:19 +0100 2017-08-17T11:12:19+01:00 1 year without 1 year without any post on! I really love the little things it was bringing, do you know something like that? (and alive) Thu, 17 Aug 2017 10:05:20 +0100 2017-08-17T10:05:20+01:00 Bonsai Expenses for Creatives Thu, 17 Aug 2017 09:48:44 +0100 2017-08-17T09:48:44+01:00 Corrupt Federal Agent, Who Stole Bitcoins From Silk Road, Pleads Guilty To Money Laundering A former the United States Secret Service agent who stole hundreds of thousands of dollars worth of Bitcoins during an investigation into then-largest underground marketplace Silk Road has now pleaded guilty to money laundering. Shaun W. Bridges is one of two former US undercover agents who pleaded guilty in 2015 to one count of money laundering and one count of obstruction and was sentenced<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Wed, 16 Aug 2017 13:45:21 +0100 2017-08-16T13:45:21+01:00 8 More Chrome Extensions Hijacked to Target 4.8 Million Users Google's Chrome web browser Extensions are under attack with a series of developers being hacked within last one month. Almost two weeks ago, we reported how unknown attackers managed to compromise the Chrome Web Store account of a developer team and hijacked Copyfish extension, and then modified it to distribute spam correspondence to users. Just two days after that incident, some unknown<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Wed, 16 Aug 2017 13:22:04 +0100 2017-08-16T13:22:04+01:00 Backdoor Found in Popular Server Management Software used by Hundreds of Companies Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They are now adopting more clandestine techniques that come with limitless attack vectors and are harder to detect. Recently, cyber crooks managed to infiltrate the update mechanism for a popular server management software package and altered it to include an advanced backdoor, which lasts for at least 17<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Wed, 16 Aug 2017 08:14:34 +0100 2017-08-16T08:14:34+01:00 Faulty Firmware Auto-Update Breaks Hundreds of 'Smart Locks' More features, more problems! Today, we are living in a digital age that is creating a digital headache for people by connecting every other unnecessary home appliance to the Internet. Last week, nearly hundreds of Internet-connected locks became inoperable after a faulty software update hit some models. Users of remotely accessible smart locks made by Colorado-based company LockState have<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Tue, 15 Aug 2017 18:10:19 +0100 2017-08-15T18:10:19+01:00 Warning: Two Dangerous Ransomware Are Back – Protect Your Computers Ransomware has been around for a few years but has become an albatross around everyone's neck—from big businesses and financial institutions to hospitals and individuals worldwide—with cyber criminals making millions of dollars. In just past few months, we saw a scary strain of ransomware attacks including WannaCry, Petya and LeakerLocker, which made chaos worldwide by shutting down hospitals<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Tue, 15 Aug 2017 12:14:23 +0100 2017-08-15T12:14:23+01:00 Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests An infamous Russian-linked cyber-espionage group has been found re-using the same leaked NSA hacking tool that was deployed in the WannaCry and NotPetya outbreaks—this time to target Wi-Fi networks to spy on hotel guests in several European countries. Security researchers at FireEye have uncovered an ongoing campaign that remotely steals credentials from high-value guests using Wi-Fi networks<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Tue, 15 Aug 2017 11:31:27 +0100 2017-08-15T11:31:27+01:00 Building America’s Trust Act would amp up privacy concerns at the border Civil libertarians tell Ars they’re worried about “mass surveillance expansion.” Tue, 15 Aug 2017 09:00:38 +0100 2017-08-15T09:00:38+01:00 How Just Opening A Malicious PowerPoint File Could Compromise Your PC A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office. The Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object Linking and Embedding (OLE) interface for which a patch was issued in April this year, but threat actors are still abusing the flaw through the<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Mon, 14 Aug 2017 19:45:15 +0100 2017-08-14T19:45:15+01:00 Gmail for iOS Adds Anti-Phishing Feature that Warns of Suspicious Links Phishing — is an older style of cyber-attack but remains one of the most common and efficient attack vectors for attackers, as a majority of banking malware and various ransomware attacks begin with a user clicking on a malicious link or opening a dangerous attachment in an email. Phishing has evolved than ever before in the past few years – which is why it remains one of those threats that<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Mon, 14 Aug 2017 17:00:21 +0100 2017-08-14T17:00:21+01:00 Sponsor: Claim a Free .design Domain Name as a Member of Designer News A .design domain name and email hosting are yours for a year!