[{"title":"Net Neutrality Op-Ed in the Wall Street Journal Was Written by Comcast Attorney","description":"<a href="https://news.ycombinator.com/item?id=15929504">Comments</a>","link":"https://theintercept.com/2017/12/14/that-net-neutrality-op-ed-in-the-wall-street-journal-was-written-by-a-comcast-attorney/","comments":"https://news.ycombinator.com/item?id=15929504","updated_at":"2017-12-15T03:34:16+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15929504","link_host":"theintercept.com","from":"hackernews"},{"title":"SF housing hunters asked to join a roommate-matching website","description":"<a href="https://news.ycombinator.com/item?id=15929418">Comments</a>","link":"http://www.sfgate.com/realestate/article/roomster-bay-area-rent-housing-craigslist-roommate-12428199.php","comments":"https://news.ycombinator.com/item?id=15929418","updated_at":"2017-12-15T03:10:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15929418","link_host":"www.sfgate.com","from":"hackernews"},{"title":"AlphaGo Teach – Find new and creative ways of playing Go","description":"<a href="https://news.ycombinator.com/item?id=15929228">Comments</a>","link":"https://alphagoteach.deepmind.com/","comments":"https://news.ycombinator.com/item?id=15929228","updated_at":"2017-12-15T02:19:34+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15929228","link_host":"alphagoteach.deepmind.com","from":"hackernews"},{"title":"New Model Warns About Crispr Gene Drives in the Wild","description":"<a href="https://news.ycombinator.com/item?id=15929012">Comments</a>","link":"https://www.quantamagazine.org/new-model-warns-about-crispr-gene-drives-in-the-wild-20171116/","comments":"https://news.ycombinator.com/item?id=15929012","updated_at":"2017-12-15T01:26:41+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15929012","link_host":"www.quantamagazine.org","from":"hackernews"},{"title":"FoldingText – Plain text productivity for Mac users","description":"<a href="https://news.ycombinator.com/item?id=15928992">Comments</a>","link":"http://www.foldingtext.com/","comments":"https://news.ycombinator.com/item?id=15928992","updated_at":"2017-12-15T01:22:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15928992","link_host":"www.foldingtext.com","from":"hackernews"},{"title":"An 8th Planet Is Found Orbiting a Distant Star, with A.I.’s Help","description":"<a href="https://news.ycombinator.com/item?id=15928983">Comments</a>","link":"https://www.nytimes.com/2017/12/14/science/eight-planets-star-system.html","comments":"https://news.ycombinator.com/item?id=15928983","updated_at":"2017-12-15T01:19:33+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15928983","link_host":"www.nytimes.com","from":"hackernews"},{"title":"Perkeep – Open-source data modeling, storing, search, sharing and synchronizing","description":"<a href="https://news.ycombinator.com/item?id=15928685">Comments</a>","link":"https://perkeep.org/","comments":"https://news.ycombinator.com/item?id=15928685","updated_at":"2017-12-15T00:16:06+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15928685","link_host":"perkeep.org","from":"hackernews"},{"title":"How to open source your ideas","description":"https://medium.com/@kateoliviadarby/how-to-open-source-your-ideas-b04c9d461c77","link":"https://www.designernews.co/stories/90297-how-to-open-source-your-ideas","comments":"https://www.designernews.co/stories/90297-how-to-open-source-your-ideas","updated_at":"2017-12-14T22:55:17+00:00","link_to_comments":"https://www.designernews.co/stories/90297-how-to-open-source-your-ideas","link_host":"medium.com","from":"designernews"},{"title":"Nuclear Test Films Declassified and Uploaded","description":"<a href="https://news.ycombinator.com/item?id=15927737">Comments</a>","link":"https://paleofuture.gizmodo.com/62-rare-nuclear-test-films-have-been-declassified-and-u-1821302584","comments":"https://news.ycombinator.com/item?id=15927737","updated_at":"2017-12-14T22:20:31+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15927737","link_host":"paleofuture.gizmodo.com","from":"hackernews"},{"title":"Truffle: Ethereum Dapp Development Framework","description":"<a href="https://news.ycombinator.com/item?id=15927641">Comments</a>","link":"http://truffleframework.com/","comments":"https://news.ycombinator.com/item?id=15927641","updated_at":"2017-12-14T22:09:50+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15927641","link_host":"truffleframework.com","from":"hackernews"},{"title":"Y Combinator announces growth program for later-stage startups","description":"<a href="https://news.ycombinator.com/item?id=15927337">Comments</a>","link":"https://venturebeat.com/2017/12/14/y-combinator-announces-growth-program-for-later-stage-startups/","comments":"https://news.ycombinator.com/item?id=15927337","updated_at":"2017-12-14T21:38:08+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15927337","link_host":"venturebeat.com","from":"hackernews"},{"title":"Excel team considering Python as scripting language: asking for feedback","description":"<a href="https://news.ycombinator.com/item?id=15927132">Comments</a>","link":"https://news.ycombinator.com/item?id=15927132","comments":"https://news.ycombinator.com/item?id=15927132","updated_at":"2017-12-14T21:16:52+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15927132","link_host":"news.ycombinator.com","from":"hackernews"},{"title":"Layman's Guide to Elliptic-Curve Digital Signatures (2014)","description":"<a href="https://news.ycombinator.com/item?id=15927090">Comments</a>","link":"https://www.royalfork.org/2014/09/04/ecc/","comments":"https://news.ycombinator.com/item?id=15927090","updated_at":"2017-12-14T21:11:47+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15927090","link_host":"www.royalfork.org","from":"hackernews"},{"title":"After backlash, animal shelter fires security robot, “effective immediately”","description":"San Francisco SPCA used Knightscope robot for a month to mitigate vandalism.","link":"https://arstechnica.com/?p=1232711","comments":"https://arstechnica.com/?p=1232711","updated_at":"2017-12-14T20:50:29+00:00","link_to_comments":"https://arstechnica.com/?p=1232711","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Amazon Will Resume Selling Apple TV, Google's Chromecast","description":"<a