[{"title":"Case Study – Media Party","description":"https://aerolab.co/mediaparty","link":"https://www.designernews.co/stories/88521-case-study--media-party","comments":"https://www.designernews.co/stories/88521-case-study--media-party","updated_at":"2017-10-19T15:34:14+00:00","link_to_comments":"https://www.designernews.co/stories/88521-case-study--media-party","link_host":"aerolab.co","from":"designernews"},{"title":"Welcoming Our New Robotic Overlords","description":"<a href="https://news.ycombinator.com/item?id=15508746">Comments</a>","link":"https://www.newyorker.com/magazine/2017/10/23/welcoming-our-new-robot-overlords","comments":"https://news.ycombinator.com/item?id=15508746","updated_at":"2017-10-19T15:31:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508746","link_host":"www.newyorker.com","from":"hackernews"},{"title":"This training exercise boosts brain power, Johns Hopkins researchers say","description":"<a href="https://news.ycombinator.com/item?id=15508714">Comments</a>","link":"https://hub.jhu.edu/2017/10/17/brain-training-exercise/","comments":"https://news.ycombinator.com/item?id=15508714","updated_at":"2017-10-19T15:27:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508714","link_host":"hub.jhu.edu","from":"hackernews"},{"title":"Study: Tinder is making us behave like cave people","description":"<a href="https://news.ycombinator.com/item?id=15508693">Comments</a>","link":"http://www.independent.co.uk/life-style/love-sex/tinder-mating-habits-reinforce-dating-app-sex-study-men-women-communicate-find-others-reproduce-a8008446.html","comments":"https://news.ycombinator.com/item?id=15508693","updated_at":"2017-10-19T15:25:26+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508693","link_host":"www.independent.co.uk","from":"hackernews"},{"title":"Google invests $1B into Lyft","description":"<a href="https://news.ycombinator.com/item?id=15508614">Comments</a>","link":"https://www.axios.com/google-invests-1-billion-into-lyft-2498537658.html","comments":"https://news.ycombinator.com/item?id=15508614","updated_at":"2017-10-19T15:16:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508614","link_host":"www.axios.com","from":"hackernews"},{"title":"Alphabet’s CapitalG Leads $1B Round in Lyft","description":"<a href="https://news.ycombinator.com/item?id=15508603">Comments</a>","link":"https://blog.lyft.com/posts/alphabet-capitalg-leads-1-billion-round-in-lyft","comments":"https://news.ycombinator.com/item?id=15508603","updated_at":"2017-10-19T15:15:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508603","link_host":"blog.lyft.com","from":"hackernews"},{"title":"Oracle VM VirtualBox 5.2 Is Now Available","description":"<a href="https://news.ycombinator.com/item?id=15508595">Comments</a>","link":"https://blogs.oracle.com/virtualization/vbox52","comments":"https://news.ycombinator.com/item?id=15508595","updated_at":"2017-10-19T15:14:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508595","link_host":"blogs.oracle.com","from":"hackernews"},{"title":"Canada's 'secret spy agency' is releasing a malware-fighting tool to the public","description":"<a href="https://news.ycombinator.com/item?id=15508298">Comments</a>","link":"http://www.cbc.ca/news/technology/cse-canada-cyber-spy-malware-assemblyline-open-source-1.4361728","comments":"https://news.ycombinator.com/item?id=15508298","updated_at":"2017-10-19T14:40:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508298","link_host":"www.cbc.ca","from":"hackernews"},{"title":"The future of Wayland, and sway's role in it","description":"<a href="https://news.ycombinator.com/item?id=15508071">Comments</a>","link":"https://drewdevault.com/2017/10/09/Future-of-sway.html","comments":"https://news.ycombinator.com/item?id=15508071","updated_at":"2017-10-19T14:18:10+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508071","link_host":"drewdevault.com","from":"hackernews"},{"title":"Henry Feinberg Demonstrates Using Light to Transmit Sound Waves (1978) [video]","description":"<a href="https://news.ycombinator.com/item?id=15508009">Comments</a>","link":"https://www.youtube.com/watch?v=gf2J3HTYUHE","comments":"https://news.ycombinator.com/item?id=15508009","updated_at":"2017-10-19T14:11:05+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508009","link_host":"www.youtube.com","from":"hackernews"},{"title":"My Journey to a Better Language Learning System","description":"<a href="https://news.ycombinator.com/item?id=15508003">Comments</a>","link":"https://chatterbug.com/blog/en/2017-10-18-a-better-language-learning-system","comments":"https://news.ycombinator.com/item?id=15508003","updated_at":"2017-10-19T14:10:20+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15508003","link_host":"chatterbug.com","from":"hackernews"},{"title":"DevDocs.io","description":"<a href="https://news.ycombinator.com/item?id=15507871">Comments</a>","link":"https://devdocs.io/","comments":"https://news.ycombinator.com/item?id=15507871","updated_at":"2017-10-19T13:53:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15507871","link_host":"devdocs.io","from":"hackernews"},{"title":"Analyzing HN moderation and censorship","description":"<a href="https://news.ycombinator.com/item?id=15507821">Comments</a>","link":"https://drewdevault.com/2017/09/13/Analyzing-HN.html","comments":"https://news.ycombinator.com/item?id=15507821","updated_at":"2017-10-19T13:48:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15507821","link_host":"drewdevault.com","from":"hackernews"},{"title":"Show HN: Gutenberg – A static site engine with no dependencies","description":"<a href="https://news.ycombinator.com/item?id=15507538">Comments</a>","link":"https://www.getgutenberg.io","comments":"https://news.ycombinator.com/item?id=15507538","updated_at":"2017-10-19T13:11:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15507538","link_host":"www.getgutenberg.io","from":"hackernews"},{"title":"Tab (YC W15) is hiring full-stack developers in London","description":"<a href="https://news.ycombinator.com/item?id=15507299">Comments</a>","link":"https://jobs.tab.travel/","comments":"https://news.ycombinator.com/item?id=15507299","updated_at":"2017-10-19T12:32:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15507299","link_host":"jobs.tab.travel","from":"hackernews"},{"title":"Show HN: Screen.rip – API for capturing web screenshots","description":"<a href="https://news.ycombinator.com/item?id=15507181">Comments</a>","link":"http://screen.rip","comments":"https://news.ycombinator.com/item?id=15507181","updated_at":"2017-10-19T12:09:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15507181","link_host":"screen.rip","from":"hackernews"},{"title":"MNT Reform: DIY portable computer","description":"<a href="https://news.ycombinator.com/item?id=15507122">Comments</a>","link":"http://mntmn.com/reform","comments":"https://news.ycombinator.com/item?id=15507122","updated_at":"2017-10-19T11:58:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15507122","link_host":"mntmn.com","from":"hackernews"},{"title":"Using cgroups to limit I/O","description":"<a href="https://news.ycombinator.com/item?id=15506907">Comments</a>","link":"https://andrestc.com/post/cgroups-io/","comments":"https://news.ycombinator.com/item?id=15506907","updated_at":"2017-10-19T11:08:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15506907","link_host":"andrestc.com","from":"hackernews"},{"title":"Chart