[{"title":"Creating A Bootable Usb On Linux","link":"https://www.reddit.com/r/programming/comments/8kvjk5/creating_a_bootable_usb_on_linux/","comments":"https://www.reddit.com/r/programming/comments/8kvjk5/creating_a_bootable_usb_on_linux/","updated_at":"2018-05-20T21:04:34+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kvjk5/creating_a_bootable_usb_on_linux/","link_host":"reddit.com","from":"reddit"},{"title":"Make code copying easier with :before #css","link":"https://www.reddit.com/r/programming/comments/8kvi4d/make_code_copying_easier_with_before_css/","comments":"https://www.reddit.com/r/programming/comments/8kvi4d/make_code_copying_easier_with_before_css/","updated_at":"2018-05-20T20:59:00+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kvi4d/make_code_copying_easier_with_before_css/","link_host":"reddit.com","from":"reddit"},{"title":"How Can We Stop Being Treated Like \"Code Monkeys\"?","link":"https://www.reddit.com/r/programming/comments/8kvgam/how_can_we_stop_being_treated_like_code_monkeys/","comments":"https://www.reddit.com/r/programming/comments/8kvgam/how_can_we_stop_being_treated_like_code_monkeys/","updated_at":"2018-05-20T20:51:15+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kvgam/how_can_we_stop_being_treated_like_code_monkeys/","link_host":"reddit.com","from":"reddit"},{"title":"The making of Lemmings","description":"<a href="https://news.ycombinator.com/item?id=17114563">Comments</a>","link":"https://readonlymemory.vg/the-making-of-lemmings/","comments":"https://news.ycombinator.com/item?id=17114563","updated_at":"2018-05-20T20:20:59+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17114563","link_host":"readonlymemory.vg","from":"hackernews"},{"title":"The Reactive Engine, A. C. Kay 1969","description":"<a href="https://news.ycombinator.com/item?id=17114555">Comments</a>","link":"http://www.chilton-computing.org.uk/inf/pdfs/kay.htm","comments":"https://news.ycombinator.com/item?id=17114555","updated_at":"2018-05-20T20:19:57+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17114555","link_host":"www.chiltoncomputing.org.uk","from":"hackernews"},{"title":"Real-time Sudoku Solver using OpenCV​ and Deep learning","link":"https://www.reddit.com/r/programming/comments/8kv82e/realtime_sudoku_solver_using_opencv_and_deep/","comments":"https://www.reddit.com/r/programming/comments/8kv82e/realtime_sudoku_solver_using_opencv_and_deep/","updated_at":"2018-05-20T20:17:29+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kv82e/realtime_sudoku_solver_using_opencv_and_deep/","link_host":"reddit.com","from":"reddit"},{"title":"Razorpay Is Hiring Infrastructure / Devops Engineers in Bangalore","description":"<a href="https://news.ycombinator.com/item?id=17114546">Comments</a>","link":"https://news.ycombinator.com/item?id=17114546","comments":"https://news.ycombinator.com/item?id=17114546","updated_at":"2018-05-20T20:16:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17114546","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Legal row over who owns France.com domain","description":"<a href="https://news.ycombinator.com/item?id=17114539">Comments</a>","link":"http://www.bbc.co.uk/news/technology-43949289","comments":"https://news.ycombinator.com/item?id=17114539","updated_at":"2018-05-20T20:14:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17114539","link_host":"www.bbc.co.uk","from":"hackernews"},{"title":"Europe’s open-access drive escalates as university stand-offs spread","description":"<a href="https://news.ycombinator.com/item?id=17114510">Comments</a>","link":"https://www.nature.com/articles/d41586-018-05191-0","comments":"https://news.ycombinator.com/item?id=17114510","updated_at":"2018-05-20T20:06:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17114510","link_host":"www.nature.com","from":"hackernews"},{"title":"Google's Rules of Machine Learning","description":"<a href="https://news.ycombinator.com/item?id=17114468">Comments</a>","link":"https://developers.google.com/machine-learning/rules-of-ml/","comments":"https://news.ycombinator.com/item?id=17114468","updated_at":"2018-05-20T19:55:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17114468","link_host":"developers.google.com","from":"hackernews"},{"title":"If Haskell is so great, why hasn't it taken over the world?","description":"<a href="https://news.ycombinator.com/item?id=17114308">Comments</a>","link":"https://pchiusano.github.io/2017-01-20/why-not-haskell.html","comments":"https://news.ycombinator.com/item?id=17114308","updated_at":"2018-05-20T19:15:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17114308","link_host":"pchiusano.github.io","from":"hackernews"},{"title":"Learn to love your bad ideas","description":"https://studiofellow.com/articles/learn-love-bad-ideas/","link":"https://www.designernews.co/stories/94540-learn-to-love-your-bad-ideas","comments":"https://www.designernews.co/stories/94540-learn-to-love-your-bad-ideas","updated_at":"2018-05-20T18:35:06+00:00","link_to_comments":"https://www.designernews.co/stories/94540-learn-to-love-your-bad-ideas","link_host":"studiofellow.com","from":"designernews"},{"title":"Staying focused won’t make you a productive programmer","link":"https://www.reddit.com/r/programming/comments/8kuhcp/staying_focused_wont_make_you_a_productive/","comments":"https://www.reddit.com/r/programming/comments/8kuhcp/staying_focused_wont_make_you_a_productive/","updated_at":"2018-05-20T18:28:39+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kuhcp/staying_focused_wont_make_you_a_productive/","link_host":"reddit.com","from":"reddit"},{"title":"The Ogler’s Guide to Shibuya, Tokyo","description":"<a href="https://news.ycombinator.com/item?id=17113967">Comments</a>","link":"https://atzerothorder.wordpress.com/2018/05/15/the-oglers-guide-to-shibuya-tokyo/","comments":"https://news.ycombinator.com/item?id=17113967","updated_at":"2018-05-20T17:58:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17113967","link_host":"atzerothorder.wordpress.com","from":"hackernews"},{"title":"Death of a Biohacker","description":"<a href="https://news.ycombinator.com/item?id=17113957">Comments</a>","link":"https://www.nytimes.com/2018/05/19/style/biohacker-death-aaron-traywick.html","comments":"https://news.ycombinator.com/item?id=17113957","updated_at":"2018-05-20T17:56:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17113957","link_host":"www.nytimes.com","from":"hackernews"},{"title":"The Stunning, Sacred Retreats of California (2013)","description":"<a href="https://news.ycombinator.com/item?id=17113920">Comments</a>","link":"https://mobile.nytimes.com/2013/10/04/t-magazine/the-stunning-sacred-retreats-of-california.html","comments":"https://news.ycombinator.com/item?id=17113920","updated_at":"2018-05-20T17:48:53+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17113920","link_host":"mobile.nytimes.com","from":"hackernews"},{"title":"Metrics with Spring Boot 2.0 - Counters and gauges","link":"https://www.reddit.com/r/programming/comments/8ku5qo/metrics_with_spring_boot_20_counters_and_gauges/","comments":"https://www.reddit.com/r/programming/comments/8ku5qo/metrics_with_spring_boot_20_counters_and_gauges/","updated_at":"2018-05-20T17:41:31+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ku5qo/metrics_with_spring_boot_20_counters_and_gauges/","link_host":"reddit.com","from":"reddit"},{"title":"Let's make a perfect AI for Tic-Tac-Toe! [VOICE]","link":"https://www.reddit.com/r/programming/comments/8ktwnp/lets_make_a_perfect_ai_for_tictactoe_voice/","comments":"https://www.reddit.com/r/programming/comments/8ktwnp/lets_make_a_perfect_ai_for_tictactoe_voice/","updated_at":"2018-05-20T17:04:36+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ktwnp/lets_make_a_perfect_ai_for_tictactoe_voice/","link_host":"reddit.com","from":"reddit"},{"title":"Fault attacks on secure chips: from glitch to flash (2011) [pdf]","description":"<a href="https://news.ycombinator.com/item?id=17113364">Comments</a>","link":"https://www.cl.cam.ac.uk/~sps32/ECRYPT2011_1.pdf","comments":"https://news.ycombinator.com/item?id=17113364","updated_at":"2018-05-20T16:04:38+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17113364","link_host":"www.cl.cam.ac.uk","from":"hackernews"},{"title":"Automate All the Things","link":"https://www.reddit.com/r/programming/comments/8ktc91/automate_all_the_things/","comments":"https://www.reddit.com/r/programming/comments/8ktc91/automate_all_the_things/","updated_at":"2018-05-20T15:36:30+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ktc91/automate_all_the_things/","link_host":"reddit.com","from":"reddit"},{"title":"CSCI E-23a: Introduction to Game Development","description":"<a href="https://news.ycombinator.com/item?id=17113112">Comments</a>","link":"https://cs50.github.io/games/","comments":"https://news.ycombinator.com/item?id=17113112","updated_at":"2018-05-20T15:21:12+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17113112","link_host":"cs50.github.io","from":"hackernews"},{"title":"Angr – A powerful and user-friendly binary analysis platform","description":"<a