href="https://news.ycombinator.com/item?id=15926768">Comments</a>","link":"https://www.axios.com/amazon-will-resume-selling-apple-tv-googles-chromecast-2517483540.html","comments":"https://news.ycombinator.com/item?id=15926768","updated_at":"2017-12-14T20:39:13+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15926768","link_host":"www.axios.com","from":"hackernews"},{"title":"Now that the FCC has repealed net neutrality, let’s adopt it in California","description":"<a href="https://news.ycombinator.com/item?id=15926309">Comments</a>","link":"https://medium.com/@Scott_Wiener/now-that-the-fcc-has-repealed-net-neutrality-lets-adopt-it-in-california-fa3bd02101ee","comments":"https://news.ycombinator.com/item?id=15926309","updated_at":"2017-12-14T19:57:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15926309","link_host":"medium.com","from":"hackernews"},{"title":"Facebook Will Introduce Ads as Videos Start, a Move Long Resisted","description":"<a href="https://news.ycombinator.com/item?id=15926044">Comments</a>","link":"https://www.wsj.com/articles/facebook-revamps-video-ads-amid-publisher-concerns-1513269992","comments":"https://news.ycombinator.com/item?id=15926044","updated_at":"2017-12-14T19:35:39+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15926044","link_host":"www.wsj.com","from":"hackernews"},{"title":"The Collapse of Complex Business Models (2010)","description":"<a href="https://news.ycombinator.com/item?id=15925940">Comments</a>","link":"http://www.shirky.com/weblog/2010/04/the-collapse-of-complex-business-models/","comments":"https://news.ycombinator.com/item?id=15925940","updated_at":"2017-12-14T19:27:29+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15925940","link_host":"www.shirky.com","from":"hackernews"},{"title":"Etsy Announces Move to Google Cloud","description":"<a href="https://news.ycombinator.com/item?id=15925930">Comments</a>","link":"https://investors.etsy.com/news-and-events/press-releases/2017/12-14-2017-130416690","comments":"https://news.ycombinator.com/item?id=15925930","updated_at":"2017-12-14T19:26:41+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15925930","link_host":"investors.etsy.com","from":"hackernews"},{"title":"Millennials Are Screwed - The Huffington Post","description":"http://highline.huffingtonpost.com/articles/en/poor-millennials/","link":"https://www.designernews.co/stories/90294-millennials-are-screwed--the-huffington-post","comments":"https://www.designernews.co/stories/90294-millennials-are-screwed--the-huffington-post","updated_at":"2017-12-14T19:24:03+00:00","link_to_comments":"https://www.designernews.co/stories/90294-millennials-are-screwed--the-huffington-post","link_host":"highline.huffingtonpost.com","from":"designernews"},{"title":"Show HN: Servers.lol – Should Your EC2 Be a Lambda?","description":"<a href="https://news.ycombinator.com/item?id=15925736">Comments</a>","link":"https://servers.lol","comments":"https://news.ycombinator.com/item?id=15925736","updated_at":"2017-12-14T19:10:51+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15925736","link_host":"servers.lol","from":"hackernews"},{"title":"Do Styles define you as a creative professional? Michael Fugoso talks to DCA about skeuomorphic design","description":"https://www.digitalcomputerarts.com/stories/styles-help-but-dont-define-you-a-creative-tale-with-michael-fugoso","link":"https://www.designernews.co/stories/90293-do-styles-define-you-as-a-creative-professional-michaelfugoso-talks-to-dca-about-skeuomorphic-design","comments":"https://www.designernews.co/stories/90293-do-styles-define-you-as-a-creative-professional-michaelfugoso-talks-to-dca-about-skeuomorphic-design","updated_at":"2017-12-14T18:25:42+00:00","link_to_comments":"https://www.designernews.co/stories/90293-do-styles-define-you-as-a-creative-professional-michaelfugoso-talks-to-dca-about-skeuomorphic-design","link_host":"www.digitalcomputerarts.com","from":"designernews"},{"title":"F.C.C. Repeals Net Neutrality Rules","description":"<a href="https://news.ycombinator.com/item?id=15924794">Comments</a>","link":"https://www.nytimes.com/2017/12/14/technology/net-neutrality-repeal-vote.html","comments":"https://news.ycombinator.com/item?id=15924794","updated_at":"2017-12-14T18:13:35+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15924794","link_host":"www.nytimes.com","from":"hackernews"},{"title":"Docusaurus – infrastructure to help manage open source websites","description":"<a href="https://news.ycombinator.com/item?id=15924779">Comments</a>","link":"https://docusaurus.io/blog/2017/12/14/introducing-docusaurus.html","comments":"https://news.ycombinator.com/item?id=15924779","updated_at":"2017-12-14T18:13:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15924779","link_host":"docusaurus.io","from":"hackernews"},{"title":"Disney: Illustrations for the Star Darlings project","description":"https://www.behance.net/gallery/59885709/DISNEY-STAR-DARLINGS-Items-Accessories-Patterns","link":"https://www.designernews.co/stories/90292-disney-illustrations-for-the-star-darlings-project","comments":"https://www.designernews.co/stories/90292-disney-illustrations-for-the-star-darlings-project","updated_at":"2017-12-14T18:09:27+00:00","link_to_comments":"https://www.designernews.co/stories/90292-disney-illustrations-for-the-star-darlings-project","link_host":"www.behance.net","from":"designernews"},{"title":"Cryptocurrency will always be political","description":"<a href="https://news.ycombinator.com/item?id=15924159">Comments</a>","link":"http://nautil.us/issue/55/trust/the-bitcoin-paradox","comments":"https://news.ycombinator.com/item?id=15924159","updated_at":"2017-12-14T17:20:40+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15924159","link_host":"nautil.us","from":"hackernews"},{"title":"E Pur Si Muove","description":"<a href="https://news.ycombinator.com/item?id=15924093">Comments</a>","link":"http://blog.samaltman.com/e-pur-si-muove","comments":"https://news.ycombinator.com/item?id=15924093","updated_at":"2017-12-14T17:13:03+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15924093","link_host":"blog.samaltman.com","from":"hackernews"},{"title":"Zajno Music Playlist \"Crappy