* (SSL certs and WHOIS privacy are always free.) Additional domains are just $5 (code: DESIGNERNEWS). *Does not apply to premium names (e.g.,,, Domains renew annually at $35. --- **How do I claim my domain?** Easy, just visit the [DN Deals]( **What if I don't have a DN account?** [Signup for a free account]( first, then join the community and access your codes/discounts. **Questions? Having trouble with checkout?** Fret not! [Contact support](, they're happy to help! Mon, 14 Aug 2017 14:48:13 +0100 2017-08-14T14:48:13+01:00 Facebook Covertly Launches A Photo-Sharing App In China The Chinese market is no doubt a pot of gold for big technology giants with over 700 million internet users, but the Chinese government heavily controls the Internet within its borders through its Golden Shield project – the Great Firewall of China. The Great Firewall has blocked some 171 out of the world's leading websites, including Google, Facebook, Instagram, Twitter, Tumblr, Dropbox, and<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Mon, 14 Aug 2017 14:42:49 +0100 2017-08-14T14:42:49+01:00 IPS as a Service Blocks WannaCry Spread Across the WAN One of the most devastating aspects of the recent WannaCry ransomware attack was its self-propagating capability exploiting a vulnerability in the file access protocol, SMB v1. Most enterprises defences are externally-facing, focused on stopping incoming email and web attacks. But, once attackers gain a foothold inside the network through malware, there are very few security controls that<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Mon, 14 Aug 2017 14:10:01 +0100 2017-08-14T14:10:01+01:00 Microsoft Launches Ethereum-Based 'Coco Framework' to Speed Up Blockchain Network A growing number of enterprises are showing their interest in blockchains, but the underlying software fails to meet key enterprise requirements like performance, confidentiality, governance, and required processing power. However, Microsoft wants to help solve these issues and make it easier for the enterprises to build their networks using any distributed ledger. Microsoft has unveiled a<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Mon, 14 Aug 2017 09:31:31 +0100 2017-08-14T09:31:31+01:00 HBO Offered Hackers $250,000 As Ransom to Prevent More Leaks Hackers who recently hacked into HBO network and stole scripts, shows, and employee information documents, have now provided an email in which the United States cable channel offered them $250,000. The company offered the payment as a "bounty payment" reward in which companies reward white-hat hackers for discovering cyber security vulnerabilities in their computer networks. Late last month,<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Sat, 12 Aug 2017 14:26:45 +0100 2017-08-12T14:26:45+01:00 More than 1,000 Spyware Apps Found On Android App Stores If you think you are downloading apps from Google Play Store and you are secure, then watch out! Someone has managed to flood third-party app stores and Google Play Store with more than a thousand malicious apps, which can monitor almost anything a user does on their mobile device from silently recording calls to make outbound calls without the user’s interaction. Dubbed SonicSpy, the<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Fri, 11 Aug 2017 17:16:08 +0100 2017-08-11T17:16:08+01:00 Ukrainian Man Arrested For Distributing NotPetya Ransomware And Helping Tax Evaders Ukrainian authorities have arrested a 51-year-old man accused of distributing the infamous Petya ransomware (Petya.A, also known as NotPetya) — the same computer virus that massively hit numerous businesses, organisations and banks in Ukraine as well as different parts of Europe around 45 days ago. However, the story is not as simple as it seems, which portrayed this man as a criminal. I<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 10 Aug 2017 22:15:13 +0100 2017-08-10T22:15:13+01:00 Online CISSP Certification Training Course — Learn from Experts If you dream of making it big in the IT security community, the CISSP certification is a necessary milestone. Certified Information Systems Security Professional (CISSP) is a globally recognised certification in the field of information security, which has become a gold standard of achievement that is acknowledged worldwide. CISSP certification deals with a range of information security<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 10 Aug 2017 13:51:30 +0100 2017-08-10T13:51:30+01:00 CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time After disclosing CIA's strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA's ability to spy on video streams remotely in real-time. Dubbed 'CouchPotato,' document leaked from the CIA details how the CIA agents use a remote tool to stealthy collect RTSP/H.264 video streams. <!