[{"title":"How I lost 160lbs after selling my company to Atlassian","description":"<a href="https://news.ycombinator.com/item?id=17593195">Comments</a>","link":"https://matterapp.com/blog/how-i-lost-160lbs-after-selling-my-company-to-atlassian/","comments":"https://news.ycombinator.com/item?id=17593195","updated_at":"2018-07-23T14:59:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17593195","link_host":"matterapp.com","from":"hackernews"},{"title":"The Future of Web Fonts looks Awesome - Variable Fonts","description":"https://youtube.com/watch?v=ZXx_U7SsZeg","link":"https://www.designernews.co/stories/96186-the-future-of-web-fonts-looks-awesome--variable-fonts","comments":"https://www.designernews.co/stories/96186-the-future-of-web-fonts-looks-awesome--variable-fonts","updated_at":"2018-07-23T14:38:58+00:00","link_to_comments":"https://www.designernews.co/stories/96186-the-future-of-web-fonts-looks-awesome--variable-fonts","link_host":"youtube.com","from":"designernews"},{"title":"George Kvasnikov from Fantasy (New York) about AI, Photoshop, popularity and Design Magic","description":"https://flowmapp.com/interview-kvasnikov/","link":"https://www.designernews.co/stories/96185-george-kvasnikov-from-fantasy-new-york-about-ai-photoshop-popularity-and-design-magic","comments":"https://www.designernews.co/stories/96185-george-kvasnikov-from-fantasy-new-york-about-ai-photoshop-popularity-and-design-magic","updated_at":"2018-07-23T14:38:37+00:00","link_to_comments":"https://www.designernews.co/stories/96185-george-kvasnikov-from-fantasy-new-york-about-ai-photoshop-popularity-and-design-magic","link_host":"flowmapp.com","from":"designernews"},{"title":"Egyptian 'Fake News' Law Threatens Citizens with 5000-plus Followers","description":"Do you or someone you know lives in Egypt and holds an account on Facebook, Twitter, or/and other social media platforms with more than 5000 followers?\n\nIf yes, your account can be censored, suspended and is subject to prosecution for promoting or spreading the fake news through social media platforms.\n\nOn July 16, the Egyptian parliament approved a new law that classifies a personal social<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=B83aQrMpEA4:npGc3jU9sRE:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/B83aQrMpEA4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/B83aQrMpEA4/social-media-fake-news-law.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/B83aQrMpEA4/social-media-fake-news-law.html","updated_at":"2018-07-23T14:04:43+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/B83aQrMpEA4/social-media-fake-news-law.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Site Design: Emergence","description":"https://www.emcap.com","link":"https://www.designernews.co/stories/96183-site-design-emergence","comments":"https://www.designernews.co/stories/96183-site-design-emergence","updated_at":"2018-07-23T13:58:48+00:00","link_to_comments":"https://www.designernews.co/stories/96183-site-design-emergence","link_host":"www.emcap.com","from":"designernews"},{"title":"Xv6, a simple Unix-like teaching operating system","description":"<a href="https://news.ycombinator.com/item?id=17592560">Comments</a>","link":"https://pdos.csail.mit.edu/6.828/2017/xv6.html","comments":"https://news.ycombinator.com/item?id=17592560","updated_at":"2018-07-23T13:29:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17592560","link_host":"pdos.csail.mit.edu","from":"hackernews"},{"title":"Google: Security Keys Neutralized Employee Phishing","description":"<a href="https://news.ycombinator.com/item?id=17592422">Comments</a>","link":"https://krebsonsecurity.com/2018/07/google-security-keys-neutered-employee-phishing/","comments":"https://news.ycombinator.com/item?id=17592422","updated_at":"2018-07-23T13:03:25+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17592422","link_host":"krebsonsecurity.com","from":"hackernews"},{"title":"ELI5: Do animals from different countries understand each other?","description":"<a href="https://news.ycombinator.com/item?id=17592405">Comments</a>","link":"https://www.reddit.com/r/explainlikeimfive/comments/912fa6/eli5_do_animals_from_different_countries","comments":"https://news.ycombinator.com/item?id=17592405","updated_at":"2018-07-23T13:01:08+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17592405","link_host":"www.reddit.com","from":"hackernews"},{"title":"Optimizing a breadth-first search","description":"<a href="https://news.ycombinator.com/item?id=17592375">Comments</a>","link":"https://www.snellman.net/blog/archive/2018-07-23-optimizing-breadth-first-search/","comments":"https://news.ycombinator.com/item?id=17592375","updated_at":"2018-07-23T12:55:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17592375","link_host":"www.snellman.net","from":"hackernews"},{"title":"Automatic Algorithms Optimization via Fast Matrix Exponentiation (2015)","description":"<a href="https://news.ycombinator.com/item?id=17592359">Comments</a>","link":"https://kukuruku.co/post/automatic-algorithms-optimization-via-fast-matrix-exponentiation/","comments":"https://news.ycombinator.com/item?id=17592359","updated_at":"2018-07-23T12:52:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17592359","link_host":"kukuruku.co","from":"hackernews"},{"title":"Tab (YC W15) is hiring full-stack software developers in London","description":"<a href="https://news.ycombinator.com/item?id=17592251">Comments</a>","link":"https://jobs.tab.travel/","comments":"https://news.ycombinator.com/item?id=17592251","updated_at":"2018-07-23T12:35:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17592251","link_host":"jobs.tab.travel","from":"hackernews"},{"title":"Show HN: News geolocation website","description":"<a href="https://news.ycombinator.com/item?id=17592218">Comments</a>","link":"https://news.ycombinator.com/item?id=17592218","comments":"https://news.ycombinator.com/item?id=17592218","updated_at":"2018-07-23T12:28:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17592218","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Our experience launching a paid, proprietary product on Linux","description":"<a href="https://news.ycombinator.com/item?id=17592167">Comments</a>","link":"https://blog.hiri.com/a-year-on-our-experience-launching-a-paid-proprietary-product-on-linux-db4f9116be08","comments":"https://news.ycombinator.com/item?id=17592167","updated_at":"2018-07-23T12:17:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17592167","link_host":"blog.hiri.com","from":"hackernews"},{"title":"Grids in Graphic Design: A Quick History and 5 Tips","description":"https://trydesignlab.com/blog/grids-ui-ux-graphic-design-quick-history-5-amazing-tips/","link":"https://www.designernews.co/stories/96180-grids-in-graphic-design-a-quick-history-and-5-tips","comments":"https://www.designernews.co/stories/96180-grids-in-graphic-design-a-quick-history-and-5-tips","updated_at":"2018-07-23T11:38:40+00:00","link_to_comments":"https://www.designernews.co/stories/96180-grids-in-graphic-design-a-quick-history-and-5-tips","link_host":"trydesignlab.com","from":"designernews"},{"title":"Ask HN: Please help me recall a certain programmer horror story","description":"<a href="https://news.ycombinator.com/item?id=17591968">Comments</a>","link":"https://news.ycombinator.com/item?id=17591968","comments":"https://news.ycombinator.com/item?id=17591968","updated_at":"2018-07-23T11:34:11+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17591968","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Speculation Attacks Using the Return Stack Buffer","description":"<a href="https://news.ycombinator.com/item?id=17591930">Comments</a>","link":"https://arxiv.org/abs/1807.07940","comments":"https://news.ycombinator.com/item?id=17591930","updated_at":"2018-07-23T11:24:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17591930","link_host":"arxiv.org","from":"hackernews"},{"title":"Google launches 'Data Transfer Project' to make it easier to switch services","description":"A lot of new online services are cropping up every day, making our life a lot easier.