design in sketch app","description":"https://medium.com/@BuninDmitry/chart-design-automatization-aee49630634c","link":"https://www.designernews.co/stories/88509-chart-design-in-sketch-app","comments":"https://www.designernews.co/stories/88509-chart-design-in-sketch-app","updated_at":"2017-10-19T11:06:15+00:00","link_to_comments":"https://www.designernews.co/stories/88509-chart-design-in-sketch-app","link_host":"medium.com","from":"designernews"},{"title":"How the Frightful Five Put Startups in a Lose-Lose Situation","description":"<a href="https://news.ycombinator.com/item?id=15506703">Comments</a>","link":"https://www.nytimes.com/2017/10/18/technology/frightful-five-start-ups.html","comments":"https://news.ycombinator.com/item?id=15506703","updated_at":"2017-10-19T10:11:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15506703","link_host":"www.nytimes.com","from":"hackernews"},{"title":"Testing disks: Lessons from our odyssey selecting replacement SSDs","description":"<a href="https://news.ycombinator.com/item?id=15506701">Comments</a>","link":"http://www.bbc.co.uk/blogs/internet/entries/ce3eff16-228f-49a0-8d4e-d1a013e4895f","comments":"https://news.ycombinator.com/item?id=15506701","updated_at":"2017-10-19T10:11:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15506701","link_host":"www.bbc.co.uk","from":"hackernews"},{"title":"Side Projects — 36 Days of Type","description":"https://blog.productdisrupt.com/side-projects-36-days-of-type-30cd6df214d1","link":"https://www.designernews.co/stories/88505-side-projects36-days-of-type","comments":"https://www.designernews.co/stories/88505-side-projects36-days-of-type","updated_at":"2017-10-19T10:08:29+00:00","link_to_comments":"https://www.designernews.co/stories/88505-side-projects36-days-of-type","link_host":"blog.productdisrupt.com","from":"designernews"},{"title":"Coindex for iOS","description":"https://coindexapp.com","link":"https://www.designernews.co/stories/88504-coindex-for-ios","comments":"https://www.designernews.co/stories/88504-coindex-for-ios","updated_at":"2017-10-19T09:01:01+00:00","link_to_comments":"https://www.designernews.co/stories/88504-coindex-for-ios","link_host":"coindexapp.com","from":"designernews"},{"title":"Questions about the Massive South African “Master Deeds” Data Breach Answered","description":"<a href="https://news.ycombinator.com/item?id=15506388">Comments</a>","link":"https://www.troyhunt.com/questions-about-the-massive-south-african-master-deeds-data-breach-answered/","comments":"https://news.ycombinator.com/item?id=15506388","updated_at":"2017-10-19T08:43:05+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15506388","link_host":"www.troyhunt.com","from":"hackernews"},{"title":"Ubuntu 17.10 Artful Aardvark released","description":"<a href="https://news.ycombinator.com/item?id=15506334">Comments</a>","link":"http://releases.ubuntu.com/17.10/","comments":"https://news.ycombinator.com/item?id=15506334","updated_at":"2017-10-19T08:31:07+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15506334","link_host":"releases.ubuntu.com","from":"hackernews"},{"title":"Design Beyond a Screen: A Primer for VR, AR and the Multiverse","description":"https://blog.marvelapp.com/design-beyond-screen-primer-vr-ar-multiverse/","link":"https://www.designernews.co/stories/88502-design-beyond-a-screen-a-primer-for-vr-ar-and-the-multiverse","comments":"https://www.designernews.co/stories/88502-design-beyond-a-screen-a-primer-for-vr-ar-and-the-multiverse","updated_at":"2017-10-19T07:58:53+00:00","link_to_comments":"https://www.designernews.co/stories/88502-design-beyond-a-screen-a-primer-for-vr-ar-and-the-multiverse","link_host":"blog.marvelapp.com","from":"designernews"},{"title":"F.D.A. Approves Second Gene-Altering Treatment for Cancer","description":"<a href="https://news.ycombinator.com/item?id=15506150">Comments</a>","link":"https://www.nytimes.com/2017/10/18/health/immunotherapy-cancer-kite.html","comments":"https://news.ycombinator.com/item?id=15506150","updated_at":"2017-10-19T07:49:58+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15506150","link_host":"www.nytimes.com","from":"hackernews"},{"title":"Rabobank, U.N. launch $1B fund to boost sustainable farming","description":"<a href="https://news.ycombinator.com/item?id=15505946">Comments</a>","link":"https://www.reuters.com/article/us-rabobank-sustainability/rabobank-u-n-launch-1-billion-fund-to-boost-sustainable-farming-idUSKBN1CL2Y2","comments":"https://news.ycombinator.com/item?id=15505946","updated_at":"2017-10-19T06:50:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15505946","link_host":"www.reuters.com","from":"hackernews"},{"title":"Linux on Samsung Galaxy smartphones","description":"<a href="https://news.ycombinator.com/item?id=15505856">Comments</a>","link":"https://seap.samsung.com/linux-on-galaxy","comments":"https://news.ycombinator.com/item?id=15505856","updated_at":"2017-10-19T06:28:49+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15505856","link_host":"seap.samsung.com","from":"hackernews"},{"title":"Why Ruby App Servers Break on MacOS High Sierra","description":"<a href="https://news.ycombinator.com/item?id=15505751">Comments</a>","link":"https://blog.phusion.nl/2017/10/13/why-ruby-app-servers-break-on-macos-high-sierra-and-what-can-be-done-about-it/","comments":"https://news.ycombinator.com/item?id=15505751","updated_at":"2017-10-19T05:58:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15505751","link_host":"blog.phusion.nl","from":"hackernews"},{"title":"US Commodity Futures Trading Commission Primer on Virtual Currencies [pdf]","description":"<a href="https://news.ycombinator.com/item?id=15505567">Comments</a>","link":"http://www.cftc.gov/idc/groups/public/documents/file/labcftc_primercurrencies100417.pdf","comments":"https://news.ycombinator.com/item?id=15505567","updated_at":"2017-10-19T04:55:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15505567","link_host":"www.cftc.gov","from":"hackernews"},{"title":" Bost - Free Handmade Brush Typeface","description":"http://pivle.com/downloads/bost-typeface/","link":"https://www.designernews.co/stories/88500--bost--free-handmade-brush-typeface","comments":"https://www.designernews.co/stories/88500--bost--free-handmade-brush-typeface","updated_at":"2017-10-19T04:12:27+00:00","link_to_comments":"https://www.designernews.co/stories/88500--bost--free-handmade-brush-typeface","link_host":"pivle.com","from":"designernews"},{"title":"First Blood Transfusion: A History (2015)","description":"<a href="https://news.ycombinator.com/item?id=15504387">Comments</a>","link":"https://daily.jstor.org/first-blood-transfusion/","comments":"https://news.ycombinator.com/item?id=15504387","updated_at":"2017-10-19T00:05:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15504387","link_host":"daily.jstor.org","from":"hackernews"},{"title":"Statamic","description":"https://statamic.com/","link":"https://www.designernews.co/stories/88496-statamic","comments":"https://www.designernews.co/stories/88496-statamic","updated_at":"2017-10-18T21:52:59+00:00","link_to_comments":"https://www.designernews.co/stories/88496-statamic","link_host":"statamic.com","from":"designernews"},{"title":"What 300 Of The Top iPhone Apps