Explanation\" #02","description":"https://open.spotify.com/user/07tmdyt41li0h95g7md4rt7g8/playlist/1rQFRD3IasKnAsds0TsDdw","link":"https://www.designernews.co/stories/90288-zajno-music-playlist-crappy-explanation-02","comments":"https://www.designernews.co/stories/90288-zajno-music-playlist-crappy-explanation-02","updated_at":"2017-12-14T16:54:37+00:00","link_to_comments":"https://www.designernews.co/stories/90288-zajno-music-playlist-crappy-explanation-02","link_host":"open.spotify.com","from":"designernews"},{"title":"Spanner, TrueTime and the CAP Theorem [pdf]","description":"<a href="https://news.ycombinator.com/item?id=15923507">Comments</a>","link":"https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45855.pdf","comments":"https://news.ycombinator.com/item?id=15923507","updated_at":"2017-12-14T16:25:05+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15923507","link_host":"static.googleusercontent.com","from":"hackernews"},{"title":"Framer shares a first look at their all-new screen design tool","description":"https://framer.com/features/design/?utm_source=designernews&utm_medium=post&utm_campaign=vector_features&utm_content=launch","link":"https://www.designernews.co/stories/90285-framer-shares-a-first-look-at-their-allnew-screen-design-tool","comments":"https://www.designernews.co/stories/90285-framer-shares-a-first-look-at-their-allnew-screen-design-tool","updated_at":"2017-12-14T16:13:24+00:00","link_to_comments":"https://www.designernews.co/stories/90285-framer-shares-a-first-look-at-their-allnew-screen-design-tool","link_host":"framer.com","from":"designernews"},{"title":"Delite: How and Why it Failed","description":"https://failory.com/interview/delite","link":"https://www.designernews.co/stories/90284-delite-how-and-why-it-failed","comments":"https://www.designernews.co/stories/90284-delite-how-and-why-it-failed","updated_at":"2017-12-14T16:11:15+00:00","link_to_comments":"https://www.designernews.co/stories/90284-delite-how-and-why-it-failed","link_host":"failory.com","from":"designernews"},{"title":"Fundamentals of Linear Algebra and Optimization [pdf]","description":"<a href="https://news.ycombinator.com/item?id=15923338">Comments</a>","link":"http://www.seas.upenn.edu/~cis515/linalg.pdf","comments":"https://news.ycombinator.com/item?id=15923338","updated_at":"2017-12-14T16:07:54+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15923338","link_host":"www.seas.upenn.edu","from":"hackernews"},{"title":"Affinity Publisher teased in new sneak-peek video","description":"https://www.youtube.com/watch?v=jZHAk1a8vi0","link":"https://www.designernews.co/stories/90283-affinity-publisher-teased-in-new-sneakpeek-video","comments":"https://www.designernews.co/stories/90283-affinity-publisher-teased-in-new-sneakpeek-video","updated_at":"2017-12-14T15:47:37+00:00","link_to_comments":"https://www.designernews.co/stories/90283-affinity-publisher-teased-in-new-sneakpeek-video","link_host":"www.youtube.com","from":"designernews"},{"title":"Haemophilia A trial results 'mind-blowing'","description":"<a href="https://news.ycombinator.com/item?id=15923021">Comments</a>","link":"http://www.bbc.com/news/health-42337396","comments":"https://news.ycombinator.com/item?id=15923021","updated_at":"2017-12-14T15:33:37+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15923021","link_host":"www.bbc.com","from":"hackernews"},{"title":"What the SATs Taught Us about Finding the Perfect Fit","description":"<a href="https://news.ycombinator.com/item?id=15922752">Comments</a>","link":"http://multithreaded.stitchfix.com/blog/2017/12/13/latentsize/","comments":"https://news.ycombinator.com/item?id=15922752","updated_at":"2017-12-14T15:04:04+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15922752","link_host":"multithreaded.stitchfix.com","from":"hackernews"},{"title":"Why design systems fail","description":"https://24ways.org/2017/why-design-systems-fail/","link":"https://www.designernews.co/stories/90282-why-design-systems-fail","comments":"https://www.designernews.co/stories/90282-why-design-systems-fail","updated_at":"2017-12-14T15:03:25+00:00","link_to_comments":"https://www.designernews.co/stories/90282-why-design-systems-fail","link_host":"24ways.org","from":"designernews"},{"title":"iMac Pro Now Available","description":"https://www.apple.com/shop/buy-mac/imac-pro","link":"https://www.designernews.co/stories/90281-imac-pro-now-available","comments":"https://www.designernews.co/stories/90281-imac-pro-now-available","updated_at":"2017-12-14T14:48:00+00:00","link_to_comments":"https://www.designernews.co/stories/90281-imac-pro-now-available","link_host":"www.apple.com","from":"designernews"},{"title":"Splash Pages at Startup Speed","description":"https://current.innovatemap.com/wisdom/splash-pages-at-startup-speed/","link":"https://www.designernews.co/stories/90279-splash-pages-at-startup-speed","comments":"https://www.designernews.co/stories/90279-splash-pages-at-startup-speed","updated_at":"2017-12-14T13:30:28+00:00","link_to_comments":"https://www.designernews.co/stories/90279-splash-pages-at-startup-speed","link_host":"current.innovatemap.com","from":"designernews"},{"title":"How we used Figma to reconstruct our website","description":"https://www.xfive.co/blog/figma-reconstruct-website/","link":"https://www.designernews.co/stories/90278-how-we-used-figma-to-reconstruct-our-website","comments":"https://www.designernews.co/stories/90278-how-we-used-figma-to-reconstruct-our-website","updated_at":"2017-12-14T13:17:16+00:00","link_to_comments":"https://www.designernews.co/stories/90278-how-we-used-figma-to-reconstruct-our-website","link_host":"www.xfive.co","from":"designernews"},{"title":"Wonderland. 