\n\nBut it is always harder for users to switch to another product or service, which they think is better because the process usually involves downloading everything from one service and then re-uploading it all again to another.\n\nThanks to GDPR—stands for General Data Protection Regulation, a legal regulation<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=nOVRGbF4XME:iSPDAYgSd_0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/nOVRGbF4XME" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/nOVRGbF4XME/google-data-transfer-project.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/nOVRGbF4XME/google-data-transfer-project.html","updated_at":"2018-07-23T10:19:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/nOVRGbF4XME/google-data-transfer-project.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ask HN: Best Lego Mindstorms alternative for fun programming projects?","description":"<a href="https://news.ycombinator.com/item?id=17591715">Comments</a>","link":"https://news.ycombinator.com/item?id=17591715","comments":"https://news.ycombinator.com/item?id=17591715","updated_at":"2018-07-23T10:16:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17591715","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Show HN: Checklist of over 100 directories to submit your startup","description":"<a href="https://news.ycombinator.com/item?id=17591677">Comments</a>","link":"https://www.eggradients.com/startup-directory","comments":"https://news.ycombinator.com/item?id=17591677","updated_at":"2018-07-23T10:05:09+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17591677","link_host":"www.eggradients.com","from":"hackernews"},{"title":"Devhints: A collection of developer cheatsheets","description":"<a href="https://news.ycombinator.com/item?id=17591405">Comments</a>","link":"https://devhints.io","comments":"https://news.ycombinator.com/item?id=17591405","updated_at":"2018-07-23T08:46:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17591405","link_host":"devhints.io","from":"hackernews"},{"title":"How to Build A Super-Brand","description":"https://www.pilcro.com/blog/how-to-build-a-super-brand","link":"https://www.designernews.co/stories/96176-how-to-build-a-superbrand","comments":"https://www.designernews.co/stories/96176-how-to-build-a-superbrand","updated_at":"2018-07-23T08:20:43+00:00","link_to_comments":"https://www.designernews.co/stories/96176-how-to-build-a-superbrand","link_host":"www.pilcro.com","from":"designernews"},{"title":"Why Some Civil War Soldiers Glowed in the Dark (2012)","description":"<a href="https://news.ycombinator.com/item?id=17591261">Comments</a>","link":"http://mentalfloss.com/article/30380/why-some-civil-war-soldiers-glowed-dark","comments":"https://news.ycombinator.com/item?id=17591261","updated_at":"2018-07-23T08:08:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17591261","link_host":"mentalfloss.com","from":"hackernews"},{"title":"Design and development Fitness Tracker App Like Fitbit","description":"https://growthhackers.com/articles/create-a-fitness-tracker-app-know-the-key-aspects","link":"https://www.designernews.co/stories/96174-design-and-development-fitness-tracker-app-like-fitbit","comments":"https://www.designernews.co/stories/96174-design-and-development-fitness-tracker-app-like-fitbit","updated_at":"2018-07-23T07:11:51+00:00","link_to_comments":"https://www.designernews.co/stories/96174-design-and-development-fitness-tracker-app-like-fitbit","link_host":"growthhackers.com","from":"designernews"},{"title":"Open sourcing oomd, a new approach to handling OOMs","description":"<a href="https://news.ycombinator.com/item?id=17590858">Comments</a>","link":"https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/","comments":"https://news.ycombinator.com/item?id=17590858","updated_at":"2018-07-23T06:07:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17590858","link_host":"code.fb.com","from":"hackernews"},{"title":"What was it like to be a software engineer at NeXT?","description":"<a href="https://news.ycombinator.com/item?id=17590704">Comments</a>","link":"https://www.quora.com/What-was-it-like-to-be-a-software-engineer-at-NeXT-Did-workers-interact-with-Steve-Jobs/answer/Paul-King-2","comments":"https://news.ycombinator.com/item?id=17590704","updated_at":"2018-07-23T05:07:18+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17590704","link_host":"www.quora.com","from":"hackernews"},{"title":"CRAM: Efficient Hardware-Based Memory Compression for Bandwidth Enhancement","description":"<a href="https://news.ycombinator.com/item?id=17590680">Comments</a>","link":"https://arxiv.org/abs/1807.07685","comments":"https://news.ycombinator.com/item?id=17590680","updated_at":"2018-07-23T04:57:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17590680","link_host":"arxiv.org","from":"hackernews"},{"title":"New drug for recurring malaria","description":"<a href="https://news.ycombinator.com/item?id=17590611">Comments</a>","link":"https://www.bbc.com/news/health-44801139","comments":"https://news.ycombinator.com/item?id=17590611","updated_at":"2018-07-23T04:36:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17590611","link_host":"www.bbc.com","from":"hackernews"},{"title":"When is a nation not a nation? Somaliland’s dream of independence","description":"<a href="https://news.ycombinator.com/item?id=17590546">Comments</a>","link":"https://www.theguardian.com/news/2018/jul/20/when-is-a-nation-not-a-nation-somalilands-dream-of-independence","comments":"https://news.ycombinator.com/item?id=17590546","updated_at":"2018-07-23T04:16:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17590546","link_host":"www.theguardian.com","from":"hackernews"},{"title":"Whole House Fan and Evaporative Cooler","description":"<a href="https://news.ycombinator.com/item?id=17590361">Comments</a>","link":"https://www.jefftk.com/p/whole-house-fan-evaporative-cooler","comments":"https://news.ycombinator.com/item?id=17590361","updated_at":"2018-07-23T03:21:36+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17590361","link_host":"www.jefftk.com","from":"hackernews"},{"title":"Scala: Understanding implicits","description":"<a href="https://news.ycombinator.com/item?id=17589924">Comments</a>","link":"https://kubuszok.com/2018/implicits-type-classes-and-extension-methods-part-4/","comments":"https://news.ycombinator.com/item?id=17589924","updated_at":"2018-07-23T01:39:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17589924","link_host":"kubuszok.com","from":"hackernews"},{"title":"An integer formula for Fibonacci numbers (2015)","description":"<a href="https://news.ycombinator.com/item?id=17589585">Comments</a>","link":"https://blog.paulhankin.net/fibonacci/","comments":"https://news.ycombinator.com/item?id=17589585","updated_at":"2018-07-23T00:07:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17589585","link_host":"blog.paulhankin.net","from":"hackernews"},{"title":"There is a higher rate of dyslexia in designers - but design tools don't have good spell check? ","description":"Please help I'm getting roasted out here.","link":"https://www.designernews.co/stories/96173-there-is-a-higher-rate-of-dyslexia-in-designers--but-design-tools-dont-have-good-spell-check-","comments":"https://www.designernews.co/stories/96173-there-is-a-higher-rate-of-dyslexia-in-designers--but-design-tools-dont-have-good-spell-check-","updated_at":"2018-07-22T23:57:41+00:00","link_to_comments":"https://www.designernews.co/stories/96173-there-is-a-higher-rate-of-dyslexia-in-designers--but-design-tools-dont-have-good-spell-check-","link_host":null,"from":"designernews"},{"title":"Bubble - Build software without code (new branding!)","description":"https://bubble.is","link":"https://www.designernews.co/stories/96171-bubble--build-software-without-code-new-branding","comments":"https://www.designernews.co/stories/96171-bubble--build-software-without-code-new-branding","updated_at":"2018-07-22T22:36:39+00:00","link_to_comments":"https://www.designernews.co/stories/96171-bubble--build-software-without-code-new-branding","link_host":"bubble.is","from":"designernews"},{"title":"Efficiency Gains of Optical Interconnects at Exascale","description":"<a href="https://news.ycombinator.com/item?id=17589201">Comments</a>","link":"https://www.nextplatform.com/2018/07/19/efficiency-gains-of-optical-interconnects-at-exascale/","comments":"https://news.ycombinator.com/item?id=17589201","updated_at":"2018-07-22T22:15:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17589201","link_host":"www.nextplatform.com","from":"hackernews"},{"title":"How E-Commerce Is Transforming Rural China","description":"<a href="https://news.ycombinator.com/item?id=17589009">Comments</a>","link":"https://www.newyorker.com/magazine/2018/07/23/how-e-commerce-is-transforming-rural-china","comments":"https://news.ycombinator.com/item?id=17589009","updated_at":"2018-07-22T21:25:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17589009","link_host":"www.newyorker.com","from":"hackernews"},{"title":"Show HN: Video Hub App – like YouTube for videos on your computer","description":"<a href="https://news.ycombinator.com/item?id=17587992">Comments</a>","link":"https://videohubapp.com/","comments":"https://news.ycombinator.com/item?id=17587992","updated_at":"2018-07-22T18:11:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17587992","link_host":"videohubapp.com","from":"hackernews"},{"title":"BPG Image format","description":"<a href="https://news.ycombinator.com/item?id=17587684">Comments</a>","link":"https://bellard.org/bpg/","comments":"https://news.ycombinator.com/item?id=17587684","updated_at":"2018-07-22T17:02:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17587684","link_host":"bellard.org","from":"hackernews"},{"title":"Shedding Too Much Light on a Microcontroller's Firmware Protection (2017)","description":"<a href="https://news.ycombinator.com/item?id=17587673">Comments</a>","link":"https://www.aisec.fraunhofer.de/en/FirmwareProtection.html","comments":"https://news.ycombinator.com/item?id=17587673","updated_at":"2018-07-22T16:59:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17587673","link_host":"www.aisec.fraunhofer.de","from":"hackernews"},{"title":"Intel patches new ME vulnerabilities","description":"<a href="https://news.ycombinator.com/item?id=17586547">Comments</a>","link":"http://blog.ptsecurity.com/2018/07/intel-patches-new-me-vulnerabilities.html","comments":"https://news.ycombinator.com/item?id=17586547","updated_at":"2018-07-22T13:09:43+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17586547","link_host":"blog.ptsecurity.com","from":"hackernews"},{"title":"A new digital divide: Young people who can’t use keyboards","description":"<a href="https://news.ycombinator.com/item?id=17586251">Comments</a>","link":"http://www.asahi.com/ajw/articles/AJ201803290068.html","comments":"https://news.ycombinator.com/item?id=17586251","updated_at":"2018-07-22T11:31:27+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17586251","link_host":"www.asahi.com","from":"hackernews"},{"title":"Ecuador to Withdraw Asylum for Wikileaks Founder Julian Assange","description":"After protecting WikiLeaks founder Julian Assange for almost six years, Ecuador is now planning to withdraw its political asylum, probably next week, and eject him from its London embassy—eventually would turn him over to the British authorities.\n\nLenín Moreno, the newly-elected President of Ecuador, has arrived in London this Friday to give a speech at Global Disability Summit on 24 July 2018<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=egzXAH1uHkY:35jOvY--qMY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/egzXAH1uHkY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/egzXAH1uHkY/wikileaks-julian-assange-ecuador-asylum.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/egzXAH1uHkY/wikileaks-julian-assange-ecuador-asylum.html","updated_at":"2018-07-21T22:06:52+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/egzXAH1uHkY/wikileaks-julian-assange-ecuador-asylum.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Best tool for micro-interactions to work with Figma?","description":"So I switched from Sketch to Figma for the UI work. I was wondering what do you guys prefer for prototyping and micro-interactions. While working with Sketch, I used Principle (since we could directly import the files). However, I could not find any app that provides direct integration with Figma.\n\nWhat process do you guys follow? Import it as a SVG in some app?","link":"https://www.designernews.co/stories/96168-best-tool-for-microinteractions-to-work-with-figma","comments":"https://www.designernews.co/stories/96168-best-tool-for-microinteractions-to-work-with-figma","updated_at":"2018-07-21T13:46:54+00:00","link_to_comments":"https://www.designernews.co/stories/96168-best-tool-for-microinteractions-to-work-with-figma","link_host":null,"from":"designernews"},{"title":"As a Product Designer, what is the next thing that you'd like to learn?","description":"This is for me to know the unknowns boundaries of product design because I can only learn the thing I'm aware of. I can never learn something that I don't know about.\n\nThanks in advance","link":"https://www.designernews.co/stories/96166-as-a-product-designer-what-is-the-next-thing-that-youd-like-to-learn","comments":"https://www.designernews.co/stories/96166-as-a-product-designer-what-is-the-next-thing-that-youd-like-to-learn","updated_at":"2018-07-21T09:01:44+00:00","link_to_comments":"https://www.designernews.co/stories/96166-as-a-product-designer-what-is-the-next-thing-that-youd-like-to-learn","link_host":null,"from":"designernews"},{"title":"Microsoft Releases PowerShell Core for Linux as a Snap Package","description":"Microsoft's love for Linux continues… \n\nMicrosoft has released its command-line shell and scripting language PowerShell Core for Linux operating system as a Snap package, making it easier for Linux users to install Microsoft PowerShell on their system.\n\nYes, you heard me right.\n\nMicrosoft has made PowerShell Core available to the Ubuntu Snap Store as a Snap application.\n\nPowerShell Core is a<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=XfQZDoLaN78:-hbVPujniEI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/XfQZDoLaN78" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/XfQZDoLaN78/powershell-core-linux-snap.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XfQZDoLaN78/powershell-core-linux-snap.html","updated_at":"2018-07-20T19:27:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XfQZDoLaN78/powershell-core-linux-snap.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"AMA Design Lead Milan Moffatt from SuperHi","description":"Hi everyone! Excited for this AMA opportunity.\n\n**I'm Milan and I lead design at SuperHi, an online school for creatives that offers practical, learn-at-your-own-pace design and coding courses.**\n\nI’m happy to discuss and answer any questions you may have about...\n- SuperHi\n- Our courses\n- What it's like to lead design at a startup\n- Fostering an inclusive, diverse community\n- Portfolio questions\n- Anything design related. Branding, product, UX, visual, etc.\n- Lifting up women, POC and underrepresented communities in the tech industry\n- Working on a remote team. I live in NYC but we're a team distributed across the US, Canada and Europe.