href="https://news.ycombinator.com/item?id=17112998">Comments</a>","link":"https://github.com/angr/angr","comments":"https://news.ycombinator.com/item?id=17112998","updated_at":"2018-05-20T15:02:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112998","link_host":"github.com","from":"hackernews"},{"title":"Ten Years of Vim","link":"https://www.reddit.com/r/programming/comments/8ksxqn/ten_years_of_vim/","comments":"https://www.reddit.com/r/programming/comments/8ksxqn/ten_years_of_vim/","updated_at":"2018-05-20T14:29:29+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ksxqn/ten_years_of_vim/","link_host":"reddit.com","from":"reddit"},{"title":"Selenium Mobile JSON Wire Protocol Specification","description":"<a href="https://news.ycombinator.com/item?id=17112822">Comments</a>","link":"https://github.com/SeleniumHQ/mobile-spec/blob/master/spec-draft.md","comments":"https://news.ycombinator.com/item?id=17112822","updated_at":"2018-05-20T14:26:32+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112822","link_host":"github.com","from":"hackernews"},{"title":"Explaining pattern matching, filter and map in Haskell by solving a HackerRank problem -- HaskellRank Ep.03","link":"https://www.reddit.com/r/programming/comments/8ksvh7/explaining_pattern_matching_filter_and_map_in/","comments":"https://www.reddit.com/r/programming/comments/8ksvh7/explaining_pattern_matching_filter_and_map_in/","updated_at":"2018-05-20T14:18:30+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ksvh7/explaining_pattern_matching_filter_and_map_in/","link_host":"reddit.com","from":"reddit"},{"title":"Gojay – Highly performant JSON encoder/decoder for Golang","description":"<a href="https://news.ycombinator.com/item?id=17112747">Comments</a>","link":"https://github.com/francoispqt/gojay","comments":"https://news.ycombinator.com/item?id=17112747","updated_at":"2018-05-20T14:08:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112747","link_host":"github.com","from":"hackernews"},{"title":"Getting 1Password 7 ready for the Mac App Store","description":"<a href="https://news.ycombinator.com/item?id=17112670">Comments</a>","link":"https://blog.agilebits.com/2018/05/10/getting-1password-7-ready-for-the-mac-app-store/","comments":"https://news.ycombinator.com/item?id=17112670","updated_at":"2018-05-20T13:53:28+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112670","link_host":"blog.agilebits.com","from":"hackernews"},{"title":"The Physics and Physicality of Extreme Juggling","description":"<a href="https://news.ycombinator.com/item?id=17112612">Comments</a>","link":"https://www.wired.com/story/the-physicsand-physicalityof-extreme-juggling/","comments":"https://news.ycombinator.com/item?id=17112612","updated_at":"2018-05-20T13:37:44+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112612","link_host":"www.wired.com","from":"hackernews"},{"title":"Abusing Proxies for DSLs","description":"<a href="https://news.ycombinator.com/item?id=17112496">Comments</a>","link":"https://mcluck90.github.io/abusing-proxies-for-dsls/","comments":"https://news.ycombinator.com/item?id=17112496","updated_at":"2018-05-20T12:51:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112496","link_host":"mcluck90.github.io","from":"hackernews"},{"title":"A space ant fires its lasers","description":"<a href="https://news.ycombinator.com/item?id=17112463">Comments</a>","link":"https://www.esa.int/Our_Activities/Space_Science/Herschel/A_space_ant_fires_its_lasers","comments":"https://news.ycombinator.com/item?id=17112463","updated_at":"2018-05-20T12:38:22+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112463","link_host":"www.esa.int","from":"hackernews"},{"title":"CocoaPods Tutorial for Swift: Getting Started","link":"https://www.reddit.com/r/programming/comments/8ksbq4/cocoapods_tutorial_for_swift_getting_started/","comments":"https://www.reddit.com/r/programming/comments/8ksbq4/cocoapods_tutorial_for_swift_getting_started/","updated_at":"2018-05-20T12:32:24+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ksbq4/cocoapods_tutorial_for_swift_getting_started/","link_host":"reddit.com","from":"reddit"},{"title":"How to use Webpack and React with Phoenix 1.3","link":"https://www.reddit.com/r/programming/comments/8ks7uv/how_to_use_webpack_and_react_with_phoenix_13/","comments":"https://www.reddit.com/r/programming/comments/8ks7uv/how_to_use_webpack_and_react_with_phoenix_13/","updated_at":"2018-05-20T12:08:58+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ks7uv/how_to_use_webpack_and_react_with_phoenix_13/","link_host":"reddit.com","from":"reddit"},{"title":"A ten-hour codewalk through the CPython internals (2016)","description":"<a href="https://news.ycombinator.com/item?id=17112386">Comments</a>","link":"http://pgbovine.net/cpython-internals.htm","comments":"https://news.ycombinator.com/item?id=17112386","updated_at":"2018-05-20T12:05:24+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112386","link_host":"pgbovine.net","from":"hackernews"},{"title":"The Markov Property, Chain, Reward Process and Decision Process","description":"<a href="https://news.ycombinator.com/item?id=17112302">Comments</a>","link":"https://xaviergeerinck.com/markov-property-chain-reward-decision","comments":"https://news.ycombinator.com/item?id=17112302","updated_at":"2018-05-20T11:36:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112302","link_host":"xaviergeerinck.com","from":"hackernews"},{"title":"Oceangoing robots that could revolutionize fishing, drilling, and science","description":"<a href="https://news.ycombinator.com/item?id=17112298">Comments</a>","link":"https://www.bloomberg.com/news/features/2018-05-15/this-man-is-building-an-armada-of-saildrones-to-conquer-the-ocean","comments":"https://news.ycombinator.com/item?id=17112298","updated_at":"2018-05-20T11:34:36+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17112298","link_host":"www.bloomberg.com","from":"hackernews"},{"title":"\"To all you that are trying to tell people they can become professionals in just a few weeks JUST to sell your product - shame on you!\"","link":"https://www.reddit.com/r/programming/comments/8ks25c/to_all_you_that_are_trying_to_tell_people_they/","comments":"https://www.reddit.com/r/programming/comments/8ks25c/to_all_you_that_are_trying_to_tell_people_they/","updated_at":"2018-05-20T11:28:48+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ks25c/to_all_you_that_are_trying_to_tell_people_they/","link_host":"reddit.com","from":"reddit"},{"title":"Inline unit testing in Clojure","link":"https://www.reddit.com/r/programming/comments/8ks0h5/inline_unit_testing_in_clojure/","comments":"https://www.reddit.com/r/programming/comments/8ks0h5/inline_unit_testing_in_clojure/","updated_at":"2018-05-20T11:16:59+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ks0h5/inline_unit_testing_in_clojure/","link_host":"reddit.com","from":"reddit"},{"title":"Python PIR Sensor & Camera Room Security Email Alerts","link":"https://www.reddit.com/r/programming/comments/8krx94/python_pir_sensor_camera_room_security_email/","comments":"https://www.reddit.com/r/programming/comments/8krx94/python_pir_sensor_camera_room_security_email/","updated_at":"2018-05-20T10:55:05+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8krx94/python_pir_sensor_camera_room_security_email/","link_host":"reddit.com","from":"reddit"},{"title":"Latest Roundup of EE4J Activities for Jakarta EE","link":"https://www.reddit.com/r/programming/comments/8krp4x/latest_roundup_of_ee4j_activities_for_jakarta_ee/","comments":"https://www.reddit.com/r/programming/comments/8krp4x/latest_roundup_of_ee4j_activities_for_jakarta_ee/","updated_at":"2018-05-20T09:50:08+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8krp4x/latest_roundup_of_ee4j_activities_for_jakarta_ee/","link_host":"reddit.com","from":"reddit"},{"title":"Keycloak security to EE Security using Soteria","link":"https://www.reddit.com/r/programming/comments/8krp15/keycloak_security_to_ee_security_using_soteria/","comments":"https://www.reddit.com/r/programming/comments/8krp15/keycloak_security_to_ee_security_using_soteria/","updated_at":"2018-05-20T09:49:16+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8krp15/keycloak_security_to_ee_security_using_soteria/","link_host":"reddit.com","from":"reddit"},{"title":"Python as a declarative programming language (2017)","description":"<a href="https://news.ycombinator.com/item?id=17111980">Comments</a>","link":"https://www.benfrederickson.com/python-as-a-declarative-programming-language/","comments":"https://news.ycombinator.com/item?id=17111980","updated_at":"2018-05-20T09:27:50+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17111980","link_host":"www.benfrederickson.com","from":"hackernews"},{"title":"Awesome visualization for understanding RAFT protocol for distributed consensus","link":"https://www.reddit.com/r/programming/comments/8krkl5/awesome_visualization_for_understanding_raft/","comments":"https://www.reddit.com/r/programming/comments/8krkl5/awesome_visualization_for_understanding_raft/","updated_at":"2018-05-20T09:11:53+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8krkl5/awesome_visualization_for_understanding_raft/","link_host":"reddit.com","from":"reddit"},{"title":"New