2017 – a mini experience about spaceships","description":"http://2017.wonderlandindustry.com","link":"https://www.designernews.co/stories/90275-wonderland-2017--a-mini-experience-about-spaceships","comments":"https://www.designernews.co/stories/90275-wonderland-2017--a-mini-experience-about-spaceships","updated_at":"2017-12-14T12:20:48+00:00","link_to_comments":"https://www.designernews.co/stories/90275-wonderland-2017--a-mini-experience-about-spaceships","link_host":"2017.wonderlandindustry.com","from":"designernews"},{"title":"Disney to Acquire Twenty-First Century Fox","description":"<a href="https://news.ycombinator.com/item?id=15921692">Comments</a>","link":"https://thewaltdisneycompany.com/walt-disney-company-acquire-twenty-first-century-fox-inc-spinoff-certain-businesses-52-4-billion-stock/","comments":"https://news.ycombinator.com/item?id=15921692","updated_at":"2017-12-14T12:18:46+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15921692","link_host":"thewaltdisneycompany.com","from":"hackernews"},{"title":"Site Design: Stripe Atlas Guides","description":"https://stripe.com/atlas/guides","link":"https://www.designernews.co/stories/90274-site-design-stripe-atlas-guides","comments":"https://www.designernews.co/stories/90274-site-design-stripe-atlas-guides","updated_at":"2017-12-14T11:57:44+00:00","link_to_comments":"https://www.designernews.co/stories/90274-site-design-stripe-atlas-guides","link_host":"stripe.com","from":"designernews"},{"title":"Three Hackers Plead Guilty to Creating IoT-based Mirai DDoS Botnet","description":"The U.S. federal officials have arrested three hackers who have pleaded guilty to computer-crimes charges for creating and distributing Mirai botnet that crippled some of the world's biggest and most popular websites by launching the massive DDoS attacks last year.\n\nAccording to the federal court documents unsealed Tuesday, Paras Jha (21-year-old from New Jersey), Josiah White (20-year-old<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=-Lu1C2ASK7U:NMY0k95zyqw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/-Lu1C2ASK7U" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/-Lu1C2ASK7U/hacker-ddos-mirai-botnet.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-Lu1C2ASK7U/hacker-ddos-mirai-botnet.html","updated_at":"2017-12-14T10:15:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/-Lu1C2ASK7U/hacker-ddos-mirai-botnet.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Zero-Day Remote 'Root' Exploit Disclosed In AT&T DirecTV WVB Devices","description":"Security researchers have publicly disclosed an unpatched zero-day vulnerability in the firmware of AT&amp;T DirecTV WVB kit after trying to get the device manufacturer to patch this easy-to-exploit flaw over the past few months.\n\nThe problem is with a core component of the Genie DVR system that's shipped free of cost with DirecTV and can be easily exploited by hackers to gain root access and take<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Un-JlvZeTsA:SRV6smbcsvA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Un-JlvZeTsA" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Un-JlvZeTsA/directv-wvb-hack.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Un-JlvZeTsA/directv-wvb-hack.html","updated_at":"2017-12-14T09:20:07+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Un-JlvZeTsA/directv-wvb-hack.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Animating Border","description":"https://css-tricks.com/animating-border","link":"https://www.designernews.co/stories/90269-animating-border","comments":"https://www.designernews.co/stories/90269-animating-border","updated_at":"2017-12-14T08:35:01+00:00","link_to_comments":"https://www.designernews.co/stories/90269-animating-border","link_host":"csstricks.com","from":"designernews"},{"title":"Top 20 Customer Journey Mapping Tools: An Overview","description":"https://mopinion.com/top-20-customer-journey-mapping-tools-overview/","link":"https://www.designernews.co/stories/90268-top-20-customer-journey-mapping-tools-an-overview","comments":"https://www.designernews.co/stories/90268-top-20-customer-journey-mapping-tools-an-overview","updated_at":"2017-12-14T08:30:06+00:00","link_to_comments":"https://www.designernews.co/stories/90268-top-20-customer-journey-mapping-tools-an-overview","link_host":"mopinion.com","from":"designernews"},{"title":"Design your own principles","description":"https://principles.design/","link":"https://www.designernews.co/stories/90267-design-your-own-principles","comments":"https://www.designernews.co/stories/90267-design-your-own-principles","updated_at":"2017-12-14T08:23:34+00:00","link_to_comments":"https://www.designernews.co/stories/90267-design-your-own-principles","link_host":"principles.design","from":"designernews"},{"title":"How the US Pushed Sweden to Take Down the Pirate Bay","description":"<a href="https://news.ycombinator.com/item?id=15920618">Comments</a>","link":"https://torrentfreak.com/how-the-us-pushed-sweden-to-take-down-the-pirate-bay-171212/","comments":"https://news.ycombinator.com/item?id=15920618","updated_at":"2017-12-14T07:48:36+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15920618","link_host":"torrentfreak.com","from":"hackernews"},{"title":"Fluid Slider [Swift, Open Source]","description":"https://github.com/Ramotion/fluid-slider","link":"https://www.designernews.co/stories/90263-fluid-slider-swift-open-source","comments":"https://www.designernews.co/stories/90263-fluid-slider-swift-open-source","updated_at":"2017-12-14T06:04:06+00:00","link_to_comments":"https://www.designernews.co/stories/90263-fluid-slider-swift-open-source","link_host":"github.com","from":"designernews"},{"title":"Machine Learning 101 slidedeck: 2 years of headbanging, so you don't have to","description":"<a href="https://news.ycombinator.com/item?id=15919115">Comments</a>","link":"https://docs.google.com/presentation/d/1kSuQyW5DTnkVaZEjGYCkfOxvzCqGEFzWBy4e9Uedd9k/preview?imm_mid=0f9b7e&cmp=em-data-na-na-newsltr_20171213&slide=id.g183f28bdc3_0_90","comments":"https://news.ycombinator.com/item?id=15919115","updated_at":"2017-12-14T00:54:14+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15919115","link_host":"docs.google.com","from":"hackernews"},{"title":"Ask DN: Hiding portfolio content on small screens","description":"I've noticed a trend recently of designers hiding their content completely on small screens (these examples are all developed by [Aristide Benoist](https://www.aristidebenoist.com/)... can that be considered a trend? lol)\n\n[Example](https://imgur.com/a/4VNhr)\n\nThis isn't a critique, I'm genuinely interested in what others think about the practice – is it just a matter of being able to control how people view your work? I know Christopher Nolan would die if you told him you were watching Dunkirk on your iPhone X, but you _CAN_ still choose to watch it.