\n\nMy design tasks at SuperHi vary from marketing, web, UX, product, branding, and even working on our physical book and welcome package. I also produced and creative directed a photoshoot in London to get our brand photography you see on the site. We're also launching 5 new mini-courses in a couple months, and I'm creating and teaching our Intro to UX Design course. AMA!\n\n---\n\nAbout me: I studied Graphic Design and Japanese at Northeastern University in Boston, MA. I started my design career in Santiago, Chile, working on web design, a bit of front-end and branding for startups, individuals and local conferences. After that I worked in Brooklyn, NY at a small digital agency called Ronik Design for a couple years. I've also done freelance on and off between jobs.\n\nI joined SuperHi in July 2017, when we only had one course — Foundation HTML, CSS and Javascript. Now we have 5 courses total! \n- Foundation HTML, CSS and Javascript\n- Wordpress\n- Advanced HTML, CSS and Javascript\n- React.js\n- Ruby on Rails\n\nAll our courses are beginner to intermediate level. We're not an intense coding bootcamp — we believe in making learning accessible, practical and most importantly, fun! Our courses are tailored towards those in the creative industry, and we especially value design. You can check out the sites our students make here: https://www.superhi.com/hall-of-fame","link":"https://www.designernews.co/stories/96160-ama-design-lead-milan-moffatt-from-superhi","comments":"https://www.designernews.co/stories/96160-ama-design-lead-milan-moffatt-from-superhi","updated_at":"2018-07-20T16:59:11+00:00","link_to_comments":"https://www.designernews.co/stories/96160-ama-design-lead-milan-moffatt-from-superhi","link_host":null,"from":"designernews"},{"title":"Singapore's Largest Healthcare Group Hacked, 1.5 Million Patient Records Stolen","description":"Singapore's largest healthcare group, SingHealth, has suffered a massive data breach that allowed hackers to snatch personal information on 1.5 million patients who visited SingHealth clinics between May 2015 and July 2018.\n\nSingHealth is the largest healthcare group in Singapore with 2 tertiary hospitals, 5 national specialty , and eight polyclinics.\n\nAccording to an advisory released by<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=X05jevsYi94:mlV9weYU2RI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/X05jevsYi94" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/X05jevsYi94/singapore-healthcare-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/X05jevsYi94/singapore-healthcare-breach.html","updated_at":"2018-07-20T12:28:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/X05jevsYi94/singapore-healthcare-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Ownetic: a social platform for people with passion for collecting","description":"https://ownetic.com/","link":"https://www.designernews.co/stories/96154-ownetic-a-social-platform-for-people-with-passion-for-collecting","comments":"https://www.designernews.co/stories/96154-ownetic-a-social-platform-for-people-with-passion-for-collecting","updated_at":"2018-07-20T11:08:53+00:00","link_to_comments":"https://www.designernews.co/stories/96154-ownetic-a-social-platform-for-people-with-passion-for-collecting","link_host":"ownetic.com","from":"designernews"},{"title":"Chance The Rapper's album art in CSS","description":"https://codepen.io/wfendler/pen/ejBrqp","link":"https://www.designernews.co/stories/96148-chance-the-rappers-album-art-in-css","comments":"https://www.designernews.co/stories/96148-chance-the-rappers-album-art-in-css","updated_at":"2018-07-20T08:11:53+00:00","link_to_comments":"https://www.designernews.co/stories/96148-chance-the-rappers-album-art-in-css","link_host":"codepen.io","from":"designernews"},{"title":"Case Study Talk With Ales Nesetril","description":"https://www.casestudy.club/interviews/case-study-talk-with-ales-nesetril","link":"https://www.designernews.co/stories/96147-case-study-talk-with-ales-nesetril","comments":"https://www.designernews.co/stories/96147-case-study-talk-with-ales-nesetril","updated_at":"2018-07-20T07:10:32+00:00","link_to_comments":"https://www.designernews.co/stories/96147-case-study-talk-with-ales-nesetril","link_host":"www.casestudy.club","from":"designernews"},{"title":"I Found These 15 Mesmerizing Movie Website Designs & Ineractions for Inspiration","description":"https://www.behance.net/gallery/68079195/15-Mesmerizing-Movie-WebsiteDesign-Interactions-2018","link":"https://www.designernews.co/stories/96146-i-found-these-15-mesmerizing-movie-website-designs--ineractions-for-inspiration","comments":"https://www.designernews.co/stories/96146-i-found-these-15-mesmerizing-movie-website-designs--ineractions-for-inspiration","updated_at":"2018-07-20T05:43:37+00:00","link_to_comments":"https://www.designernews.co/stories/96146-i-found-these-15-mesmerizing-movie-website-designs--ineractions-for-inspiration","link_host":"www.behance.net","from":"designernews"},{"title":"Is your company looking for an intern?","description":"Disclaimer: Thought I'd give this a shot, and I apologize in advance if this is not allowed or breaks any rules.\n\nI'm curious if any of you or the companies you work for are looking for an intern (summer is almost over, but fall is just around the corner!)? I've become slightly demotivated over the past few months as I've received little to no feedback/response from internships I've applied to, so I'm trying my luck on DN. I'm a (junior level?) designer with a focus on digital product design, currently studying at Sacramento State in California. I'd love the opportunity to work alongside a creative team and build something special. \n\nAgain–just curious to see what's out there! Thanks for your time.\n\n\nBest,\nCameron\nhello@cjgetty.com","link":"https://www.designernews.co/stories/96144-is-your-company-looking-for-an-intern","comments":"https://www.designernews.co/stories/96144-is-your-company-looking-for-an-intern","updated_at":"2018-07-20T04:06:18+00:00","link_to_comments":"https://www.designernews.co/stories/96144-is-your-company-looking-for-an-intern","link_host":null,"from":"designernews"},{"title":"Microsoft Says Russia Tried to Hack Three 2018 Midterm Election Candidates","description":"Microsoft said it detected and helped the US government to block Russian hacking attempts against at least three congressional candidates this year, a Microsoft executive revealed speaking at the Aspen Security Forum today.\n\nAlthough the company refused to name the targets but said, the three candidates were "people who, because of their positions, might have been interesting targets from an<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=9tZbwPlluok:lAx4m_BAmsY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/9tZbwPlluok" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/9tZbwPlluok/russia-election-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/9tZbwPlluok/russia-election-hacking.html","updated_at":"2018-07-19T20:35:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/9tZbwPlluok/russia-election-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Would you want typefaces as gifts?","description":"https://www.producthunt.com/upcoming/my-type-wishlist","link":"https://www.designernews.co/stories/96136-would-you-want-typefaces-as-gifts","comments":"https://www.designernews.co/stories/96136-would-you-want-typefaces-as-gifts","updated_at":"2018-07-19T17:35:58+00:00","link_to_comments":"https://www.designernews.co/stories/96136-would-you-want-typefaces-as-gifts","link_host":"www.producthunt.com","from":"designernews"},{"title":"How we handle Kiwi.com design system with