variety in the chip market, and trouble for Intel (2017)","description":"<a href="https://news.ycombinator.com/item?id=17111922">Comments</a>","link":"https://www.economist.com/business/2017/02/25/the-rise-of-artificial-intelligence-is-creating-new-variety-in-the-chip-market-and-trouble-for-intel","comments":"https://news.ycombinator.com/item?id=17111922","updated_at":"2018-05-20T09:10:02+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17111922","link_host":"www.economist.com","from":"hackernews"},{"title":"Sketch artboard actual size","description":"Hi,\nI am designing on a 1440x900 Macbook Pro, and I set my artboard to be 1440x900. But when I view in actual size or export, it is actually bigger than 1440x900. Why is that? How can I fix it? Thx","link":"https://www.designernews.co/stories/94538-sketch-artboard-actual-size","comments":"https://www.designernews.co/stories/94538-sketch-artboard-actual-size","updated_at":"2018-05-20T08:19:43+00:00","link_to_comments":"https://www.designernews.co/stories/94538-sketch-artboard-actual-size","link_host":null,"from":"designernews"},{"title":"Dijkstra: Reasoning About Programs (1990) [video]","description":"<a href="https://news.ycombinator.com/item?id=17111784">Comments</a>","link":"https://www.youtube.com/watch?v=GX3URhx6i2E","comments":"https://news.ycombinator.com/item?id=17111784","updated_at":"2018-05-20T08:17:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17111784","link_host":"www.youtube.com","from":"hackernews"},{"title":"Why Finland's cities are havens for library lovers","description":"<a href="https://news.ycombinator.com/item?id=17111642">Comments</a>","link":"https://www.theguardian.com/cities/2018/may/15/why-finlands-cities-are-havens-for-library-lovers-oodi-helsinki","comments":"https://news.ycombinator.com/item?id=17111642","updated_at":"2018-05-20T07:20:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17111642","link_host":"www.theguardian.com","from":"hackernews"},{"title":"AsteroidOS – An open-source operating system for smartwatches","description":"<a href="https://news.ycombinator.com/item?id=17111477">Comments</a>","link":"https://asteroidos.org/#","comments":"https://news.ycombinator.com/item?id=17111477","updated_at":"2018-05-20T06:13:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17111477","link_host":"asteroidos.org","from":"hackernews"},{"title":"GIFs of website interaction... How are you making them?","description":"I've been seeing a lot of this lately. How are people producing GIFs of website interaction and animation?\n\ne.g. https://twitter.com/studiomotio/status/992342407898386438\n\nAre there specific tools? Screen recorders? In something like After Effects?","link":"https://www.designernews.co/stories/94537-gifs-of-website-interaction-how-are-you-making-them","comments":"https://www.designernews.co/stories/94537-gifs-of-website-interaction-how-are-you-making-them","updated_at":"2018-05-20T04:48:16+00:00","link_to_comments":"https://www.designernews.co/stories/94537-gifs-of-website-interaction-how-are-you-making-them","link_host":"twitter.com","from":"designernews"},{"title":"GitHub - andlabs/libui: Simple and portable (but not inflexible) GUI library in C that uses the native GUI technologies of each platform it supports.","link":"https://www.reddit.com/r/programming/comments/8kqec9/github_andlabslibui_simple_and_portable_but_not/","comments":"https://www.reddit.com/r/programming/comments/8kqec9/github_andlabslibui_simple_and_portable_but_not/","updated_at":"2018-05-20T04:05:18+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kqec9/github_andlabslibui_simple_and_portable_but_not/","link_host":"reddit.com","from":"reddit"},{"title":"GitHub - zyedidia/micro: A modern and intuitive terminal-based text editor","link":"https://www.reddit.com/r/programming/comments/8kqclg/github_zyedidiamicro_a_modern_and_intuitive/","comments":"https://www.reddit.com/r/programming/comments/8kqclg/github_zyedidiamicro_a_modern_and_intuitive/","updated_at":"2018-05-20T03:54:51+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kqclg/github_zyedidiamicro_a_modern_and_intuitive/","link_host":"reddit.com","from":"reddit"},{"title":"History of Symbolics lisp machines (2007)","description":"<a href="https://news.ycombinator.com/item?id=17110819">Comments</a>","link":"https://danluu.com/symbolics-lisp-machines/","comments":"https://news.ycombinator.com/item?id=17110819","updated_at":"2018-05-20T02:19:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17110819","link_host":"danluu.com","from":"hackernews"},{"title":"Understanding Image Sharpness","description":"<a href="https://news.ycombinator.com/item?id=17110668">Comments</a>","link":"http://www.normankoren.com/Tutorials/MTF.html","comments":"https://news.ycombinator.com/item?id=17110668","updated_at":"2018-05-20T01:32:42+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17110668","link_host":"www.normankoren.com","from":"hackernews"},{"title":"[Unresolved Mistery]Observations on interrupt collision between Arduino's millis() and attachInterrupt()","link":"https://www.reddit.com/r/programming/comments/8kpkyu/unresolved_misteryobservations_on_interrupt/","comments":"https://www.reddit.com/r/programming/comments/8kpkyu/unresolved_misteryobservations_on_interrupt/","updated_at":"2018-05-20T01:22:06+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kpkyu/unresolved_misteryobservations_on_interrupt/","link_host":"reddit.com","from":"reddit"},{"title":"How to write unmaintainable code: naming","link":"https://www.reddit.com/r/programming/comments/8kp9a4/how_to_write_unmaintainable_code_naming/","comments":"https://www.reddit.com/r/programming/comments/8kp9a4/how_to_write_unmaintainable_code_naming/","updated_at":"2018-05-20T00:22:01+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kp9a4/how_to_write_unmaintainable_code_naming/","link_host":"reddit.com","from":"reddit"},{"title":"Speeding up Zsh and Oh-My-Zsh","link":"https://www.reddit.com/r/programming/comments/8kozbh/speeding_up_zsh_and_ohmyzsh/","comments":"https://www.reddit.com/r/programming/comments/8kozbh/speeding_up_zsh_and_ohmyzsh/","updated_at":"2018-05-19T23:32:34+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kozbh/speeding_up_zsh_and_ohmyzsh/","link_host":"reddit.com","from":"reddit"},{"title":"The weirdest bug I’ve found in a compiler","link":"https://www.reddit.com/r/programming/comments/8ko295/the_weirdest_bug_ive_found_in_a_compiler/","comments":"https://www.reddit.com/r/programming/comments/8ko295/the_weirdest_bug_ive_found_in_a_compiler/","updated_at":"2018-05-19T20:59:23+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8ko295/the_weirdest_bug_ive_found_in_a_compiler/","link_host":"reddit.com","from":"reddit"},{"title":"How to Make Your Own Easy Button Logo with Adobe Illustrator","description":"http://designbeep.com/2018/04/13/how-to-make-your-own-easy-button-logo-with-adobe-illustrator/","link":"https://www.designernews.co/stories/94535-how-to-make-your-own-easy-button-logo-with-adobe-illustrator","comments":"https://www.designernews.co/stories/94535-how-to-make-your-own-easy-button-logo-with-adobe-illustrator","updated_at":"2018-05-19T19:01:47+00:00","link_to_comments":"https://www.designernews.co/stories/94535-how-to-make-your-own-easy-button-logo-with-adobe-illustrator","link_host":"designbeep.com","from":"designernews"},{"title":"Card-Carrying Precadavers","description":"<a href="https://news.ycombinator.com/item?id=17109167">Comments</a>","link":"https://www.firstthings.com/article/2018/06/card-carrying-precadavers","comments":"https://news.ycombinator.com/item?id=17109167","updated_at":"2018-05-19T18:53:48+00:00","link_to_comments":"https://news.ycombinator.com/item?id=17109167","link_host":"www.firstthings.com","from":"hackernews"},{"title":"Writing a Portable CPU/GPU Ray Tracer in C#","link":"https://www.reddit.com/r/programming/comments/8kmn3q/writing_a_portable_cpugpu_ray_tracer_in_c/","comments":"https://www.reddit.com/r/programming/comments/8kmn3q/writing_a_portable_cpugpu_ray_tracer_in_c/","updated_at":"2018-05-19T17:18:44+00:00","link_to_comments":"https://www.reddit.com/r/programming/comments/8kmn3q/writing_a_portable_cpugpu_ray_tracer_in_c/","link_host":"reddit.com","from":"reddit"},{"title":"Daily CSS Design","description":"https://dailycssdesign.com/","link":"https://www.designernews.co/stories/94533-daily-css-design","comments":"https://www.designernews.co/stories/94533-daily-css-design","updated_at":"2018-05-19T15:51:56+00:00","link_to_comments":"https://www.designernews.co/stories/94533-daily-css-design","link_host":"dailycssdesign.com","from":"designernews"},{"title":"What's the best non-Adobe product for animation design? And where are the best tutorials for that product?","description":"I'm interested in learning how to do animation for logos, UI, etc. and am not a big fan of Adobe's pricing model, so would therefore like to avoid After Effects. What are the other most-used tools for animation? And do you know of any good tutorials to help me get