Can Teach Us About App Icon Design","description":"https://www.mindsea.com/app-icon-research/","link":"https://www.designernews.co/stories/88494-what-300-of-the-top-iphone-apps-can-teach-us-about-app-icon-design","comments":"https://www.designernews.co/stories/88494-what-300-of-the-top-iphone-apps-can-teach-us-about-app-icon-design","updated_at":"2017-10-18T19:41:24+00:00","link_to_comments":"https://www.designernews.co/stories/88494-what-300-of-the-top-iphone-apps-can-teach-us-about-app-icon-design","link_host":"www.mindsea.com","from":"designernews"},{"title":"75% decline over 27 years in total flying insect biomass in protected areas","description":"<a href="https://news.ycombinator.com/item?id=15502074">Comments</a>","link":"http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0185809","comments":"https://news.ycombinator.com/item?id=15502074","updated_at":"2017-10-18T19:17:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15502074","link_host":"journals.plos.org","from":"hackernews"},{"title":"Introducing Framer Export","description":"https://framer.com/?utm_source=designernews&utm_campaign=framer_export_oct2017?banner=exporting","link":"https://www.designernews.co/stories/88491-introducing-framer-export","comments":"https://www.designernews.co/stories/88491-introducing-framer-export","updated_at":"2017-10-18T17:53:35+00:00","link_to_comments":"https://www.designernews.co/stories/88491-introducing-framer-export","link_host":"framer.com","from":"designernews"},{"title":"Now that iOS 11 is a month old, what AR apps are you actually using?","description":"I downloaded and played with dozens of augmented reality apps when the ARKit hype train hit, but I've since deleted every single of them off of my phone. \n\nThe novelty of AR was fun for a few minutes, but has anyone found a practical AR app they frequently use (and come back to)?","link":"https://www.designernews.co/stories/88489-now-that-ios-11-is-a-month-old-what-ar-apps-are-you-actually-using","comments":"https://www.designernews.co/stories/88489-now-that-ios-11-is-a-month-old-what-ar-apps-are-you-actually-using","updated_at":"2017-10-18T17:41:10+00:00","link_to_comments":"https://www.designernews.co/stories/88489-now-that-ios-11-is-a-month-old-what-ar-apps-are-you-actually-using","link_host":null,"from":"designernews"},{"title":"Adobe XD 1.0","description":"So happy with this: https://blogs.adobe.com/creativecloud/welcome-adobe-xd-cc/ … #AdobeXD 1.0 is here. Built by great people in collaboration with an amazing community. Please keep sending your feedback. On behalf of the whole XD team: thank you guys!","link":"https://www.designernews.co/stories/88488-adobe-xd-10","comments":"https://www.designernews.co/stories/88488-adobe-xd-10","updated_at":"2017-10-18T17:01:24+00:00","link_to_comments":"https://www.designernews.co/stories/88488-adobe-xd-10","link_host":null,"from":"designernews"},{"title":"Building a Habit-Forming Product Starts With Your User Onboarding","description":"https://www.trychameleon.com/blog/habit-forming-user-onboarding","link":"https://www.designernews.co/stories/88484-building-a-habitforming-product-starts-with-your-user-onboarding","comments":"https://www.designernews.co/stories/88484-building-a-habitforming-product-starts-with-your-user-onboarding","updated_at":"2017-10-18T16:03:48+00:00","link_to_comments":"https://www.designernews.co/stories/88484-building-a-habitforming-product-starts-with-your-user-onboarding","link_host":"www.trychameleon.com","from":"designernews"},{"title":"Documenting the Web together","description":"<a href="https://news.ycombinator.com/item?id=15500220">Comments</a>","link":"https://blogs.windows.com/msedgedev/2017/10/18/documenting-web-together-mdn-web-docs","comments":"https://news.ycombinator.com/item?id=15500220","updated_at":"2017-10-18T15:56:59+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15500220","link_host":"blogs.windows.com","from":"hackernews"},{"title":"Bráulio Amado's Portfolio","description":"http://badbadbadbad.com/","link":"https://www.designernews.co/stories/88479-brulio-amados-portfolio","comments":"https://www.designernews.co/stories/88479-brulio-amados-portfolio","updated_at":"2017-10-18T14:18:42+00:00","link_to_comments":"https://www.designernews.co/stories/88479-brulio-amados-portfolio","link_host":"badbadbadbad.com","from":"designernews"},{"title":"How do you organize your folders and files for design projects?","description":"I work on design projects at university and for private use. Currently I'm saving my sketch and framer files in a chronologically folder system on my dropbox. But I'm not quite happy.\n\nHow do you organize your design files? Do you use abstract or similar tools?","link":"https://www.designernews.co/stories/88477-how-do-you-organize-your-folders-and-files-for-design-projects","comments":"https://www.designernews.co/stories/88477-how-do-you-organize-your-folders-and-files-for-design-projects","updated_at":"2017-10-18T13:30:31+00:00","link_to_comments":"https://www.designernews.co/stories/88477-how-do-you-organize-your-folders-and-files-for-design-projects","link_host":null,"from":"designernews"},{"title":"Sketch Libraries, an in-depth look","description":"https://blog.sketchapp.com/libraries-an-in-depth-look-56b147022e1f","link":"https://www.designernews.co/stories/88475-sketch-libraries-an-indepth-look","comments":"https://www.designernews.co/stories/88475-sketch-libraries-an-indepth-look","updated_at":"2017-10-18T13:16:40+00:00","link_to_comments":"https://www.designernews.co/stories/88475-sketch-libraries-an-indepth-look","link_host":"blog.sketchapp.com","from":"designernews"},{"title":"Introducing InVision Studio","description":"http://www.invisionapp.com/studio","link":"https://www.designernews.co/stories/88473-introducing-invision-studio","comments":"https://www.designernews.co/stories/88473-introducing-invision-studio","updated_at":"2017-10-18T13:00:38+00:00","link_to_comments":"https://www.designernews.co/stories/88473-introducing-invision-studio","link_host":"www.invisionapp.com","from":"designernews"},{"title":"A curated list of developers & designers to follow on twitter.","description":"https://github.com/iRaul/web-tweeps","link":"https://www.designernews.co/stories/88472-a-curated-list-of-developers--designers-to-follow-on-twitter","comments":"https://www.designernews.co/stories/88472-a-curated-list-of-developers--designers-to-follow-on-twitter","updated_at":"2017-10-18T12:27:53+00:00","link_to_comments":"https://www.designernews.co/stories/88472-a-curated-list-of-developers--designers-to-follow-on-twitter","link_host":"github.com","from":"designernews"},{"title":"New Ebay Logo Color System ","description":"http://form-and.com/work/ebay","link":"https://www.designernews.co/stories/88470-new-ebay-logo-color-system-","comments":"https://www.designernews.co/stories/88470-new-ebay-logo-color-system-","updated_at":"2017-10-18T11:28:29+00:00","link_to_comments":"https://www.designernews.co/stories/88470-new-ebay-logo-color-system-","link_host":"formand.com","from":"designernews"},{"title":"A Guide to Payment and Invoicing Tools for Designers/Developers","description":"https://designmodo.com/payment-invoicing-tools/","link":"https://www.designernews.co/stories/88466-a-guide-to-payment-and-invoicing-tools-for-designersdevelopers","comments":"https://www.designernews.co/stories/88466-a-guide-to-payment-and-invoicing-tools-for-designersdevelopers","updated_at":"2017-10-18T09:53:58+00:00","link_to_comments":"https://www.designernews.co/stories/88466-a-guide-to-payment-and-invoicing-tools-for-designersdevelopers","link_host":"designmodo.com","from":"designernews"},{"title":"Enable Google's New \"Advanced Protection\" If You Don't Want to Get Hacked","description":"It is good to be paranoid when it comes to cybersecurity.