Figma","description":"https://rojcyk.com/blog/how-we-handle-kiwicom-design-system-with-figma/","link":"https://www.designernews.co/stories/96134-how-we-handle-kiwicom-design-system-with-figma","comments":"https://www.designernews.co/stories/96134-how-we-handle-kiwicom-design-system-with-figma","updated_at":"2018-07-19T16:40:35+00:00","link_to_comments":"https://www.designernews.co/stories/96134-how-we-handle-kiwicom-design-system-with-figma","link_host":"rojcyk.com","from":"designernews"},{"title":"James Haliburton, CEO of Topp on working in different cultural context and what it takes to create a successful international design agency.","description":"https://teamweek.com/blueprint-herding-cats-edition/james-haliburton.html","link":"https://www.designernews.co/stories/96132-james-haliburton-ceo-of-topp-on-working-in-different-cultural-context-and-what-it-takes-to-create-a-successful-international-design-agency","comments":"https://www.designernews.co/stories/96132-james-haliburton-ceo-of-topp-on-working-in-different-cultural-context-and-what-it-takes-to-create-a-successful-international-design-agency","updated_at":"2018-07-19T15:18:35+00:00","link_to_comments":"https://www.designernews.co/stories/96132-james-haliburton-ceo-of-topp-on-working-in-different-cultural-context-and-what-it-takes-to-create-a-successful-international-design-agency","link_host":"teamweek.com","from":"designernews"},{"title":"New Hulu","description":"https://new.hulu.com/","link":"https://www.designernews.co/stories/96130-new-hulu","comments":"https://www.designernews.co/stories/96130-new-hulu","updated_at":"2018-07-19T14:56:04+00:00","link_to_comments":"https://www.designernews.co/stories/96130-new-hulu","link_host":"new.hulu.com","from":"designernews"},{"title":"Does InVision Studio lag for anybody else really bad?","description":"I keep coming back to InVision Studio every now and again because I do actually want to use it for a more cohesive/streamlined workflow.\n\nJust updated to the latest version and I still get really bad lag. Even just dragging a 200x200 square on a completely blank artboard. It has to "catch up" with the cursor.\n\nI'm hoping (and guessing) I'm not the only one this happens to?\n\nI'm running it on a 5k 27" 2015 iMac. 3.2GHz Intel i5 with 16GB RAM and an AMD Radeon R9 graphics card.","link":"https://www.designernews.co/stories/96128-does-invision-studio-lag-for-anybody-else-really-bad","comments":"https://www.designernews.co/stories/96128-does-invision-studio-lag-for-anybody-else-really-bad","updated_at":"2018-07-19T14:52:38+00:00","link_to_comments":"https://www.designernews.co/stories/96128-does-invision-studio-lag-for-anybody-else-really-bad","link_host":null,"from":"designernews"},{"title":"Cyber Security Training Courses – CISA, CISM, CISSP Certifications","description":"Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks.\n\nWith more money at risk and data breaches at a rise, more certified cybersecurity experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves.\n\nThat's why jobs in the cybersecurity field have gone up 80% over the past three years than<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=7i6cfx_39D0:gLaKBgeZ700:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/7i6cfx_39D0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/7i6cfx_39D0/cyber-security-certification-training.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/7i6cfx_39D0/cyber-security-certification-training.html","updated_at":"2018-07-19T13:22:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/7i6cfx_39D0/cyber-security-certification-training.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Netflix TV Interface","description":"https://media.netflix.com/en/company-blog/see-whats-next-on-tv","link":"https://www.designernews.co/stories/96116-new-netflix-tv-interface","comments":"https://www.designernews.co/stories/96116-new-netflix-tv-interface","updated_at":"2018-07-19T11:48:56+00:00","link_to_comments":"https://www.designernews.co/stories/96116-new-netflix-tv-interface","link_host":"media.netflix.com","from":"designernews"},{"title":"Email Design Teardown – Drift","description":"https://www.gethighlights.co/blog/email-marketing-teardown-drift/","link":"https://www.designernews.co/stories/96111-email-design-teardown--drift","comments":"https://www.designernews.co/stories/96111-email-design-teardown--drift","updated_at":"2018-07-19T09:16:27+00:00","link_to_comments":"https://www.designernews.co/stories/96111-email-design-teardown--drift","link_host":"www.gethighlights.co","from":"designernews"},{"title":"Jason Shellen — { Designer To Entrepreneur Journey }","description":"https://phase.com/magazine/jason-shellen-designer-to-entrepreneur-journey/","link":"https://www.designernews.co/stories/96106-jason-shellen---designer-to-entrepreneur-journey-","comments":"https://www.designernews.co/stories/96106-jason-shellen---designer-to-entrepreneur-journey-","updated_at":"2018-07-19T08:30:07+00:00","link_to_comments":"https://www.designernews.co/stories/96106-jason-shellen---designer-to-entrepreneur-journey-","link_host":"phase.com","from":"designernews"},{"title":"How to “Remote User Test”","description":"https://www.jotform.com/blog/how-to-remote-user-test/","link":"https://www.designernews.co/stories/96104-how-to-remote-user-test","comments":"https://www.designernews.co/stories/96104-how-to-remote-user-test","updated_at":"2018-07-19T06:42:21+00:00","link_to_comments":"https://www.designernews.co/stories/96104-how-to-remote-user-test","link_host":"www.jotform.com","from":"designernews"},{"title":"Apple Transfers Chinese Users' iCloud Data to State-Controlled Data Centers","description":"There's terrible news for Apple users in China.\n\nApple's Chinese data center partner has transferred iCloud data, belonging to 130 million China-based users, to a cloud storage service managed by a state-owned mobile telecom provider—raising concerns about privacy.\n\nBack in February this year, Apple moved the encryption keys and data of its Chinese iCloud users from its US servers to local<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=-zaE5VVz02c:-heVP2DKhO8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-zaE5VVz02c" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-zaE5VVz02c/apple-china-icloud-data.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-zaE5VVz02c/apple-china-icloud-data.html","updated_at":"2018-07-18T16:01:52+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-zaE5VVz02c/apple-china-icloud-data.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"EU Fines Google Record $5 Billion in Android Antitrust Case","description":"Google has been hit by a record-breaking $5 billion antitrust fine by the European Union regulators for abusing the dominance of its Android mobile operating system and thwarting competitors.\n\nThat's the largest ever antitrust penalty.\n\nThough Android is an open-source and free operating system, device manufacturers still have to obtain a license, with certain conditions, from Google to<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=wPtzmLfAdNU:4M1tLb6LKoo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/wPtzmLfAdNU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/wPtzmLfAdNU/google-android-antitrust-fine.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wPtzmLfAdNU/google-android-antitrust-fine.html","updated_at":"2018-07-18T13:37:43+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wPtzmLfAdNU/google-android-antitrust-fine.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services","description":"Microsoft today launched a new bug bounty program for bug hunters and researchers finding security vulnerabilities in its "identity services."\n\nHacking into networks and stealing data have become common and easier than ever but not all data holds the same business value or carries the same risk.