started?","link":"https://www.designernews.co/stories/94532-whats-the-best-nonadobe-product-for-animation-design-and-where-are-the-best-tutorials-for-that-product","comments":"https://www.designernews.co/stories/94532-whats-the-best-nonadobe-product-for-animation-design-and-where-are-the-best-tutorials-for-that-product","updated_at":"2018-05-19T15:00:08+00:00","link_to_comments":"https://www.designernews.co/stories/94532-whats-the-best-nonadobe-product-for-animation-design-and-where-are-the-best-tutorials-for-that-product","link_host":null,"from":"designernews"},{"title":"Mobile App Development India","description":"The mobile application is one of the important factors to escalate your business. HireIndianProgrammers, the best [mobile app development India](https://hireindianprogrammers.com/mobile-application-development-services.php) offers services for developing mobile applications on various platforms such as Android, Windows and iOS.","link":"https://www.designernews.co/stories/94531-mobile-app-development-india","comments":"https://www.designernews.co/stories/94531-mobile-app-development-india","updated_at":"2018-05-19T12:08:58+00:00","link_to_comments":"https://www.designernews.co/stories/94531-mobile-app-development-india","link_host":"hireindianprogrammers.com","from":"designernews"},{"title":"Resume template","description":"https://www.themesine.com/downloads/browny-bootstrap-resume-template/","link":"https://www.designernews.co/stories/94530-resume-template","comments":"https://www.designernews.co/stories/94530-resume-template","updated_at":"2018-05-19T11:33:03+00:00","link_to_comments":"https://www.designernews.co/stories/94530-resume-template","link_host":"www.themesine.com","from":"designernews"},{"title":"“A design that merges iOS and Android”","description":"As designers, we are often asked to design cross-platform apps.\n\nHowever, the design systems behind iOS and Android are vastly different.\n\nSmall examples include the way that indicators are treated on table views (the chevron on the right side); or small touches on tab bars (on Android, the label is only supposed to be shown on the active item).\n\nLarger is the way movement is depicted. Android has a concept of transitioning elements from screen to screen. iOS has relatively strict view hierarchies and the animations are mostly on the full view.\n\nIf you try to explain these differences in a client meeting, the client will probably acknowledge them, then start talking about budget and in the end you have to deal with the problem anyway.\n\nI have been exploring React Native (from the design side) which allows you to more easily build custom cross-platform interfaces (versus starting a native Android and iOS app from scratch).\n\nHowever, in a custom UI you still have to decide which combination you make between iOS and Android.\n\nAny thoughts? How do you deal with this problem?","link":"https://www.designernews.co/stories/94529-a-design-that-merges-ios-and-android","comments":"https://www.designernews.co/stories/94529-a-design-that-merges-ios-and-android","updated_at":"2018-05-19T11:00:04+00:00","link_to_comments":"https://www.designernews.co/stories/94529-a-design-that-merges-ios-and-android","link_host":null,"from":"designernews"},{"title":"How to survive without search in Figma","description":"https://medium.com/@kamushken/figma-design-system-adding-components-by-instance-fbe1ffed00ac","link":"https://www.designernews.co/stories/94527-how-to-survive-without-search-in-figma","comments":"https://www.designernews.co/stories/94527-how-to-survive-without-search-in-figma","updated_at":"2018-05-19T08:46:13+00:00","link_to_comments":"https://www.designernews.co/stories/94527-how-to-survive-without-search-in-figma","link_host":"medium.com","from":"designernews"},{"title":"Deadpool Don't Even Like Chimichangas All That Much Illustration","description":"https://dribbble.com/shots/4604198-Deadpool-Don-t-Even-Like-Chimichangas-All-That-Much-Illustration","link":"https://www.designernews.co/stories/94522-deadpool-dont-even-like-chimichangas-all-that-much-illustration","comments":"https://www.designernews.co/stories/94522-deadpool-dont-even-like-chimichangas-all-that-much-illustration","updated_at":"2018-05-18T17:57:55+00:00","link_to_comments":"https://www.designernews.co/stories/94522-deadpool-dont-even-like-chimichangas-all-that-much-illustration","link_host":"dribbble.com","from":"designernews"},{"title":"Bedrock – A powerful static site generator","description":"https://bedrock.mono.company","link":"https://www.designernews.co/stories/94517-bedrock--a-powerful-static-site-generator","comments":"https://www.designernews.co/stories/94517-bedrock--a-powerful-static-site-generator","updated_at":"2018-05-18T15:13:35+00:00","link_to_comments":"https://www.designernews.co/stories/94517-bedrock--a-powerful-static-site-generator","link_host":"bedrock.mono.company","from":"designernews"},{"title":"Layout Podcast: What qualifies a designer as a *senior* designer?","description":"http://layout.fm/episodes/102","link":"https://www.designernews.co/stories/94516-layout-podcast-what-qualifies-a-designer-as-a-senior-designer","comments":"https://www.designernews.co/stories/94516-layout-podcast-what-qualifies-a-designer-as-a-senior-designer","updated_at":"2018-05-18T13:58:01+00:00","link_to_comments":"https://www.designernews.co/stories/94516-layout-podcast-what-qualifies-a-designer-as-a-senior-designer","link_host":"layout.fm","from":"designernews"},{"title":"Understanding UX Vocabulary [5 terms that will change the way you create a digital experience for your clients]","description":"http://blog.iversoft.ca/5-ux-terms-vocabulary","link":"https://www.designernews.co/stories/94515-understanding-ux-vocabulary-5-terms-that-will-change-the-way-you-create-a-digital-experience-for-your-clients","comments":"https://www.designernews.co/stories/94515-understanding-ux-vocabulary-5-terms-that-will-change-the-way-you-create-a-digital-experience-for-your-clients","updated_at":"2018-05-18T13:37:36+00:00","link_to_comments":"https://www.designernews.co/stories/94515-understanding-ux-vocabulary-5-terms-that-will-change-the-way-you-create-a-digital-experience-for-your-clients","link_host":"blog.iversoft.ca","from":"designernews"},{"title":"How do you annotate design changes to your dev team?","description":"Hello designers!\n\nI am looking to improve my design process and some tips and opinions from you would be amazing.\n\nThere is always one pain in my process that keeps me annoying over and over.\n\nLet's say I sent a design to devs for them to start coding it. After a while I have to change something in the design, based off some feedback or after metrics come in. I then have to go over all my design decisions and changes again to list them out for the devs. Either in person or via GitHub issue etc.\n\nBut I find this quite frustrating - going back and annotating everything manually. Especially when small changes (like copy changes, slightly changed color shade…) are overlooked and don't make it to the final release - it's extra annoying. I'm I alone in this?\n\nHow do you communicate these design changes to your dev team? If you do it manually, any tips to make this less painful? Do you use any tools or frameworks for this?","link":"https://www.designernews.co/stories/94514-how-do-you-annotate-design-changes-to-your-dev-team","comments":"https://www.designernews.co/stories/94514-how-do-you-annotate-design-changes-to-your-dev-team","updated_at":"2018-05-18T12:43:33+00:00","link_to_comments":"https://www.designernews.co/stories/94514-how-do-you-annotate-design-changes-to-your-dev-team","link_host":null,"from":"designernews"},{"title":"Website extreme makeover: brushing fear away and trying something new – Designer News","description":"https://www.imaginarycloud.com/blog/rebranding-is-life/","link":"https://www.designernews.co/stories/94513-website-extreme-makeover-brushing-fear-away-and-trying-something-new--designer-news","comments":"https://www.designernews.co/stories/94513-website-extreme-makeover-brushing-fear-away-and-trying-something-new--designer-news","updated_at":"2018-05-18T12:41:12+00:00","link_to_comments":"https://www.designernews.co/stories/94513-website-extreme-makeover-brushing-fear-away-and-trying-something-new--designer-news","link_host":"www.imaginarycloud.com","from":"designernews"},{"title":"Awesome iPhone X App Design","description":"https://www.behance.net/gallery/65714941/Ali-App-Design","link":"https://www.designernews.co/stories/94512-awesome-iphone-x-app-design","comments":"https://www.designernews.co/stories/94512-awesome-iphone-x-app-design","updated_at":"2018-05-18T12:10:02+00:00","link_to_comments":"https://www.designernews.co/stories/94512-awesome-iphone-x-app-design","link_host":"www.behance.net","from":"designernews"},{"title":"Portfolio of Martin Gorol","description":"https://martingorol.com/","link":"https://www.designernews.co/stories/94511-portfolio-of-martin-gorol","comments":"https://www.designernews.co/stories/94511-portfolio-of-martin-gorol","updated_at":"2018-05-18T11:50:41+00:00","link_to_comments":"https://www.designernews.co/stories/94511-portfolio-of-martin-gorol","link_host":"martingorol.com","from":"designernews"},{"title":"Introducing