\n\nGoogle already provides various advanced features such as login alerts and two-factor authentication to keep your Google account secure.\n\nHowever, if you are extra paranoid, Google has just introduced its strongest ever security feature, called "Advanced Protection," which makes it easier for users, who are usually at high risk of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=dMUKXJQZaxU:-oMcY1v3xDk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/dMUKXJQZaxU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/dMUKXJQZaxU/google-advanced-protection.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dMUKXJQZaxU/google-advanced-protection.html","updated_at":"2017-10-18T09:19:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dMUKXJQZaxU/google-advanced-protection.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How I became an Illustrator by discovering a new dimension","description":"https://design.zeta.in/how-i-became-an-illustrator-by-discovering-a-new-dimension-1dbc99bba7a5","link":"https://www.designernews.co/stories/88465-how-i-became-an-illustrator-by-discovering-a-new-dimension","comments":"https://www.designernews.co/stories/88465-how-i-became-an-illustrator-by-discovering-a-new-dimension","updated_at":"2017-10-18T09:03:19+00:00","link_to_comments":"https://www.designernews.co/stories/88465-how-i-became-an-illustrator-by-discovering-a-new-dimension","link_host":"design.zeta.in","from":"designernews"},{"title":"Introducing OpenType Variable Fonts","description":"https://medium.com/@tiro/https-medium-com-tiro-introducing-opentype-variable-fonts-12ba6cd2369","link":"https://www.designernews.co/stories/88463-introducing-opentype-variable-fonts","comments":"https://www.designernews.co/stories/88463-introducing-opentype-variable-fonts","updated_at":"2017-10-18T07:18:22+00:00","link_to_comments":"https://www.designernews.co/stories/88463-introducing-opentype-variable-fonts","link_host":"medium.com","from":"designernews"},{"title":"Thinking Like a Mountain: On Nature Writing","description":"<a href="https://news.ycombinator.com/item?id=15495934">Comments</a>","link":"https://nplusonemag.com/issue-29/reviews/thinking-like-a-mountain/","comments":"https://news.ycombinator.com/item?id=15495934","updated_at":"2017-10-17T23:54:01+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15495934","link_host":"nplusonemag.com","from":"hackernews"},{"title":"Dropbox Professional – Showcase your work","description":"https://blogs.dropbox.com/dropbox/2017/10/new-plan-dropbox-professional/","link":"https://www.designernews.co/stories/88449-dropbox-professional--showcase-your-work","comments":"https://www.designernews.co/stories/88449-dropbox-professional--showcase-your-work","updated_at":"2017-10-17T18:01:30+00:00","link_to_comments":"https://www.designernews.co/stories/88449-dropbox-professional--showcase-your-work","link_host":"blogs.dropbox.com","from":"designernews"},{"title":"Time for a refresh: meet the new Google Calendar","description":"https://www.blog.google/products/g-suite/time-refresh-introducing-new-look-and-features-google-calendar-web/","link":"https://www.designernews.co/stories/88442-time-for-a-refresh-meet-the-new-google-calendar","comments":"https://www.designernews.co/stories/88442-time-for-a-refresh-meet-the-new-google-calendar","updated_at":"2017-10-17T16:59:53+00:00","link_to_comments":"https://www.designernews.co/stories/88442-time-for-a-refresh-meet-the-new-google-calendar","link_host":"www.blog.google","from":"designernews"},{"title":"Dangerous Malware Allows Anyone to Empty ATMs—And It’s On Sale!","description":"Hacking ATM is now easier than ever before.\n\nUsually, hackers exploit hardware and software vulnerabilities to hack ATMs and force them to spit out cash, but now anyone can simply buy a malware to steal millions in cash from ATMs.\n\nHackers are selling ready-made ATM malware on an underground hacking forum that anybody can simply buy for around $5000, researchers at Kaspersky Lab discovered<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=MbyyQT_fCHs:owObNu1xfb8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/MbyyQT_fCHs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/MbyyQT_fCHs/atm-malware-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/MbyyQT_fCHs/atm-malware-hacking.html","updated_at":"2017-10-17T16:42:59+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/MbyyQT_fCHs/atm-malware-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Introducing FlowMapp.com","description":"https://flowmapp.com","link":"https://www.designernews.co/stories/88436-introducing-flowmappcom","comments":"https://www.designernews.co/stories/88436-introducing-flowmappcom","updated_at":"2017-10-17T14:52:26+00:00","link_to_comments":"https://www.designernews.co/stories/88436-introducing-flowmappcom","link_host":"flowmapp.com","from":"designernews"},{"title":"Learn Ethical Hacking — Get 8 Online Courses For Just $29","description":"With the rise in cyber-crimes, ethical hacking has become a powerful strategy in the fight against online threats.\n\nIn general terms, ethical hackers are authorised to break into supposedly 'secure' computer systems without malicious intent, but with the aim of discovering vulnerabilities to bring about improved protection.\n\nEthical Hackers are now kind of becoming the alchemists of the 21st<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=VwY5IJQfaVE:uU6RVbOtHLk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/VwY5IJQfaVE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/VwY5IJQfaVE/learn-hacking-course.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/VwY5IJQfaVE/learn-hacking-course.html","updated_at":"2017-10-17T13:27:47+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/VwY5IJQfaVE/learn-hacking-course.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Kept Secret That Its Bug-Tracking Database Was Hacked In 2013","description":"It was not just Yahoo among "Fortune 500" companies who tried to keep a major data breach incident secret.\n\nReportedly, Microsoft had also suffered a data breach four and a half years ago (in 2013), when a "highly sophisticated hacking group" breached its bug-reporting and patch-tracking database, but the hack was never made public until today.\n\nAccording to five former employees of the<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=L4cG7hD2H1k:ugDLZwQ0fIk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/L4cG7hD2H1k" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/L4cG7hD2H1k/microsoft-bug-tracking-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/L4cG7hD2H1k/microsoft-bug-tracking-breach.html","updated_at":"2017-10-17T11:33:28+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/L4cG7hD2H1k/microsoft-bug-tracking-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices","description":"If you think KRACK attack for WiFi is the worst vulnerability of this year, then hold on…\n\n...we have got another one for you which is even worse.