\n\nSince new security today depends on the collaborative communication of identities and identity data<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=1XjctJrJQ-0:iWjQ0MrTNLU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1XjctJrJQ-0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1XjctJrJQ-0/microsoft-bug-bounty.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1XjctJrJQ-0/microsoft-bug-bounty.html","updated_at":"2018-07-18T08:46:48+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1XjctJrJQ-0/microsoft-bug-bounty.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"BTC-e Operator, Accused of Laundering $4 Billion, to be Extradited to France","description":"In a legal extradition tug-of-war between the United States and Russia, it seems France has won the game, surprisingly.\n\nA Greek court has ruled to extradite the Russian cybercrime suspect and the former operator of now-defunct BTC-e crypto exchange to France, instead of the United States or to his native Russia, according to multiple Russian news outlets.\n\nAlexander Vinnik, 38, has been<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=RKOjyMzABD4:wAJNpODbSPM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/RKOjyMzABD4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/RKOjyMzABD4/alexander-vinnik-btc.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RKOjyMzABD4/alexander-vinnik-btc.html","updated_at":"2018-07-17T14:43:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RKOjyMzABD4/alexander-vinnik-btc.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"21-Year-Old Woman Charged With Hacking Selena Gomez's Email Account","description":"A 21-year-old New Jersey woman has been charged with hacking into the email accounts of pop star and actress Selena Gomez, stealing her personal photos, and then leaked them to the Internet.\n\nSusan Atrach of Ridgefield Park was charged Thursday with 11 felony counts—five counts of identity theft, five counts of accessing and using computer data to commit fraud or illegally obtain money,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=MzWkvGoGg4I:l1ULN4dZdJw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/MzWkvGoGg4I" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/MzWkvGoGg4I/selena-gomez-email-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/MzWkvGoGg4I/selena-gomez-email-hacking.html","updated_at":"2018-07-17T13:18:07+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/MzWkvGoGg4I/selena-gomez-email-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"21-Year-Old Creator of LuminosityLink Hacking Tool Pleads Guilty","description":"As it was speculated that the author of LuminosityLink RAT was arrested last year, a plea agreement made available to the public today confirmed the news.\n\nBack in September last year, Europol’s European Cybercrime Centre (EC3) and National Crime Agency began the crackdown on the LuminosityLink RAT, targeting sellers and users of the malware, which resulted in the seizure of a considerable<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=LNZpk02cKFM:FC2KTKQoRmM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/LNZpk02cKFM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/LNZpk02cKFM/luminositylink-hacking-tool.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/LNZpk02cKFM/luminositylink-hacking-tool.html","updated_at":"2018-07-17T09:51:57+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/LNZpk02cKFM/luminositylink-hacking-tool.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"12 Russian Intelligence Agents Indicted For Hacking DNC Emails","description":"The US Justice Department has announced criminal indictments against 12 Russian intelligence officers tied to the hack of the Democratic National Committee (DNC) during the 2016 US presidential election campaign.\n\nThe charges were drawn up as part of the investigation of Russian interference in the 2016 US presidential election by Robert Mueller, the Special Counsel, and former FBI director.<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=hO5OQNbiYWU:ULHTFsNqTsQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/hO5OQNbiYWU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/hO5OQNbiYWU/russian-dnc-hack-trump.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hO5OQNbiYWU/russian-dnc-hack-trump.html","updated_at":"2018-07-15T07:49:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/hO5OQNbiYWU/russian-dnc-hack-trump.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Used Malicious MDM Solution to Spy On 'Highly Targeted' iPhone Users","description":"Security researchers have uncovered a "highly targeted" mobile malware campaign that has been operating since August 2015 and found spying on 13 selected iPhones in India.\n\nThe attackers, who are also believed to be operating from India, were found abusing mobile device management (MDM) protocol—a type of security software used by large enterprises to control and enforce policies on devices<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=V_lSumgYSq8:F8WiRHafQTc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/V_lSumgYSq8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/V_lSumgYSq8/mobile-device-management-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/V_lSumgYSq8/mobile-device-management-hacking.html","updated_at":"2018-07-13T11:01:57+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/V_lSumgYSq8/mobile-device-management-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft offers extended support for Windows, SQL 2008—but with a catch","description":"An extra three years of patches are being offered to in-cloud users.","link":"https://arstechnica.com/?p=1342759","comments":"https://arstechnica.com/?p=1342759","updated_at":"2018-07-12T22:06:08+00:00","link_to_comments":"https://arstechnica.com/?p=1342759","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google Enables 'Site Isolation' Feature By Default For Chrome Desktop Users","description":"Google has by default enabled a security feature called "Site Isolation" in its web browser with the release of Chrome 67 for all desktop users to help them protect against many online threats, including Spectre and Meltdown attack.\n\nSite Isolation is a feature of the Google Chrome web browser that adds an additional security boundary between websites by ensuring that different sites are always<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=sLVebFPXUYw:CwFqelKmrDo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/sLVebFPXUYw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/sLVebFPXUYw/google-chrome-site-isolation.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sLVebFPXUYw/google-chrome-site-isolation.html","updated_at":"2018-07-12T14:57:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sLVebFPXUYw/google-chrome-site-isolation.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hacker Sold Stolen U.S. Military Drone Documents On Dark Web For Just $200","description":"You never know what you will find on the hidden Internet 'Dark Web.'\n\nJust about an hour ago we reported about someone selling remote access linked to security systems at a major International airport for $10.\n\nIt has been reported that a hacker was found selling sensitive US Air Force documents on the dark web for between $150 and $200.\n&lt;!-- adsense --&gt;\nCybercrime tracker Recorded Future today<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=a2Mutl_JIGs:sJpaytRl9no:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/a2Mutl_JIGs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/a2Mutl_JIGs/dark-web-military-drone_11.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/a2Mutl_JIGs/dark-web-military-drone_11.html","updated_at":"2018-07-11T20:33:17+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/a2Mutl_JIGs/dark-web-military-drone_11.