public/private brand guidelines","description":"https://medium.com/brandpad/introducing-public-private-guidelines-243d80bc204b","link":"https://www.designernews.co/stories/94508-introducing-publicprivate-brand-guidelines","comments":"https://www.designernews.co/stories/94508-introducing-publicprivate-brand-guidelines","updated_at":"2018-05-18T10:59:13+00:00","link_to_comments":"https://www.designernews.co/stories/94508-introducing-publicprivate-brand-guidelines","link_host":"medium.com","from":"designernews"},{"title":"Good Questions, Bad Asks: The UX Of Questions In User Onboarding","description":"https://www.chargebee.com/blog/user-onboarding-questions/","link":"https://www.designernews.co/stories/94507-good-questions-bad-asks-the-ux-of-questions-in-user-onboarding","comments":"https://www.designernews.co/stories/94507-good-questions-bad-asks-the-ux-of-questions-in-user-onboarding","updated_at":"2018-05-18T10:33:33+00:00","link_to_comments":"https://www.designernews.co/stories/94507-good-questions-bad-asks-the-ux-of-questions-in-user-onboarding","link_host":"www.chargebee.com","from":"designernews"},{"title":"NFWalls - Beautiful wallpapers for your Android Device","description":"https://play.google.com/store/apps/details?id=nfnlabs.design.nfwalls","link":"https://www.designernews.co/stories/94506-nfwalls--beautiful-wallpapers-for-your-android-device","comments":"https://www.designernews.co/stories/94506-nfwalls--beautiful-wallpapers-for-your-android-device","updated_at":"2018-05-18T05:44:19+00:00","link_to_comments":"https://www.designernews.co/stories/94506-nfwalls--beautiful-wallpapers-for-your-android-device","link_host":"play.google.com","from":"designernews"},{"title":"Hand-curated list with over 80+ amazing stock video and photo sites","description":"https://www.and.co/blog/hustle/stock-photo-and-video-sites/","link":"https://www.designernews.co/stories/94503-handcurated-list-with-over-80-amazing-stock-video-and-photo-sites","comments":"https://www.designernews.co/stories/94503-handcurated-list-with-over-80-amazing-stock-video-and-photo-sites","updated_at":"2018-05-17T20:33:50+00:00","link_to_comments":"https://www.designernews.co/stories/94503-handcurated-list-with-over-80-amazing-stock-video-and-photo-sites","link_host":"www.and.co","from":"designernews"},{"title":"As the Web moves toward HTTPS by default, Chrome will remove “secure” indicator","description":"The browser is changing to flag the things that are dangerous, not the ones that are safe.","link":"https://arstechnica.com/?p=1310651","comments":"https://arstechnica.com/?p=1310651","updated_at":"2018-05-17T18:46:49+00:00","link_to_comments":"https://arstechnica.com/?p=1310651","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Maze now supports Marvel prototypes!","description":"https://maze.design/","link":"https://www.designernews.co/stories/94488-maze-now-supports-marvel-prototypes","comments":"https://www.designernews.co/stories/94488-maze-now-supports-marvel-prototypes","updated_at":"2018-05-17T13:11:09+00:00","link_to_comments":"https://www.designernews.co/stories/94488-maze-now-supports-marvel-prototypes","link_host":"maze.design","from":"designernews"},{"title":"Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests","description":"Last week, we reported about the first network-based remote Rowhammer attack, dubbed Throwhammer, which involves the exploitation a known vulnerability in DRAM through network cards using remote direct memory access (RDMA) channels.\n\nHowever, a separate team of security researchers has now demonstrated a second network-based remote Rowhammer technique that can be used to attack systems using<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ONy4Kjx0gdo:UsE3Nc4X9lU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ONy4Kjx0gdo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ONy4Kjx0gdo/remote-rowhammer-attack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ONy4Kjx0gdo/remote-rowhammer-attack.html","updated_at":"2018-05-17T09:54:49+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ONy4Kjx0gdo/remote-rowhammer-attack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Xbox Adaptive Controller","description":"https://news.microsoft.com/stories/xbox-adaptive-controller/","link":"https://www.designernews.co/stories/94477-xbox-adaptive-controller","comments":"https://www.designernews.co/stories/94477-xbox-adaptive-controller","updated_at":"2018-05-17T06:13:00+00:00","link_to_comments":"https://www.designernews.co/stories/94477-xbox-adaptive-controller","link_host":"news.microsoft.com","from":"designernews"},{"title":"Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext","description":"For the second time in less than a week, users of the popular end-to-end encrypted Signal messaging app have to update their desktop applications once again to patch another severe code injection vulnerability.\n\nDiscovered Monday by the same team of security researchers, the newly discovered vulnerability poses the same threat as the previous one, allowing remote attackers to inject malicious<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=c5XSc4nwBlI:sAuSDYS4cDA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/c5XSc4nwBlI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/c5XSc4nwBlI/signal-desktop-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/c5XSc4nwBlI/signal-desktop-hacking.html","updated_at":"2018-05-16T15:03:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/c5XSc4nwBlI/signal-desktop-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Red Hat Linux DHCP Client Found Vulnerable to Command Injection Attacks","description":"A Google security researcher has discovered a critical remote command injection vulnerability in the DHCP client implementation of Red Hat Linux and its derivatives like Fedora operating system.\n\nThe vulnerability, tracked as CVE-2018-1111, could allow attackers to execute arbitrary commands with root privileges on targeted systems.\n\nWhenever your system joins a network, it’s the DHCP client<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=SKTnz7tkojQ:GoKtAaWgJUY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/SKTnz7tkojQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/SKTnz7tkojQ/linux-dhcp-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SKTnz7tkojQ/linux-dhcp-hacking.html","updated_at":"2018-05-15T21:13:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SKTnz7tkojQ/linux-dhcp-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Sponsor: Live Now: UX / UI design with Alissa Suzanne, Zachery Nielson and Meagan Fisher","description":"https://adobe.ly/2FpioQv","link":"https://www.designernews.co/stories/94438-sponsor-live-now-ux--ui-design-with-alissa-suzanne-zachery-nielson-and-meagan-fisher","comments":"https://www.designernews.co/stories/94438-sponsor-live-now-ux--ui-design-with-alissa-suzanne-zachery-nielson-and-meagan-fisher","updated_at":"2018-05-15T16:30:18+00:00","link_to_comments":"https://www.designernews.co/stories/94438-sponsor-live-now-ux--ui-design-with-alissa-suzanne-zachery-nielson-and-meagan-fisher","link_host":"adobe.ly","from":"designernews"},{"title":"Hackers Reveal How Code Injection Attack Works in Signal Messaging App","description":"After the revelation of the eFail attack details, it's time to reveal how the recently reported code injection vulnerability in the popular end-to-end encrypted Signal messaging app works.\n\nAs we reported last weekend, Signal has patched its messaging app for Windows and Linux that suffered a code injection vulnerability discovered and reported by a team of white-hat hackers from Argentina.\n&lt;!<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ZxaDqI61vpM:ZHX1cqHaZq0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ZxaDqI61vpM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZxaDqI61vpM/signal-messenger-code-injection.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZxaDqI61vpM/signal-messenger-code-injection.html","updated_at":"2018-05-14T21:53:44+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ZxaDqI61vpM/signal-messenger-code-injection.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Here's How eFail Attack Works Against PGP and S/MIME Encrypted Emails","description":"With a heavy heart, security researchers have early released the details of a set of vulnerabilities discovered in email clients for two widely used email encryption standards—PGP and S/MIME—after someone leaked their paper on the Internet, which was actually scheduled for tomorrow.\n\nPGP and S/MIME are popular end-to-end encryption standards used to encrypt emails in a way that no one, not<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ThYJn8qUD1Y:jsy9wJW9hps:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ThYJn8qUD1Y" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ThYJn8qUD1Y/efail-pgp-email-encryption.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ThYJn8qUD1Y/efail-pgp-email-encryption.html","updated_at":"2018-05-14T19:44:55+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ThYJn8qUD1Y/efail-pgp-email-encryption.