\n\nMicrosoft, Google, Lenovo, HP and Fujitsu are warning their customers of a potentially serious vulnerability in widely used RSA cryptographic library produced by German semiconductor manufacturer Infineon Technologies.\n\nIt's noteworthy that this<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Tf7UHd18J_Y:l_TMLEOWNtM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Tf7UHd18J_Y" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Tf7UHd18J_Y/rsa-encryption-keys.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Tf7UHd18J_Y/rsa-encryption-keys.html","updated_at":"2017-10-17T08:57:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Tf7UHd18J_Y/rsa-encryption-keys.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How A Drive-by Download Attack Locked Down Entire City for 4 Days","description":"We don't really know the pain and cost of a downtime event unless we are directly touched.\n\nBe it a flood, electrical failure, ransomware attack or other broad geographic events; we don't know what it is really like to have to restore IT infrastructure unless we have had to do it ourselves.\n\nWe look at other people's backup and recovery issues and hope we are smarter or clever enough to keep<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=E_D7WqWv_Ws:l1GmUbuNiMI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/E_D7WqWv_Ws" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/E_D7WqWv_Ws/drive-by-download-ransomware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/E_D7WqWv_Ws/drive-by-download-ransomware.html","updated_at":"2017-10-16T17:14:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/E_D7WqWv_Ws/drive-by-download-ransomware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Use New Flash Zero-Day Exploit to Distribute FinFisher Spyware","description":"FinSpy—the infamous surveillance malware is back and infecting high-profile targets using a new Adobe Flash zero-day exploit delivered through Microsoft Office documents.\n\nSecurity researchers from Kaspersky Labs have discovered a new zero-day remote code execution vulnerability in Adobe Flash, which was being actively exploited in the wild by a group of advanced persistent threat actors,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=XWLB65MV8Go:-UC0_kH8AZk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/XWLB65MV8Go" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/XWLB65MV8Go/flash-player-zero-day.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XWLB65MV8Go/flash-player-zero-day.html","updated_at":"2017-10-16T15:53:54+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XWLB65MV8Go/flash-player-zero-day.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Yet Another Linux Kernel Privilege-Escalation Bug Discovered","description":"Security researchers have discovered a new privilege-escalation vulnerability in Linux kernel that could allow a local attacker to execute code on the affected systems with elevated privileges.\n\nDiscovered by Venustech ADLab (Active-Defense Lab) researchers, the Linux kernel vulnerability (CVE-2017-15265) is due to a use-after-free memory error in the Advanced Linux Sound Architecture (ALSA)<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=j4kAlT9c0lA:tv6Ig8uNw1M:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/j4kAlT9c0lA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/j4kAlT9c0lA/linux-privilege-escalation.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/j4kAlT9c0lA/linux-privilege-escalation.html","updated_at":"2017-10-16T15:02:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/j4kAlT9c0lA/linux-privilege-escalation.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Sponsor: World’s Thinnest iPhone X Leather Case by totallee — Minimalistic and Branding Free with a 2-Year Warranty Included","description":"http://synd.co/2g63Ute","link":"https://www.designernews.co/stories/88394-sponsor-worlds-thinnest-iphone-x-leather-case-by-totallee--minimalistic-and-branding-free-with-a-2year-warranty-included","comments":"https://www.designernews.co/stories/88394-sponsor-worlds-thinnest-iphone-x-leather-case-by-totallee--minimalistic-and-branding-free-with-a-2year-warranty-included","updated_at":"2017-10-16T14:28:07+00:00","link_to_comments":"https://www.designernews.co/stories/88394-sponsor-worlds-thinnest-iphone-x-leather-case-by-totallee--minimalistic-and-branding-free-with-a-2year-warranty-included","link_host":"synd.co","from":"designernews"},{"title":"KRACK Demo: Critical Key Reinstallation Attack Against Widely-Used WPA2 Wi-Fi Protocol","description":"Do you think your wireless network is secure because you're using WPA2 encryption?\n\nIf yes, think again!\n\nSecurity researchers have discovered several key management vulnerabilities in the core of Wi-Fi Protected Access II (WPA2) protocol that could allow an attacker to hack into your Wi-Fi network and eavesdrop on the Internet communications.\n\nWPA2 is a 13-year-old WiFi authentication scheme<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=JwPOBlmwiIE:Jeo6HSz1dss:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/JwPOBlmwiIE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/JwPOBlmwiIE/wpa2-krack-wifi-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JwPOBlmwiIE/wpa2-krack-wifi-hacking.html","updated_at":"2017-10-16T11:27:49+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/JwPOBlmwiIE/wpa2-krack-wifi-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ukraine Police Warns of New NotPetya-Style Large Scale CyberAttack","description":"Remember NotPetya?\n\nThe Ransomware that shut down thousands of businesses, organisations and banks in Ukraine as well as different parts of Europe in June this year.\n\nNow, Ukrainian government authorities are once again warning its citizens to brace themselves for next wave of "large-scale" NotPetya-like cyber attack.\n\nAccording to a press release published Thursday by the Secret Service of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xR88wkb2zs4:lgHkuxGPuh4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xR88wkb2zs4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xR88wkb2zs4/ukraine-notpetya-cyberattack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xR88wkb2zs4/ukraine-notpetya-cyberattack.html","updated_at":"2017-10-14T07:24:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xR88wkb2zs4/ukraine-notpetya-cyberattack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Ransomware Not Just Encrypts Your Android But Also Changes PIN Lock","description":"DoubleLocker—as the name suggests, it locks device twice.\n\nSecurity researchers from Slovakia-based security software maker ESET have discovered a new Android ransomware that not just encrypts users’ data, but also locks them out of their devices by changing lock screen PIN.\n\nOn top of that:\n\nDoubleLocker is the first-ever ransomware to misuse Android accessibility—a feature that provides<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=y3nZQ0gN9Gw:GNls21rqfTU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/y3nZQ0gN9Gw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/y3nZQ0gN9Gw/android-ransomware-pin.