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hacker Puts Airport's Security System Access On Dark Web Sale For Just $10","description":"If you can't find it on Google, you will definitely find it on the Dark Web.\n\nBlack markets on the Dark web are not known for just buying drugs, it is a massive hidden network where you can buy pretty much anything you can imagine—from pornography, weapon, and counterfeit currencies, to hacking tools, exploits, malware, and zero-days.\n\nOne such type of underground marketplace on Dark Web is<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=8E4IWOBtlSA:ceRui03oMDs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8E4IWOBtlSA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/8E4IWOBtlSA/rdp-shop-dark-web.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8E4IWOBtlSA/rdp-shop-dark-web.html","updated_at":"2018-07-11T19:23:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/8E4IWOBtlSA/rdp-shop-dark-web.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Facebook Faces £500,000 Fine in U.K. Over Cambridge Analytica Leak","description":"Facebook has been fined £500,000 ($664,000) in the U.K. after the country's data protection watchdog concluded that its data-sharing scandal broke the law, making it as the social network's first fine over the Cambridge Analytica scandal.\n\nYes, £500,000—that's the maximum fine allowed by the UK's Data Protection Act 1998, and equals to what Facebook earns every 8 minutes.\n\nFacebook has been<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=_GrW-azk3jQ:tiyqHuBohfs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_GrW-azk3jQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_GrW-azk3jQ/facebook-cambridge-analytica.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_GrW-azk3jQ/facebook-cambridge-analytica.html","updated_at":"2018-07-11T15:33:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_GrW-azk3jQ/facebook-cambridge-analytica.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Two New Spectre-Class CPU Flaws Discovered—Intel Pays $100K Bounty","description":"Intel has paid out a $100,000 bug bounty for new processor vulnerabilities that are related to Spectre variant one (CVE-2017-5753).\n\nThe new Spectre-class variants are tracked as Spectre 1.1 (CVE-2018-3693) and Spectre 1.2, of which Spectre 1.1 described as a bounds-check bypass store attack has been considered as more dangerous.\n\nEarlier this year, Google Project Zero researchers disclosed<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=wb3Ok9S8ct0:6iwS1IJkITc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/wb3Ok9S8ct0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/wb3Ok9S8ct0/intel-spectre-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wb3Ok9S8ct0/intel-spectre-vulnerability.html","updated_at":"2018-07-11T11:45:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wb3Ok9S8ct0/intel-spectre-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Malicious Software Packages Found On Arch Linux User Repository","description":"Yet another incident which showcases that you should not explicitly trust user-controlled software repositories.\n\nOne of the most popular Linux distros Arch Linux has pulled as many as three user-maintained software repository AUR packages after it was found hosting malicious code.\n\nArch Linux is an independently developed, general-purpose GNU/Linux distribution composed predominantly of free<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=oDM7cZt_leo:9B0XmR4bzFs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/oDM7cZt_leo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/oDM7cZt_leo/arch-linux-aur-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/oDM7cZt_leo/arch-linux-aur-malware.html","updated_at":"2018-07-11T08:56:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/oDM7cZt_leo/arch-linux-aur-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Spectre-like attack uses speculative execution to overflow buffers","description":"Research is continuing to find new attack vectors.","link":"https://arstechnica.com/?p=1341201","comments":"https://arstechnica.com/?p=1341201","updated_at":"2018-07-10T21:00:18+00:00","link_to_comments":"https://arstechnica.com/?p=1341201","link_host":"arstechnica.com","from":"arssecurity"},{"title":"USB Accessory Can Defeat iOS's New \"USB Restricted Mode\" Security Feature","description":"With the release of iOS 11.4.1, Apple has finally rolled out a new security feature designed to protect your devices against USB accessories that connect to the data port, making it harder for law enforcement and hackers to break into your iPhone or iPad without your permission.\n\nDubbed USB Restricted Mode, the feature automatically disables data connection capabilities of the Lightning port on<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=wizmIc1Gb6U:uu90PvKeMTU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/wizmIc1Gb6U" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/wizmIc1Gb6U/bypass-ios-usb-restricted-mode.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wizmIc1Gb6U/bypass-ios-usb-restricted-mode.html","updated_at":"2018-07-10T18:58:31+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/wizmIc1Gb6U/bypass-ios-usb-restricted-mode.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Releases Patch Updates for 53 Vulnerabilities In Its Software","description":"It's time to gear up your systems and software for the latest July 2018 Microsoft security patch updates.\n\nMicrosoft today released security patch updates for 53 vulnerabilities, affecting Windows, Internet Explorer (IE), Edge, ChakraCore, .NET Framework, ASP.NET, PowerShell, Visual Studio, and Microsoft Office and Office Services, and Adobe Flash Player.\n\nOut of 53 vulnerabilities, 17 are<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=BKENfZymqKo:rnUhbHQ167Q:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/BKENfZymqKo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/BKENfZymqKo/microsoft-security-patch-update.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BKENfZymqKo/microsoft-security-patch-update.html","updated_at":"2018-07-10T18:53:22+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/BKENfZymqKo/microsoft-security-patch-update.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Adobe Releases Security Patch Updates For 112 Vulnerabilities","description":"Adobe has released security patches for a total 112 vulnerabilities in its products, most of which have a higher risk of being exploited.\n\nThe vulnerabilities addressed in this month's patch Tuesday affect Adobe Flash Player, Adobe Experience Manager, Adobe Connect, Adobe Acrobat, and Reader.\n\nNone of the security vulnerabilities patched this month were either publicly disclosed or found being<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=sfeP607uyFs:cy7bF4glX-4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/sfeP607uyFs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/sfeP607uyFs/adobe-patch-update-july.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sfeP607uyFs/adobe-patch-update-july.html","updated_at":"2018-07-10T17:24:10+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sfeP607uyFs/adobe-patch-update-july.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Gaza Cybergang Returns With New Attacks On Palestinian Authority","description":"Security researchers from Check Point Threat Intelligence Team have discovered the comeback of an APT (advanced persistent threat) surveillance group targeting institutions across the Middle East, specifically the Palestinian Authority.