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Adobe Releases Critical Security Updates for Acrobat, Reader and Photoshop CC","description":"Adobe has just released new versions of its Acrobat DC, Reader and Photoshop CC for Windows and macOS users that patch 48 vulnerabilities in its software.\n\nA total of 47 vulnerabilities affect Adobe Acrobat and Reader applications, and one critical remote code execution flaw has been patched in Adobe Photoshop CC.\n\nOut of 47, Adobe Acrobat and Reader affect with 24 critical vulnerabilities—<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=VJoSxUeqlRg:2yuoXGx6W1s:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/VJoSxUeqlRg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/VJoSxUeqlRg/adobe-security-patch-update.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/VJoSxUeqlRg/adobe-security-patch-update.html","updated_at":"2018-05-14T19:25:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/VJoSxUeqlRg/adobe-security-patch-update.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Critical Flaws in PGP and S/MIME Tools Can Reveal Encrypted Emails in Plaintext","description":"Note—the technical details of the vulnerabilities introduced in this article has now been released, so you should also read our latest article to learn how the eFail attack works and what users can do to prevent themselves.\n\nAn important warning for people using widely used email encryption tools—PGP and S/MIME—for sensitive communication.\n\nA team of European security researchers has released<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=bjmbp27iQ1g:BEsqrGdGnrs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bjmbp27iQ1g" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bjmbp27iQ1g/pgp-smime-email-encryption.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bjmbp27iQ1g/pgp-smime-email-encryption.html","updated_at":"2018-05-14T18:38:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bjmbp27iQ1g/pgp-smime-email-encryption.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Simple bug could lead to RCE flaw on apps built with Electron Framework","description":"A critical remote code execution vulnerability has been discovered in the popular Electron web application framework that could allow attackers to execute malicious code on victims' computers.\n\nElectron is an open source app development framework that powers thousands of widely-used desktop applications including WhatsApp, Skype, Signal, Wordpress, Slack, GitHub Desktop, Atom, Visual Studio<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=bH7c1B4XqvQ:JT6XR-N6GZM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bH7c1B4XqvQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bH7c1B4XqvQ/electron-node-integration.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bH7c1B4XqvQ/electron-node-integration.html","updated_at":"2018-05-14T10:13:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bH7c1B4XqvQ/electron-node-integration.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Severe Bug Discovered in Signal Messaging App for Windows and Linux","description":"Security researchers have discovered a severe vulnerability in the popular end-to-end encrypted Signal messaging app for Windows and Linux desktops which could allow remote attackers to execute malicious code on recipients system just by sending a message—without requiring any user interaction.\n\nDiscovered by Alfredo Ortega, a software security consultant from Argentina, the vulnerability was<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=rg4oB2IX0i0:q8stNpjdlLg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/rg4oB2IX0i0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/rg4oB2IX0i0/signal-messenger-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rg4oB2IX0i0/signal-messenger-vulnerability.html","updated_at":"2018-05-12T09:13:05+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/rg4oB2IX0i0/signal-messenger-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Google Makes it Mandatory for OEMs to Roll Out Android Security Updates Regularly","description":"Security of Android devices has been a nightmare since its inception, and the biggest reason being is that users don't receive latest security patch updates regularly.\n\nPrecisely, it's your device manufacturer (Android OEMs) actually who takes time to roll out security patches for your devices and sometimes, even has been caught lying about security updates, telling customers that their<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=EMBK4X-xg88:D8JJJEg8aaM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/EMBK4X-xg88" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/EMBK4X-xg88/android-security-updates.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/EMBK4X-xg88/android-security-updates.html","updated_at":"2018-05-11T18:55:08+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/EMBK4X-xg88/android-security-updates.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"7 Chrome Extensions Spreading Through Facebook Caught Stealing Passwords","description":"Luring users on social media to visit lookalike version of popular websites that pop-up a legitimate-looking Chrome extension installation window is one of the most common modus operandi of cybercriminals to spread malware.\n\nSecurity researchers are again warning users of a new malware campaign that has been active since at least March this year and has already infected more than 100,000 users<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=1J8kbZebor0:JUAXi3U-l8U:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1J8kbZebor0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1J8kbZebor0/chrome-facebook-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1J8kbZebor0/chrome-facebook-malware.html","updated_at":"2018-05-11T10:28:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1J8kbZebor0/chrome-facebook-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New Rowhammer Attack Can Hijack Computers Remotely Over the Network","description":"Exploitation of Rowhammer attack just got easier.\n\nDubbed ‘Throwhammer,’ the newly discovered technique could allow attackers to launch Rowhammer attack on the targeted systems just by sending specially crafted packets to the vulnerable network cards over the local area network.\n\nKnown since 2012, Rowhammer is a severe issue with recent generation dynamic random access memory (DRAM) chips in<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=1i4ENbTBbDg:_-qIfcnf1mg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/1i4ENbTBbDg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/1i4ENbTBbDg/rowhammer-attack-exploit.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1i4ENbTBbDg/rowhammer-attack-exploit.html","updated_at":"2018-05-11T08:20:00+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/1i4ENbTBbDg/rowhammer-attack-exploit.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"5 Powerful Botnets Found Exploiting Unpatched GPON Router Flaws","description":"Well, that did not take long.\n\nWithin just 10 days of the disclosure of two critical vulnerabilities in GPON router at least 5 botnet families have been found exploiting the flaws to build an army of million devices.\n\nSecurity researchers from Chinese-based cybersecurity firm Qihoo 360 Netlab have spotted 5 botnet families, including Mettle, Muhstik, Mirai, Hajime, and Satori, making use of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=y--tp2jw0s8:5_yPlmMj7T0:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/y--tp2jw0s8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/y--tp2jw0s8/botnet-malware-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/y--tp2jw0s8/botnet-malware-hacking.html","updated_at":"2018-05-10T14:38:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/y--tp2jw0s8/botnet-malware-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Self-destructing messages received on 'Signal for Mac' can be recovered later","description":"It turns out that macOS client for the popular end-to-end encrypted messaging app Signal fails to properly delete disappearing (self-destructing) messages  from the recipient's system, leaving the content of your sensitive messages at risk of getting exposed.\n\nFor those unaware, the disappearing messages in Signal self-destruct after a particular duration set by the sender, leaving no trace of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=HP8aKh3jN3U:CoN7VmKjvBY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/HP8aKh3jN3U" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/HP8aKh3jN3U/signal-secure-messaging.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/HP8aKh3jN3U/signal-secure-messaging.html","updated_at":"2018-05-09T16:15:28+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/HP8aKh3jN3U/signal-secure-messaging.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Adds Support for JavaScript in Excel—What Could Possibly Go Wrong?","description":"Shortly after Microsoft announced support for custom JavaScript functions in Excel, someone demonstrated what could possibly go wrong if this feature is abused for malicious purposes.