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/y3nZQ0gN9Gw/android-ransomware-pin.html","updated_at":"2017-10-14T07:03:10+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/y3nZQ0gN9Gw/android-ransomware-pin.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Scam Alert: Your Trusted Friends Can Hack Your Facebook Account","description":"If you receive a message from any of your Facebook Friends asking for urgent help to recover their Facebook account, since they've added you as one of their 'Trusted Contacts'—just don’t blindly believe it.\n\nResearchers have detected a new Facebook phishing scam that can even trick an experienced technical user into falling victim to the scam, helping an attacker gain access to your Facebook<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=463dXUX863s:0CzwxwAdMTI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/463dXUX863s" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/463dXUX863s/facebook-account-hacking-scam.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/463dXUX863s/facebook-account-hacking-scam.html","updated_at":"2017-10-13T08:21:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/463dXUX863s/facebook-account-hacking-scam.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Online Training for CISA, CISM, and CISSP Cyber Security Certifications","description":"Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks. \n\nWith more money at risk and data breaches at a rise, more certified cyber security experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves.\n\nThat's why jobs in the cyber security field have gone up 80% over the past three years<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=sWaIdXZr9Vw:gLaKBgeZ700:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/sWaIdXZr9Vw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/sWaIdXZr9Vw/cyber-security-certification-training.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sWaIdXZr9Vw/cyber-security-certification-training.html","updated_at":"2017-10-12T11:52:17+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sWaIdXZr9Vw/cyber-security-certification-training.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"MS Office Built-in Feature Allows Malware Execution Without Macros Enabled","description":"Since new forms of cybercrime are on the rise, traditional techniques seem to be shifting towards more clandestine that involve the exploitation of standard system tools and protocols, which are not always monitored.\n\nSecurity researchers at Cisco's Talos threat research group have discovered one such attack campaign spreading malware-equipped Microsoft Word documents that perform code<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=oXrRcBRzuz0:qWXMl2SeI7g:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/oXrRcBRzuz0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/oXrRcBRzuz0/ms-office-dde-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/oXrRcBRzuz0/ms-office-dde-malware.html","updated_at":"2017-10-12T11:06:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/oXrRcBRzuz0/ms-office-dde-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Buggy Microsoft Outlook Sending Encrypted S/MIME Emails With Plaintext Copy For Months","description":"Beware, If you are using S/MIME protocol over Microsoft Outlook to encrypt your email communication, you need to watch out.\n\nFrom at least last 6 months, your messages were being sent in both encrypted and unencrypted forms, exposing all your secret and sensitive communications to potential eavesdroppers.\n\nS/MIME, or Secure/Multipurpose Internet Mail Extensions, is an end-to-end encryption<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Z_-uqggBeRc:WAs8lPEN0ik:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Z_-uqggBeRc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Z_-uqggBeRc/outlook-email-encryption.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Z_-uqggBeRc/outlook-email-encryption.html","updated_at":"2017-10-12T08:58:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Z_-uqggBeRc/outlook-email-encryption.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Israel Hacked Kaspersky, Caught Russian Spies Hacking American Spies, But...","description":"The cold cyber war has just turned hot.\n\nAccording to a story published today by the New York Times, Israeli government hackers hacked into Kaspersky’s network in 2015 and caught Russian government hackers red-handed hacking US government hackers with the help of Kaspersky.\n\nIn other words — Russia spying on America, Israel spying on Russia and America spying on everyone.\n\nWhat the F^#% is<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=czUrILayRVE:VebchSpkmXA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/czUrILayRVE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/czUrILayRVE/kaspersky-nsa-russian-hackers.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/czUrILayRVE/kaspersky-nsa-russian-hackers.html","updated_at":"2017-10-11T12:39:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/czUrILayRVE/kaspersky-nsa-russian-hackers.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Steal $60 Million from Taiwanese Bank; Two Suspects Arrested","description":"A Taiwanese bank has become the latest to fall victim to hackers siphoning off millions of dollars by targeting the backbone of the world financial system, SWIFT.\n\nSWIFT, or Society for Worldwide Interbank Telecommunication, is a global financial messaging system that thousands of banks and commercial organizations across the world use to transfer billions of dollars every day.\n\nHackers<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=q1OfTK_YUaM:VmY2vbt-bFI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/q1OfTK_YUaM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/q1OfTK_YUaM/swift-bank-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/q1OfTK_YUaM/swift-bank-hacking.html","updated_at":"2017-10-11T11:49:05+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/q1OfTK_YUaM/swift-bank-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Issues Patches For Severe Flaws, Including Office Zero-Day & DNS Attack","description":"As part of its "October Patch Tuesday," Microsoft has today released a large batch of security updates to patch a total of 62 vulnerabilities in its products, including a severe MS office zero-day flaw that has been exploited in the wild.\n\nSecurity updates also include patches for Microsoft Windows operating systems, Internet Explorer, Microsoft Edge, Skype, Microsoft Lync and Microsoft<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=oTFzHZVsJlY:JqNw51LxYko:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/oTFzHZVsJlY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/oTFzHZVsJlY/microsoft-security-patches.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/oTFzHZVsJlY/microsoft-security-patches.html","updated_at":"2017-10-11T09:13:54+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/oTFzHZVsJlY/microsoft-security-patches.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"OnePlus Secretly Collects Way More Data Than It Should — Here’s How to Disable It ","description":"There is terrible news for all OnePlus lovers.