\n\nJenny, Ben, Aristide, if you're reading, would love to know your reasoning behind the decision!","link":"https://www.designernews.co/stories/90258-ask-dn-hiding-portfolio-content-on-small-screens","comments":"https://www.designernews.co/stories/90258-ask-dn-hiding-portfolio-content-on-small-screens","updated_at":"2017-12-13T21:45:26+00:00","link_to_comments":"https://www.designernews.co/stories/90258-ask-dn-hiding-portfolio-content-on-small-screens","link_host":"www.aristidebenoist.com","from":"designernews"},{"title":"Expo.io Redesign","description":"https://expo.io/","link":"https://www.designernews.co/stories/90257-expoio-redesign","comments":"https://www.designernews.co/stories/90257-expoio-redesign","updated_at":"2017-12-13T21:10:49+00:00","link_to_comments":"https://www.designernews.co/stories/90257-expoio-redesign","link_host":"expo.io","from":"designernews"},{"title":"Popmotion 8.0 - A functional, reactive JavaScript motion library","description":"https://popmotion.io/","link":"https://www.designernews.co/stories/90253-popmotion-80--a-functional-reactive-javascript-motion-library","comments":"https://www.designernews.co/stories/90253-popmotion-80--a-functional-reactive-javascript-motion-library","updated_at":"2017-12-13T18:53:25+00:00","link_to_comments":"https://www.designernews.co/stories/90253-popmotion-80--a-functional-reactive-javascript-motion-library","link_host":"popmotion.io","from":"designernews"},{"title":"Motion design for the web, iOS & Android with Haiku","description":"https://medium.com/haiku-blog/getting-started-with-animations-for-the-web-ios-android-with-haiku-568184eb31fa","link":"https://www.designernews.co/stories/90251-motion-design-for-the-web-ios--android-with-haiku","comments":"https://www.designernews.co/stories/90251-motion-design-for-the-web-ios--android-with-haiku","updated_at":"2017-12-13T16:57:11+00:00","link_to_comments":"https://www.designernews.co/stories/90251-motion-design-for-the-web-ios--android-with-haiku","link_host":"medium.com","from":"designernews"},{"title":"How to make a ghost theme","description":"http://robots.thoughtbot.com/how-to-make-a-ghost-theme","link":"https://www.designernews.co/stories/90249-how-to-make-a-ghost-theme","comments":"https://www.designernews.co/stories/90249-how-to-make-a-ghost-theme","updated_at":"2017-12-13T16:41:11+00:00","link_to_comments":"https://www.designernews.co/stories/90249-how-to-make-a-ghost-theme","link_host":"robots.thoughtbot.com","from":"designernews"},{"title":"Elements —iOS UI kit by Sketch","description":"https://sketchapp.com/elements","link":"https://www.designernews.co/stories/90245-elements-ios-ui-kit-by-sketch","comments":"https://www.designernews.co/stories/90245-elements-ios-ui-kit-by-sketch","updated_at":"2017-12-13T15:42:17+00:00","link_to_comments":"https://www.designernews.co/stories/90245-elements-ios-ui-kit-by-sketch","link_host":"sketchapp.com","from":"designernews"},{"title":"Bootsketch: Design sites faster (looking for feedback)","description":"Hi All! Really excited to share my latest project **[Bootsketch.com](http://bootsketch.com/)** with you. I'm treating this as a **"soft launch"** to get some feedback from other designers before I drive traffic to it.\n***\n## What is bootsketch?\nBootsketch is a sketch file that gives you all of the Bootstrap components in the latest 4.0 documentation.\n\n## The problem\nI design a lot of sites that are developed in Bootstrap. All of the current Bootstrap sketch files seem to be missing the mark. no symbols or poor use of symbols, ineffective symbol overrides, unorganized, not resizable, colors / type aren't linked to components\n\n## My Solution\nIn Bootsketch I've created each symbol to be **resizable, intuitive, and extendable**\n\n**All colors** are linked to layer styles and symbols so updating branding is extremely quick and easy. Updating text styles is just as easy\n\n![Image title](http://www.bootsketch.com/assets/img/self-explanatory.png)\n![image title](http://www.bootsketch.com/assets/img/gifs/3.9-resize-carousel-min.gif)\n\n***\n# With all of that said...\nI welcome any bit of feedback you might have. Anything from:\n\n- Price point \n- Design \n- Copy \n- How useful you think the product is \n- What would you change, etc.\n\n*This is the first place I'm posting it, so I can get feedback and iterate. As a thank you here is coupon code for $20 off [Bootsketch](http://bootsketch.com/)*\n\n## Coupon code:\n> DNForTheWin\t\n\n### Update: \nThanks so much for the positive feedback, DN! I've created a public trello board for everyone to add wishlist items, bugs, future updates, etc. Feel free to add your requests to this board https://trello.com/b/0FRbgQvy/bootsketch","link":"https://www.designernews.co/stories/90235-bootsketch-design-sites-faster-looking-for-feedback","comments":"https://www.designernews.co/stories/90235-bootsketch-design-sites-faster-looking-for-feedback","updated_at":"2017-12-13T13:15:34+00:00","link_to_comments":"https://www.designernews.co/stories/90235-bootsketch-design-sites-faster-looking-for-feedback","link_host":"bootsketch.com","from":"designernews"},{"title":"Password Stealing Apps With Over A Million Downloads Found On Google Play Store","description":"Even after so many efforts by Google like launching bug bounty program and preventing apps from using Android accessibility services, malicious applications somehow manage to get into Play Store and infect people with malicious software.\n\nThe same happened once again when security researchers discovered at least 85 applications in Google Play Store that were designed to steal credentials from<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=2fZKSp2h1Yw:9HmScvYMmqk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/2fZKSp2h1Yw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/2fZKSp2h1Yw/google-playstore-malware.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2fZKSp2h1Yw/google-playstore-malware.html","updated_at":"2017-12-13T10:57:55+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2fZKSp2h1Yw/google-playstore-malware.