\n\nAs promised last year at Microsoft's Ignite 2017 conference, the company has now brought custom JavaScript functions to Excel to extend its capabilities for better work with data.\n\nFunctions are written in<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=jwV8nu7RrNg:JDrdoDqWHIA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/jwV8nu7RrNg" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/jwV8nu7RrNg/javascript-function-excel.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jwV8nu7RrNg/javascript-function-excel.html","updated_at":"2018-05-09T13:06:23+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/jwV8nu7RrNg/javascript-function-excel.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Patches Two Zero-Day Flaws Under Active Attack","description":"It's time to gear up for the latest May 2018 Patch Tuesday.\n\nMicrosoft has today released security patches for a total of 67 vulnerabilities, including two zero-days that have actively been exploited in the wild by cybercriminals, and two publicly disclosed bugs.\n\nIn brief, Microsoft is addressing 21 vulnerabilities that are rated as critical, 42 rated important, and 4 rated as low severity.<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=YUvuBUCdgf4:dzZDBSe9IcI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/YUvuBUCdgf4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/YUvuBUCdgf4/microsoft-patch-tuesday.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/YUvuBUCdgf4/microsoft-patch-tuesday.html","updated_at":"2018-05-09T06:14:09+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/YUvuBUCdgf4/microsoft-patch-tuesday.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links","description":"Security researchers revealed a way around that some hacking groups have been found using in the wild to bypass a security feature of Microsoft Office 365, which is originally designed to protect users from malware and phishing attacks.\n\nDubbed Safe Links, the feature has been included in Office 365 software as part of Microsoft's Advanced Threat Protection (ATP) solution that works by replacing<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=OJP4M6-dvFU:RFV7rTKG_nM:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/OJP4M6-dvFU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/OJP4M6-dvFU/microsoft-safelinks-phishing.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/OJP4M6-dvFU/microsoft-safelinks-phishing.html","updated_at":"2018-05-08T17:42:13+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/OJP4M6-dvFU/microsoft-safelinks-phishing.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"A Simple Tool Released to Protect Dasan GPON Routers from Remote Hacking","description":"Since hackers have started exploiting two recently disclosed unpatched critical vulnerabilities found in GPON home routers, security researchers have now released an unofficial patch to help millions of affected users left vulnerable by their device manufacturer.\n\nLast week, researchers at vpnMentor disclosed details of—an authentication bypass (CVE-2018-10561) and a root-remote code execution<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=eA7HiwudqeQ:B-7s4rpHClg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/eA7HiwudqeQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/eA7HiwudqeQ/protect-router-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eA7HiwudqeQ/protect-router-hacking.html","updated_at":"2018-05-08T13:34:08+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/eA7HiwudqeQ/protect-router-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Two Romanian Hackers Extradited to the U.S. Over $18 Million Vishing Scam","description":"Two Romanian hackers have been extradited to the United States to face 31 criminal charges including computer fraud and abuse, wire fraud conspiracy, wire fraud, and aggravated identity theft.\n\nDescribed as "international computer hackers" by the United States Department of Justice, Teodor Laurentiu Costea, 41, and Robert Codrut Dumitrescu, 40, allegedly rob Americans of more than $18 million<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xJtfqEo_ghU:48GILCfUR9w:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xJtfqEo_ghU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xJtfqEo_ghU/romanian-hackers-extradited.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xJtfqEo_ghU/romanian-hackers-extradited.html","updated_at":"2018-05-08T07:59:30+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xJtfqEo_ghU/romanian-hackers-extradited.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Twitter is Testing End-to-End Encrypted Direct Messages","description":"Twitter has been adopting new trends at a snail's pace. But it’s better to be late than never.\n\nSince 2013 people were speculating that Twitter will bring end-to-end encryption to its direct messages, and finally almost 5 years after the encryption era began, the company is now testing an end-to-end encrypted messaging on Twitter.\n\nDubbed "Secret Conversation," the feature has been spotted in<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=RVX_SiAhBFI:nN9PG7HJL4Q:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/RVX_SiAhBFI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/RVX_SiAhBFI/encrypted-twitter-direct-messages.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RVX_SiAhBFI/encrypted-twitter-direct-messages.html","updated_at":"2018-05-08T07:45:37+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RVX_SiAhBFI/encrypted-twitter-direct-messages.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"First-Ever Ransomware Found Using ‘Process Doppelgänging’ Attack to Evade Detection","description":"Security researchers have spotted the first-ever ransomware exploiting Process Doppelgänging, a new fileless code injection technique that could help malware evade detection.\n\nThe Process Doppelgänging attack takes advantage of a built-in Windows function, i.e., NTFS Transactions, and an outdated implementation of Windows process loader, and works on all modern versions of Microsoft Windows OS<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=t6Qe87AKvn4:yU5gnuO3oXo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/t6Qe87AKvn4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/t6Qe87AKvn4/synack-process-doppelganging.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/t6Qe87AKvn4/synack-process-doppelganging.html","updated_at":"2018-05-07T12:30:15+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/t6Qe87AKvn4/synack-process-doppelganging.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Android P to Block Apps From Monitoring Device Network Activity","description":"Do you know that any app you have installed on your Android phone can monitor the network activities—even without asking for any sensitive permission—to detect when other apps on your phone are connecting to the Internet?\n\nObviously, they cant see the content of the network traffic, but can easily find to which server you are connecting to, all without your knowledge. Knowing what apps you<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=sOCxCL9ZDmE:CXqlpg61iFI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/sOCxCL9ZDmE" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/sOCxCL9ZDmE/android-p-network-activity.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sOCxCL9ZDmE/android-p-network-activity.html","updated_at":"2018-05-07T09:28:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/sOCxCL9ZDmE/android-p-network-activity.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"8 New Spectre-Class Vulnerabilities (Spectre-NG) Found in Intel CPUs","description":"A team of security researchers has reportedly discovered a total of eight new "Spectre-class" vulnerabilities in Intel CPUs, which also affect at least a small number of ARM processors and may impact AMD processor architecture as well.\n\nDubbed Spectre-Next Generation, or Spectre-NG, the partial details of the vulnerabilities were first leaked to journalists at German computer magazine Heise,<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=RdnEj7hEroY:lIUb7gqZtAo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/RdnEj7hEroY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/RdnEj7hEroY/intel-spectre-vulnerability.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RdnEj7hEroY/intel-spectre-vulnerability.html","updated_at":"2018-05-05T10:09:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/RdnEj7hEroY/intel-spectre-vulnerability.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones","description":"For the very first time, security researchers have discovered an effective way to exploit a four-year-old hacking technique called Rowhammer to hijack an Android phone remotely.\n\nDubbed GLitch, the proof-of-concept technique is a new addition to the Rowhammer attack series which leverages embedded graphics processing units (GPUs) to carry out a Rowhammer attack against Android smartphones.