-- adsense --><div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 10 Aug 2017 12:31:54 +0100 2017-08-10T12:31:54+01:00 Chinese Quantum Satellite Sends First ‘Unhackable’ Data to Earth In what appears to be the world's first quantum satellite transmission, China has successfully sent an "unbreakable" code over a long distance from an orbiting satellite to the Earth, achieving a milestone in the next generation encryption based on "quantum cryptography." In August last year, China launched the world's first quantum communication satellite into the Earth’s orbit aboard a Long<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 10 Aug 2017 11:28:41 +0100 2017-08-10T11:28:41+01:00 Malware Encoded Into DNA Hacks the Computer that Reads It Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years? Even in March this year, a team of researchers successfully stored digital data — an entire operating system, a movie, an Amazon gift card, a study and a computer virus — in the strands of DNA. But what if someone stores a malicious program into the DNA, just like an infected USB storage, to hijack the<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Thu, 10 Aug 2017 09:10:50 +0100 2017-08-10T09:10:50+01:00 How Top Companies Accidentally Leaking Terabytes of Sensitive Data Online An anti-malware detection service provider and premium security firm has been accused of leaking terabytes of confidential data from several Fortune 1000 companies, including customer credentials, financial records, network intelligence and other sensitive data. However, in response to the accusations, the security firm confirmed that they are not pulling sensitive files from its customers;<div class="feedflare"> <a href=""><img src="" border="0"></img></a> </div><img src="" height="1" width="1" alt=""/> Wed, 09 Aug 2017 18:25:58 +0100 2017-08-09T18:25:58+01:00 After phishing attacks, Chrome extensions push adware to millions Compromised accounts push fraudulent extension updates to unsuspecting users. Thu, 03 Aug 2017 16:45:25 +0100 2017-08-03T16:45:25+01:00 Microsoft expands bug bounty program to cover any Windows flaw Now every part of Windows is covered by a bug bounty scheme. Wed, 26 Jul 2017 21:28:19 +0100 2017-07-26T21:28:19+01:00 Windows 10 will try to combat ransomware by locking up your data But how to protect files from users who have access to those files remains tricky. Thu, 29 Jun 2017 20:25:19 +0100 2017-06-29T20:25:19+01:00 Ryzen Pro: AMD takes on Intel on the corporate desktop, with one key omission AMD wants to go after Intel vPro while avoiding Intel's excessive product segmentation. Thu, 29 Jun 2017 14:00:32 +0100 2017-06-29T14:00:32+01:00 Microsoft bringing EMET back as a built-in part of Windows 10 The built-in exploit mitigations are getting stronger and easier to configure. Tue, 27 Jun 2017 20:47:31 +0100 2017-06-27T20:47:31+01:00 Windows 10 S security brought down by, of course, Word macros Analysis: Windows 10 S promises many good things. It currently doesn't deliver. Fri, 23 Jun 2017 21:11:21 +0100 2017-06-23T21:11:21+01:00 Check Point says Fireball malware hit 250 million; Microsoft says no Either way, Microsoft assures us that Windows 10 S would have been immune. Fri, 23 Jun 2017 13:00:44 +0100 2017-06-23T13:00:44+01:00 Microsoft’s decision to patch Windows XP is a mistake There will always be one more emergency. Wed, 14 Jun 2017 03:20:12 +0100 2017-06-14T03:20:12+01:00 Sneaky hackers use Intel management tools to bypass Windows firewall Serial ports don’t have firewalls. Fri, 09 Jun 2017 01:11:09 +0100 2017-06-09T01:11:09+01:00 Radio-controlled pacemakers aren’t as hard to hack as you (may) think The four major makers aren't properly securing critical cardiac devices, report says. Fri, 26 May 2017 18:55:12 +0100 2017-05-26T18:55:12+01:00 Cockpit access codes for United Airlines spill online "The safety of our customers and crew is our top priority," United says. Mon, 15 May 2017 19:00:55 +0100 2017-05-15T19:00:55+01:00 Punching holes in nomx, the world’s “most secure” communications protocol Extraordinary claims require extraordinary proof, and nomx implodes under scrutiny. Thu, 27 Apr 2017 18:05:01 +0100 2017-04-27T18:05:01+01:00 Microsoft turns two-factor authentication into one-factor by ditching password As long as you can log in to your phone, you can log in to your Microsoft Account. Wed, 19 Apr 2017 17:03:00 +0100 2017-04-19T17:03:00+01:00 Meet PINLogger, the drive-by exploit that steals smartphone PINs Sensors in phones running both iOS and Android reveal all kinds of sensitive info. Tue, 18 Apr 2017 18:20:51 +0100 2017-04-18T18:20:51+01:00 Windows admins, has Microsoft completely screwed up its security reports? The old bulletins are gone, and now there's a searchable database. Mon, 17 Apr 2017 19:15:03 +0100 2017-04-17T19:15:03+01:00 Lawyers, malware, and money: The antivirus market’s nasty fight over Cylance On the front lines of the antivirus industry's "testing wars." Mon, 17 Apr 2017 12:00:12 +0100 2017-04-17T12:00:12+01:00 New processors are now blocked from receiving updates on old Windows The promised update block is now in effect. Thu, 13 Apr 2017 18:41:15 +0100 2017-04-13T18:41:15+01:00 Microsoft Word 0-day used to push dangerous Dridex malware on millions Blast could give a boost to Dridex, one of the Internet's worst bank fraud threats. Tue, 11 Apr 2017 07:01:08 +0100 2017-04-11T07:01:08+01:00