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Accessing Publicly Available Information on the Internet Is Not a Crime","description":"<a href="https://news.ycombinator.com/item?id=15912706">Comments</a>","link":"https://www.eff.org/deeplinks/2017/12/eff-court-accessing-publicly-available-information-internet-not-crime","comments":"https://news.ycombinator.com/item?id=15912706","updated_at":"2017-12-13T07:42:30+00:00","link_to_comments":"https://news.ycombinator.com/item?id=15912706","link_host":"www.eff.org","from":"hackernews"},{"title":"ROBOT Attack: 19-Year-Old Bleichenbacher Attack On Encrypted Web Reintroduced","description":"A 19-year-old vulnerability has been re-discovered in the RSA implementation from at least 8 different vendors—including F5, Citrix, and Cisco—that can give man-in-the-middle attackers access to encrypted messages.\n\nDubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xJFEesWsWc8:c8uGkJSYaIw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xJFEesWsWc8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xJFEesWsWc8/bleichenbacher-robot-rsa.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xJFEesWsWc8/bleichenbacher-robot-rsa.html","updated_at":"2017-12-12T19:10:12+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xJFEesWsWc8/bleichenbacher-robot-rsa.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Collection of 1.4 Billion Plain-Text Leaked Passwords Found Circulating Online","description":"Hackers always first go for the weakest link to quickly gain access to your online accounts.\n\nOnline users habit of reusing the same password across multiple services gives hackers opportunity to use the credentials gathered from a data breach to break into their other online accounts.\n\nResearchers from security firm 4iQ have now discovered a new collective database on the dark web (released<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=bhPS91LzMbU:Szp95r0I8mk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/bhPS91LzMbU" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/bhPS91LzMbU/data-breach-password-list.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bhPS91LzMbU/data-breach-password-list.html","updated_at":"2017-12-12T14:36:35+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/bhPS91LzMbU/data-breach-password-list.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Google Researcher Releases iOS Exploit—Could Enable iOS 11 Jailbreak","description":"As promised last week, Google's Project Zero researcher Ian Beer now publicly disclosed an exploit that works on almost all 64-bit Apple devices running iOS 11.1.2 or earlier, which can be used to build an iOS jailbreak, allowing users to run apps from non-Apple sources.\n\nOn Monday morning, Beer shared the details on the exploit, dubbed "tfp0," which leveraged double-free memory corruption<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xipBDge8cSw:rHa7ZeBdgRo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xipBDge8cSw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xipBDge8cSw/ios11-jailbreak-exploit.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xipBDge8cSw/ios11-jailbreak-exploit.html","updated_at":"2017-12-12T07:42:22+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xipBDge8cSw/ios11-jailbreak-exploit.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Newly Uncovered 'MoneyTaker' Hacker Group Stole Millions from U.S. & Russian Banks","description":"Security researchers have uncovered a previously undetected group of Russian-speaking hackers that has silently been targeting Banks, financial institutions, and legal firms, primarily in the United States, UK, and Russia.\n\nMoscow-based security firm Group-IB published a 36-page report on Monday, providing details about the newly-disclosed hacking group, dubbed MoneyTaker, which has been<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Y29HvjbbWXc:sihmiKegkYQ:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Y29HvjbbWXc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y29HvjbbWXc/bank-hackers.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y29HvjbbWXc/bank-hackers.html","updated_at":"2017-12-11T18:24:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Y29HvjbbWXc/bank-hackers.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Get the Ultimate 2018 Hacker Bundle – Pay What You Want","description":"Due to the growing number of threats in the computer world, ethical hackers have become the most important player for not only governments but also private companies and IT firms in order to safeguard their systems and networks from hackers trying to infiltrate them.\n\nBy 2020, employment in all information technology occupations is expected to increase by 22 percent, where demand for ethical<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=_Ktt2XQXLtM:5LcFDs6diqw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/_Ktt2XQXLtM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/_Ktt2XQXLtM/ethical-hacking-trainings.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_Ktt2XQXLtM/ethical-hacking-trainings.html","updated_at":"2017-12-11T12:37:06+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/_Ktt2XQXLtM/ethical-hacking-trainings.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"THN Weekly Roundup — Top 10 Stories You Should Not Miss","description":"Here we are with our weekly roundup, briefing this week's top cybersecurity threats, incidents, and challenges, just in case you missed any of them.\n\nLast week has been very short with big news from the theft of over 4,700 Bitcoins from the largest cryptocurrency mining marketplace to the discovery of a new malware evasion technique that works on all versions of Microsoft's Windows operating<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=10t0tgFLkxY:A0B6RThNrYc:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/10t0tgFLkxY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/10t0tgFLkxY/cybersecurity-hacking-news.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/10t0tgFLkxY/cybersecurity-hacking-news.html","updated_at":"2017-12-11T09:45:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/10t0tgFLkxY/cybersecurity-hacking-news.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Microsoft Issues Emergency Windows Security Update For A Critical Vulnerability","description":"Microsoft has just released an emergency security patch to address a critical remote code execution (RCE) vulnerability in its Malware Protection Engine (MPE) that could allow an attacker to take full control of a victim's PC.