\n\nYour OnePlus handset, running OxygenOS—the company's custom version of the Android operating system, is collecting way more data on its users than it requires.\n\nA recent blog post published today by security researcher Christopher Moore on his website detailed the data collection practice by the Shenzhen-based Chinese smartphone maker, revealing<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=dA63MZE0cVA:yoVV-p30Le4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/dA63MZE0cVA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/dA63MZE0cVA/oneplus-oxygenos-analytics-data.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dA63MZE0cVA/oneplus-oxygenos-analytics-data.html","updated_at":"2017-10-11T07:47:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/dA63MZE0cVA/oneplus-oxygenos-analytics-data.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Watch Out! Difficult-to-Detect Phishing Attack Can Steal Your Apple ID Password","description":"Can you detect which one of the above screens—asking an iPhone user for iCloud password—is original and which is fake?\n\nWell, you would agree that both screenshots are almost identical, but the pop-up shown in the second image is fake—a perfect phishing attack that can be used to trick even the most careful users on the Internet.\n\nFelix Krause, an iOS developer and founder of Fastlane.Tools,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=J6DxjoG3BLI:F2BUiBWas4c:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/J6DxjoG3BLI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/J6DxjoG3BLI/apple-id-password-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/J6DxjoG3BLI/apple-id-password-hacking.html","updated_at":"2017-10-10T17:03:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/J6DxjoG3BLI/apple-id-password-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":" Microsoft Cortana Can Now Read Your Skype Messages to Make Chat Smarter","description":"Microsoft today announced built-in support for Cortana—an artificial intelligence-powered smart assistant—in Skype messenger on Android as well as iOS devices.\n\nWhat purpose does it serve?\n\nMicrosoft wants its AI-based smart assistance to understand your conversations and help you with quick suggestions, ideas and information right inside your chat window.\n\n"Cortana can also help you organize<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Jf6qhchNq7c:sMCiJWDH4ag:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Jf6qhchNq7c" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Jf6qhchNq7c/cortana-for-skype.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Jf6qhchNq7c/cortana-for-skype.html","updated_at":"2017-10-10T15:31:22+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Jf6qhchNq7c/cortana-for-skype.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Warning: Millions Of P0rnHub Users Hit With Malvertising Attack","description":"Researchers from cybersecurity firm Proofpoint have recently discovered a large-scale malvertising campaign that exposed millions of Internet users in the United States, Canada, the UK, and Australia to malware infections.\n\nActive for more than a year and still ongoing, the malware campaign is being conducted by a hacking group called KovCoreG, which is well known for distributing Kovter ad<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=bp-jysalQ8o:Rou4zkVNwLY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bp-jysalQ8o" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bp-jysalQ8o/online-malvertising-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bp-jysalQ8o/online-malvertising-attack.html","updated_at":"2017-10-10T10:30:20+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bp-jysalQ8o/online-malvertising-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"FBI Arrests A Cyberstalker After Shady \"No-Logs\" VPN Provider Shared User Logs","description":"FBI recently arrested a psycho cyber stalker with the help of a popular VPN service and this case apparently exposed the company's lies about the "no logs" policy.\n\nTaking down cyber stalkers and criminals is definitely a good thing, and the FBI has truly done a great job, but the VPN company whose first line of the privacy policy is—"We Do Not monitor user activity nor do we keep any logs"—<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=gx6TXIHHXR0:AIVi8gLg6jk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/gx6TXIHHXR0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/gx6TXIHHXR0/no-logs-vpn-service-security_8.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/gx6TXIHHXR0/no-logs-vpn-service-security_8.html","updated_at":"2017-10-09T08:21:03+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/gx6TXIHHXR0/no-logs-vpn-service-security_8.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Disqus Hacked: More than 17.5 Million Users' Details Stolen in 2012 Breach","description":"Another day, Another data breach disclosure.\n\nThis time the popular commenting system has fallen victim to a massive security breach.\n\nDisqus, the company which provides a web-based comment plugin for websites and blogs, has admitted that it was breached 5 years ago in July 2012 and hackers stole details of more than 17.5 million users.\n\nThe stolen data includes email addresses, usernames,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=0wV7UkPVA6o:pHi2d8SUfyw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/0wV7UkPVA6o" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/0wV7UkPVA6o/disqus-comment-system-hacked.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/0wV7UkPVA6o/disqus-comment-system-hacked.html","updated_at":"2017-10-07T07:07:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/0wV7UkPVA6o/disqus-comment-system-hacked.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"U.S. Believes Russian Spies Used Kaspersky Antivirus to Steal NSA Secrets","description":"Do you know—United States Government has banned federal agencies from using Kaspersky antivirus software over spying fear?\n\nThough there's no solid evidence yet available, an article published by WSJ claims that the Russian state-sponsored hackers stole highly classified NSA documents from a contractor in 2015 with the help of a security program made by Russia-based security firm Kaspersky Lab<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=wj0itBGyYis:0o-RSm-qI-Y:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/wj0itBGyYis" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/wj0itBGyYis/kaspersky-nsa-spying.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wj0itBGyYis/kaspersky-nsa-spying.html","updated_at":"2017-10-06T13:43:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wj0itBGyYis/kaspersky-nsa-spying.