\n\nThe attack, dubbed "Big Bang," begins with a phishing email sent to targeted victims that includes an attachment of a self-extracting archive containing two<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=XrsbE70-r8A:C4eZVPgTrSQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/XrsbE70-r8A" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/XrsbE70-r8A/gaza-palestin-hacker.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XrsbE70-r8A/gaza-palestin-hacker.html","updated_at":"2018-07-10T14:30:53+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XrsbE70-r8A/gaza-palestin-hacker.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hyperthreading under scrutiny with new TLBleed crypto key leak","description":"A new attack prompted OpenBSD's developers to disable hyperthreading by default.","link":"https://arstechnica.com/?p=1336327","comments":"https://arstechnica.com/?p=1336327","updated_at":"2018-06-25T22:18:00+00:00","link_to_comments":"https://arstechnica.com/?p=1336327","link_host":"arstechnica.com","from":"arssecurity"},{"title":"A host of new security enhancements is coming to iOS and macOS","description":"Coming: FaceTime encryption, protected cam access, and, possibly, USB Restricted Mode.","link":"https://arstechnica.com/?p=1320893","comments":"https://arstechnica.com/?p=1320893","updated_at":"2018-06-05T00:10:07+00:00","link_to_comments":"https://arstechnica.com/?p=1320893","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New speculative-execution vulnerability strikes AMD, ARM, and Intel","description":"Fortunately, existing fixes should provide the protection we need.","link":"https://arstechnica.com/?p=1312715","comments":"https://arstechnica.com/?p=1312715","updated_at":"2018-05-22T16:24:09+00:00","link_to_comments":"https://arstechnica.com/?p=1312715","link_host":"arstechnica.com","from":"arssecurity"},{"title":"As the Web moves toward HTTPS by default, Chrome will remove “secure” indicator","description":"The browser is changing to flag the things that are dangerous, not the ones that are safe.","link":"https://arstechnica.com/?p=1310651","comments":"https://arstechnica.com/?p=1310651","updated_at":"2018-05-17T18:46:49+00:00","link_to_comments":"https://arstechnica.com/?p=1310651","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft claims to make Chrome safer with new extension","description":"A purported Edge advantage is now available in Chrome.","link":"https://arstechnica.com/?p=1295205","comments":"https://arstechnica.com/?p=1295205","updated_at":"2018-04-18T15:12:54+00:00","link_to_comments":"https://arstechnica.com/?p=1295205","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel, Microsoft to use GPU to scan memory for malware","description":"The company is also using its processors’ performance monitoring to detect malicious code.","link":"https://arstechnica.com/?p=1294013","comments":"https://arstechnica.com/?p=1294013","updated_at":"2018-04-17T03:00:10+00:00","link_to_comments":"https://arstechnica.com/?p=1294013","link_host":"arstechnica.com","from":"arssecurity"},{"title":"AMD systems gain Spectre protection with latest Windows fixes","description":"Systems will still need updated firmware to get the latest microcode, however.","link":"https://arstechnica.com/?p=1291707","comments":"https://arstechnica.com/?p=1291707","updated_at":"2018-04-11T16:32:56+00:00","link_to_comments":"https://arstechnica.com/?p=1291707","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Practical passwordless authentication comes a step closer with WebAuthn","description":"Microsoft, Mozilla, and Google are all implementing the new standard.","link":"https://arstechnica.com/?p=1291003","comments":"https://arstechnica.com/?p=1291003","updated_at":"2018-04-10T18:48:13+00:00","link_to_comments":"https://arstechnica.com/?p=1291003","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel drops plans to develop Spectre microcode for ancient chips","description":"Company claims it's too hard, and few systems have exposure to attack.","link":"https://arstechnica.com/?p=1288023","comments":"https://arstechnica.com/?p=1288023","updated_at":"2018-04-04T17:35:04+00:00","link_to_comments":"https://arstechnica.com/?p=1288023","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google bans cryptomining Chrome extensions because they refuse to play by the rules","description":"Google continues to try to keep its browser running smoothly in spite of others’ efforts.","link":"https://arstechnica.com/?p=1287415","comments":"https://arstechnica.com/?p=1287415","updated_at":"2018-04-03T20:56:08+00:00","link_to_comments":"https://arstechnica.com/?p=1287415","link_host":"arstechnica.com","from":"arssecurity"},{"title":"As predicted, more branch prediction processor attacks are discovered","description":"New attack focuses on a different part of the branch prediction system.","link":"https://arstechnica.com/?p=1282101","comments":"https://arstechnica.com/?p=1282101","updated_at":"2018-03-26T22:15:55+00:00","link_to_comments":"https://arstechnica.com/?p=1282101","link_host":"arstechnica.com","from":"arssecurity"},{"title":"AMD promises firmware fixes for security processor bugs","description":"All bugs require administrative access to exploit.","link":"https://arstechnica.com/?p=1279147","comments":"https://arstechnica.com/?p=1279147","updated_at":"2018-03-20T22:00:09+00:00","link_to_comments":"https://arstechnica.com/?p=1279147","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel outlines plans for Meltdown and Spectre fixes, microcode for older chips","description":"Microcodes for Sandy Bridge and newer are now available.","link":"https://arstechnica.com/?p=1275921","comments":"https://arstechnica.com/?p=1275921","updated_at":"2018-03-15T18:00:16+00:00","link_to_comments":"https://arstechnica.com/?p=1275921","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Patch Tuesday drops the mandatory antivirus requirement after all","description":"Today’s patches also include an annoying-looking remote code execution bug.","link":"https://arstechnica.com/?p=1274895","comments":"https://arstechnica.com/?p=1274895","updated_at":"2018-03-13T20:35:18+00:00","link_to_comments":"https://arstechnica.com/?p=1274895","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel’s latest set of Spectre microcode fixes is coming to a Windows update","description":"Windows users will no longer be beholden to their motherboard makers.","link":"https://arstechnica.com/?p=1268031","comments":"https://arstechnica.com/?p=1268031","updated_at":"2018-03-01T18:14:43+00:00","link_to_comments":"https://arstechnica.com/?p=1268031","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel ships (hopefully stable) microcode for Skylake, Kaby Lake, Coffee Lake","description":"All 6th, 7th, and 8th generation Core processors now have microcode available.","link":"https://arstechnica.com/?p=1263653","comments":"https://arstechnica.com/?p=1263653","updated_at":"2018-02-21T19:03:33+00:00","link_to_comments":"https://arstechnica.com/?p=1263653","link_host":"arstechnica.com","from":"arssecurity"},{"title":"32 lawsuits filed against Intel over Spectre and Meltdown flaws","description":"Company also accused of failing to act in response to insider trading.","link":"https://arstechnica.com/?p=1261759","comments":"https://arstechnica.com/?p=1261759","updated_at":"2018-02-16T20:42:57+00:00","link_to_comments":"https://arstechnica.com/?p=1261759","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows Defender Advanced Threat Protection coming to Windows 7 and 8.1","description":"A Windows 10 feature is coming to old platforms.","link":"https://arstechnica.com/?p=1258447","comments":"https://arstechnica.com/?p=1258447","updated_at":"2018-02-12T17:19:15+00:00","link_to_comments":"https://arstechnica.com/?p=1258447","link_host":"arstechnica.com","from":"arssecurity"}]