\n\nEnabled by default, Microsoft Malware Protection Engine offers the core cybersecurity capabilities, like scanning, detection, and cleaning, for the company's<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=WLd3BGXDDW8:9QMa0p3D5hk:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/WLd3BGXDDW8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/WLd3BGXDDW8/windows-update-malware-protection.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/WLd3BGXDDW8/windows-update-malware-protection.html","updated_at":"2017-12-10T15:48:18+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/WLd3BGXDDW8/windows-update-malware-protection.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Pre-Installed Keylogger Found On Over 460 HP Laptop Models","description":"HP has an awful history of 'accidentally' leaving keyloggers onto its customers' laptops. At least two times this year, HP laptops were caught with pre-installed keylogger or spyware applications.\n\nI was following a tweet made by a security researcher claiming to have found a built-in keylogger in several HP laptops, and now he went public with his findings.\n\nA security researcher who goes by<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=C6i1i_IQO9Q:_uINANtePwg:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/C6i1i_IQO9Q" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/C6i1i_IQO9Q/hp-laptop-keylogger.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/C6i1i_IQO9Q/hp-laptop-keylogger.html","updated_at":"2017-12-09T10:57:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/C6i1i_IQO9Q/hp-laptop-keylogger.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Android Flaw Lets Hackers Inject Malware Into Apps Without Altering Signatures","description":"Millions of Android devices are at serious risk of a newly disclosed critical vulnerability that allows attackers to secretly overwrite legitimate applications installed on your smartphone with their malicious versions.\n\nDubbed Janus, the vulnerability allows attackers to modify the code of Android apps without affecting their signature verification certificates, eventually allowing them to<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Nwne9IiqjBc:XGkNlZJNuuA:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Nwne9IiqjBc" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Nwne9IiqjBc/android-malware-signature.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Nwne9IiqjBc/android-malware-signature.html","updated_at":"2017-12-09T09:30:46+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Nwne9IiqjBc/android-malware-signature.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Chrome 63 offers even more protection from malicious sites, using even more memory","description":"Google gives Administrators new ways to lock down the browser.","link":"https://arstechnica.com/?p=1228973","comments":"https://arstechnica.com/?p=1228973","updated_at":"2017-12-07T21:50:01+00:00","link_to_comments":"https://arstechnica.com/?p=1228973","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Security Flaw Left Major Banking Apps Vulnerable to MiTM Attacks Over SSL","description":"A team of security researchers has discovered a critical implementation flaw in major mobile banking applications that left banking credentials of millions of users vulnerable to hackers.\n\nThe vulnerability was discovered by researchers of the Security and Privacy Group at the University of Birmingham, who tested hundreds of different banking apps—both iOS and Android—and found that several of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=ptk2uo3y0v8:l39RdxfM1qs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ptk2uo3y0v8" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/ptk2uo3y0v8/mitm-ssl-pinning-hostname.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ptk2uo3y0v8/mitm-ssl-pinning-hostname.html","updated_at":"2017-12-07T19:31:02+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/ptk2uo3y0v8/mitm-ssl-pinning-hostname.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Process Doppelgänging: New Malware Evasion Technique Works On All Windows Versions","description":"A team of security researchers has discovered a new malware evasion technique that could help malware authors defeat most of the modern antivirus solutions and forensic tools.\n\nDubbed Process Doppelgänging, the new fileless code injection technique takes advantage of a built-in Windows function and an undocumented implementation of Windows process loader.\n\nEnsilo security researchers Tal<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=XDIYp-wDa98:6Y7gAFWVDXw:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/XDIYp-wDa98" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/XDIYp-wDa98/malware-process-doppelganging.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XDIYp-wDa98/malware-process-doppelganging.html","updated_at":"2017-12-07T16:03:11+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/XDIYp-wDa98/malware-process-doppelganging.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Largest Crypto-Mining Exchange Hacked; Over $70 Million in Bitcoin Stolen","description":"Bitcoin is breaking every record—after gaining 20% jump last week, Bitcoin price just crossed the $14,800 mark in less than 24 hours—and there can be no better reason for hackers to put all of their efforts to steal skyrocketing cryptocurrency.\n\nNiceHash, the largest Bitcoin mining marketplace, has been hacked, which resulted in the theft of more than 4,700 Bitcoins worth over $57 million (at<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=folT_Mv6WGw:UO3JcVt_MX4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/folT_Mv6WGw" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/folT_Mv6WGw/bitcoin-mining-hacked.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/folT_Mv6WGw/bitcoin-mining-hacked.html","updated_at":"2017-12-07T09:28:50+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/folT_Mv6WGw/bitcoin-mining-hacked.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Uber Paid 20-Year-Old Florida Hacker $100,000 to Keep Data Breach Secret","description":"Last year, Uber received an email from an anonymous person demanding money in exchange for the stolen user database.