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"If Bill Gates really thinks ctrl-alt-del was a mistake, he should have fixed it himself","description":"You can't pin the blame for this one on IBM.","link":"http://arstechnica.com/?p=346525","comments":"http://arstechnica.com/?p=346525","updated_at":"2017-09-21T17:55:37+00:00","link_to_comments":"http://arstechnica.com/?p=346525","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft: Windows getting more stable, faster, and lasting longer on battery","description":"Even as Windows 10 users grow, support calls are declining.","link":"https://arstechnica.com/?p=1171013","comments":"https://arstechnica.com/?p=1171013","updated_at":"2017-09-21T00:26:46+00:00","link_to_comments":"https://arstechnica.com/?p=1171013","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Azure Confidential Computing will keep data secret, even from Microsoft","description":"Virtual machines and hardware features will provide secrecy.","link":"https://arstechnica.com/?p=1166719","comments":"https://arstechnica.com/?p=1166719","updated_at":"2017-09-14T19:03:26+00:00","link_to_comments":"https://arstechnica.com/?p=1166719","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Apple says Face ID didn’t actually fail during its iPhone X event","description":"The iPhone maker says its new face unlocking tech worked as intended.","link":"https://arstechnica.com/?p=1166603","comments":"https://arstechnica.com/?p=1166603","updated_at":"2017-09-14T15:28:15+00:00","link_to_comments":"https://arstechnica.com/?p=1166603","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Kaspersky software banned from US government agencies","description":"Kaspersky: We have “never helped, nor will help, any government with cyberespionage.”","link":"https://arstechnica.com/?p=1165929","comments":"https://arstechnica.com/?p=1165929","updated_at":"2017-09-13T19:35:33+00:00","link_to_comments":"https://arstechnica.com/?p=1165929","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Leak of >1,700 valid passwords could make the IoT mess much worse","description":"List of unsecured devices lived in obscurity since June. Now, it's going mainstream.","link":"https://arstechnica.com/?p=1153815","comments":"https://arstechnica.com/?p=1153815","updated_at":"2017-08-25T19:40:03+00:00","link_to_comments":"https://arstechnica.com/?p=1153815","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Secret chips in replacement parts can completely hijack your phone’s security","description":"Booby-trapped touchscreens can log passwords, install malicious apps, and more.","link":"https://arstechnica.com/?p=1148889","comments":"https://arstechnica.com/?p=1148889","updated_at":"2017-08-18T12:27:29+00:00","link_to_comments":"https://arstechnica.com/?p=1148889","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Building America’s Trust Act would amp up privacy concerns at the border","description":"Civil libertarians tell Ars they’re worried about “mass surveillance expansion.”","link":"https://arstechnica.com/?p=1146953","comments":"https://arstechnica.com/?p=1146953","updated_at":"2017-08-15T08:00:38+00:00","link_to_comments":"https://arstechnica.com/?p=1146953","link_host":"arstechnica.com","from":"arssecurity"},{"title":"After phishing attacks, Chrome extensions push adware to millions","description":"Compromised accounts push fraudulent extension updates to unsuspecting users.","link":"https://arstechnica.com/?p=1142099","comments":"https://arstechnica.com/?p=1142099","updated_at":"2017-08-03T15:45:25+00:00","link_to_comments":"https://arstechnica.com/?p=1142099","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft expands bug bounty program to cover any Windows flaw","description":"Now every part of Windows is covered by a bug bounty scheme.","link":"https://arstechnica.com/?p=1138451","comments":"https://arstechnica.com/?p=1138451","updated_at":"2017-07-26T20:28:19+00:00","link_to_comments":"https://arstechnica.com/?p=1138451","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 will try to combat ransomware by locking up your data","description":"But how to protect files from users who have access to those files remains tricky.","link":"https://arstechnica.com/?p=1126335","comments":"https://arstechnica.com/?p=1126335","updated_at":"2017-06-29T19:25:19+00:00","link_to_comments":"https://arstechnica.com/?p=1126335","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Ryzen Pro: AMD takes on Intel on the corporate desktop, with one key omission","description":"AMD wants to go after Intel vPro while avoiding Intel's excessive product segmentation.","link":"https://arstechnica.com/?p=1120511","comments":"https://arstechnica.com/?p=1120511","updated_at":"2017-06-29T13:00:32+00:00","link_to_comments":"https://arstechnica.com/?p=1120511","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft bringing EMET back as a built-in part of Windows 10","description":"The built-in exploit mitigations are getting stronger and easier to configure.","link":"https://arstechnica.com/?p=1124813","comments":"https://arstechnica.com/?p=1124813","updated_at":"2017-06-27T19:47:31+00:00","link_to_comments":"https://arstechnica.com/?p=1124813","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 S security brought down by, of course, Word macros","description":"Analysis: Windows 10 S promises many good things. It currently doesn't deliver.","link":"https://arstechnica.com/?p=1123201","comments":"https://arstechnica.com/?p=1123201","updated_at":"2017-06-23T20:11:21+00:00","link_to_comments":"https://arstechnica.com/?p=1123201","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Check Point says Fireball malware hit 250 million; Microsoft says no","description":"Either way, Microsoft assures us that Windows 10 S would have been immune.","link":"https://arstechnica.com/?p=1122335","comments":"https://arstechnica.com/?p=1122335","updated_at":"2017-06-23T12:00:44+00:00","link_to_comments":"https://arstechnica.com/?p=1122335","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft’s decision to patch Windows XP is a mistake","description":"There will always be one more emergency.","link":"http://arstechnica.com/?p=455551","comments":"http://arstechnica.com/?p=455551","updated_at":"2017-06-14T02:20:12+00:00","link_to_comments":"http://arstechnica.com/?p=455551","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Sneaky hackers use Intel management tools to bypass Windows firewall","description":"Serial ports don’t have firewalls.","link":"https://arstechnica.com/?p=1113911","comments":"https://arstechnica.com/?p=1113911","updated_at":"2017-06-09T00:11:09+00:00","link_to_comments":"https://arstechnica.com/?p=1113911","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Radio-controlled pacemakers aren’t as hard to hack as you (may) think","description":"The four major makers aren't properly securing critical cardiac devices, report says.","link":"https://arstechnica.com/?p=1105539","comments":"https://arstechnica.com/?p=1105539","updated_at":"2017-05-26T17:55:12+00:00","link_to_comments":"https://arstechnica.com/?p=1105539","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Cockpit access codes for United Airlines spill online","description":""The safety of our customers and crew is our top priority," United says.","link":"https://arstechnica.com/?p=1097749","comments":"https://arstechnica.com/?p=1097749","updated_at":"2017-05-15T18:00:55+00:00","link_to_comments":"https://arstechnica.com/?p=1097749","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Punching holes in nomx, the world’s “most secure” communications protocol","description":"Extraordinary claims require extraordinary proof, and nomx implodes under scrutiny.","link":"https://arstechnica.com/?p=1085021","comments":"https://arstechnica.com/?p=1085021","updated_at":"2017-04-27T17:05:01+00:00","link_to_comments":"https://arstechnica.com/?p=1085021","link_host":"arstechnica.com","from":"arssecurity"}]