<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ab_UulVpEfo:01yd6qB8GyU:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ab_UulVpEfo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ab_UulVpEfo/rowhammer-android-hacking.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ab_UulVpEfo/rowhammer-android-hacking.html","updated_at":"2018-05-04T07:39:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ab_UulVpEfo/rowhammer-android-hacking.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Change Your Twitter Password Immediately, Bug Exposes Passwords in Plaintext","description":"Twitter is urging all of its 330 million users to change their passwords after a software glitch unintentionally exposed its users' passwords by storing them in readable text on its internal computer system.\n\nThe social media network disclosed the issue in an official blog post and a series of tweets from Twitter Support.\n&lt;!-- adsense --&gt;\nAccording to Twitter CTO Parag Agrawal, Twitter hashes<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=svhSUWU2nh4:rh0PsElEPFs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/svhSUWU2nh4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/svhSUWU2nh4/twitter-account-password.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/svhSUWU2nh4/twitter-account-password.html","updated_at":"2018-05-04T05:24:41+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/svhSUWU2nh4/twitter-account-password.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft claims to make Chrome safer with new extension","description":"A purported Edge advantage is now available in Chrome.","link":"https://arstechnica.com/?p=1295205","comments":"https://arstechnica.com/?p=1295205","updated_at":"2018-04-18T15:12:54+00:00","link_to_comments":"https://arstechnica.com/?p=1295205","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel, Microsoft to use GPU to scan memory for malware","description":"The company is also using its processors’ performance monitoring to detect malicious code.","link":"https://arstechnica.com/?p=1294013","comments":"https://arstechnica.com/?p=1294013","updated_at":"2018-04-17T03:00:10+00:00","link_to_comments":"https://arstechnica.com/?p=1294013","link_host":"arstechnica.com","from":"arssecurity"},{"title":"AMD systems gain Spectre protection with latest Windows fixes","description":"Systems will still need updated firmware to get the latest microcode, however.","link":"https://arstechnica.com/?p=1291707","comments":"https://arstechnica.com/?p=1291707","updated_at":"2018-04-11T16:32:56+00:00","link_to_comments":"https://arstechnica.com/?p=1291707","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Practical passwordless authentication comes a step closer with WebAuthn","description":"Microsoft, Mozilla, and Google are all implementing the new standard.","link":"https://arstechnica.com/?p=1291003","comments":"https://arstechnica.com/?p=1291003","updated_at":"2018-04-10T18:48:13+00:00","link_to_comments":"https://arstechnica.com/?p=1291003","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel drops plans to develop Spectre microcode for ancient chips","description":"Company claims it's too hard, and few systems have exposure to attack.","link":"https://arstechnica.com/?p=1288023","comments":"https://arstechnica.com/?p=1288023","updated_at":"2018-04-04T17:35:04+00:00","link_to_comments":"https://arstechnica.com/?p=1288023","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Google bans cryptomining Chrome extensions because they refuse to play by the rules","description":"Google continues to try to keep its browser running smoothly in spite of others’ efforts.","link":"https://arstechnica.com/?p=1287415","comments":"https://arstechnica.com/?p=1287415","updated_at":"2018-04-03T20:56:08+00:00","link_to_comments":"https://arstechnica.com/?p=1287415","link_host":"arstechnica.com","from":"arssecurity"},{"title":"As predicted, more branch prediction processor attacks are discovered","description":"New attack focuses on a different part of the branch prediction system.","link":"https://arstechnica.com/?p=1282101","comments":"https://arstechnica.com/?p=1282101","updated_at":"2018-03-26T22:15:55+00:00","link_to_comments":"https://arstechnica.com/?p=1282101","link_host":"arstechnica.com","from":"arssecurity"},{"title":"AMD promises firmware fixes for security processor bugs","description":"All bugs require administrative access to exploit.","link":"https://arstechnica.com/?p=1279147","comments":"https://arstechnica.com/?p=1279147","updated_at":"2018-03-20T22:00:09+00:00","link_to_comments":"https://arstechnica.com/?p=1279147","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel outlines plans for Meltdown and Spectre fixes, microcode for older chips","description":"Microcodes for Sandy Bridge and newer are now available.","link":"https://arstechnica.com/?p=1275921","comments":"https://arstechnica.com/?p=1275921","updated_at":"2018-03-15T18:00:16+00:00","link_to_comments":"https://arstechnica.com/?p=1275921","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Patch Tuesday drops the mandatory antivirus requirement after all","description":"Today’s patches also include an annoying-looking remote code execution bug.","link":"https://arstechnica.com/?p=1274895","comments":"https://arstechnica.com/?p=1274895","updated_at":"2018-03-13T20:35:18+00:00","link_to_comments":"https://arstechnica.com/?p=1274895","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel’s latest set of Spectre microcode fixes is coming to a Windows update","description":"Windows users will no longer be beholden to their motherboard makers.","link":"https://arstechnica.com/?p=1268031","comments":"https://arstechnica.com/?p=1268031","updated_at":"2018-03-01T18:14:43+00:00","link_to_comments":"https://arstechnica.com/?p=1268031","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel ships (hopefully stable) microcode for Skylake, Kaby Lake, Coffee Lake","description":"All 6th, 7th, and 8th generation Core processors now have microcode available.","link":"https://arstechnica.com/?p=1263653","comments":"https://arstechnica.com/?p=1263653","updated_at":"2018-02-21T19:03:33+00:00","link_to_comments":"https://arstechnica.com/?p=1263653","link_host":"arstechnica.com","from":"arssecurity"},{"title":"32 lawsuits filed against Intel over Spectre and Meltdown flaws","description":"Company also accused of failing to act in response to insider trading.","link":"https://arstechnica.com/?p=1261759","comments":"https://arstechnica.com/?p=1261759","updated_at":"2018-02-16T20:42:57+00:00","link_to_comments":"https://arstechnica.com/?p=1261759","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows Defender Advanced Threat Protection coming to Windows 7 and 8.1","description":"A Windows 10 feature is coming to old platforms.","link":"https://arstechnica.com/?p=1258447","comments":"https://arstechnica.com/?p=1258447","updated_at":"2018-02-12T17:19:15+00:00","link_to_comments":"https://arstechnica.com/?p=1258447","link_host":"arstechnica.com","from":"arssecurity"},{"title":"From July on, Chrome will brand plain old HTTP as “Not secure”","description":"The "Not secure" label will go where the padlock would go for an encrypted connection.","link":"https://arstechnica.com/?p=1257647","comments":"https://arstechnica.com/?p=1257647","updated_at":"2018-02-09T19:50:24+00:00","link_to_comments":"https://arstechnica.com/?p=1257647","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Intel releases new Spectre microcode update for Skylake; other chips remain in beta","description":"Previous microcode update was reported to cause unwanted system reboots.","link":"https://arstechnica.com/?p=1256455","comments":"https://arstechnica.com/?p=1256455","updated_at":"2018-02-08T01:25:16+00:00","link_to_comments":"https://arstechnica.com/?p=1256455","link_host":"arstechnica.com","from":"arssecurity"},{"title":"New Windows patch disables Intel’s bad Spectre microcode fix","description":"Registry keys can also be used to selectively enable or disable the microcode fix.","link":"https://arstechnica.com/?p=1250789","comments":"https://arstechnica.com/?p=1250789","updated_at":"2018-01-29T17:08:04+00:00","link_to_comments":"https://arstechnica.com/?p=1250789","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Malicious Chrome extension is next to impossible to manually remove","description":"Extensions remain the Achilles heel for an otherwise highly secure browser.","link":"https://arstechnica.com/?p=1246841","comments":"https://arstechnica.com/?p=1246841","updated_at":"2018-01-19T18:36:53+00:00","link_to_comments":"https://arstechnica.com/?p=1246841","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Spectre and Meltdown patches causing trouble as realistic attacks get closer","description":"Driver incompatibilities and microcode problems are both being reported.","link":"https://arstechnica.com/?p=1244343","comments":"https://arstechnica.com/?p=1244343","updated_at":"2018-01-15T21:05:29+00:00","link_to_comments":"https://arstechnica.com/?p=1244343","link_host":"arstechnica.com","from":"arssecurity"}]