\n\nIt turns out that a 20-year-old Florida man, with the help of another, breached Uber's system last year and was paid a huge amount by the company to destroy the data and keep the incident secret.\n\nJust last week, Uber announced that a massive data breach in October 2016 exposed<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=vPvMpSpNVgo:VnhaBS-d4NI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/vPvMpSpNVgo" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/vPvMpSpNVgo/uber-hacker.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vPvMpSpNVgo/uber-hacker.html","updated_at":"2017-12-07T07:49:31+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/vPvMpSpNVgo/uber-hacker.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"New TeamViewer Hack Could Allow Clients to Hijack Viewers' Computer","description":"Do you have remote support software TeamViewer installed on your desktop?\n\nIf yes, then you should pay attention to a critical vulnerability discovered in the software that could allow users sharing a desktop session to gain complete control of the other's PC without permission.\n\nTeamViewer is a popular remote-support software that lets you securely share your desktop or take full control of<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=nAv_RUo3InY:SnwL5BuAeY8:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/nAv_RUo3InY" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/nAv_RUo3InY/teamviewer-hacking-tool.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/nAv_RUo3InY/teamviewer-hacking-tool.html","updated_at":"2017-12-06T16:28:43+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/nAv_RUo3InY/teamviewer-hacking-tool.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Critical Flaw in Major Android Tools Targets Developers and Reverse Engineers","description":"Finally, here we have a vulnerability that targets Android developers and reverse engineers, instead of app users.\n\nSecurity researchers have discovered an easily-exploitable vulnerability in Android application developer tools, both downloadable and cloud-based, that could allow attackers to steal files and execute malicious code on vulnerable systems remotely.\n\nThe issue was discovered by<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=SEZn1h33Vqs:mHTf6iOMFAY:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/SEZn1h33Vqs" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/SEZn1h33Vqs/android-development-tools.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SEZn1h33Vqs/android-development-tools.html","updated_at":"2017-12-06T11:54:24+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/SEZn1h33Vqs/android-development-tools.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Feds Shut Down 'Longest-Running' Andromeda Botnet","description":"In a coordinated International cyber operation, Europol with the help of international law enforcement agencies has taken down what it called "one of the longest-running malware families in existence" known as Andromeda.\n\nAndromeda, also known as Win32/Gamarue, is an infamous HTTP-based modular botnet that has been around for several years now, and infecting computers with it's malicious<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=Sc28smlbyhQ:NZQfNlj54N4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Sc28smlbyhQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/Sc28smlbyhQ/andromeda-botnet.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Sc28smlbyhQ/andromeda-botnet.html","updated_at":"2017-12-05T16:53:51+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/Sc28smlbyhQ/andromeda-botnet.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million Users","description":"In the digital age, one of the most popular sayings is—if you're not paying, then you're not the customer, you're the product.\n\nWhile downloading apps on their smartphones, most users may not realize how much data they collect on you.\n\nBelieve me; it’s way more than you can imagine.\n\nNowadays, many app developers are following irresponsible practices that are worth understanding, and we don't<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=UaHiJjb6TOM:iOP6y6Gn4ak:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/UaHiJjb6TOM" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/UaHiJjb6TOM/keyboard-data-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/UaHiJjb6TOM/keyboard-data-breach.html","updated_at":"2017-12-05T16:08:58+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/UaHiJjb6TOM/keyboard-data-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"MailSploit — Email Spoofing Flaw Affects Over 30 Popular Email Clients","description":"If you receive an email that looks like it's from one of your friends, just beware! It's possible that the email has been sent by someone else in an attempt to compromise your system.\n\nA security researcher has discovered a collection of vulnerabilities in more than 30 popular email client applications that could allow anyone to send spoofed emails bypassing anti-spoofing mechanisms.\n&lt;!--<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=2SDJBb7giv4:voIbO-2VcLs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/2SDJBb7giv4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/2SDJBb7giv4/email-spoofing-client.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2SDJBb7giv4/email-spoofing-client.html","updated_at":"2017-12-05T12:34:21+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2SDJBb7giv4/email-spoofing-client.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Young Hacker, Who Took Over Jail Network to Get Friend Released Early, Faces Prison","description":"Well, "a friend in need is a friend indeed" goes a long way, but in this case, this phrase hardly makes any sense.\n\nA 27-year-old Michigan man who hacked into the government computer system of Washtenaw County Jail to alter inmate records and gain early release for his friend is now himself facing federal charges after getting caught.\n\nKonrads Voits from Ann Arbor, Michigan, pleaded guilty in<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=a3_1yCVriw0:kNLV3aPYMsI:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/a3_1yCVriw0" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/a3_1yCVriw0/hacking-jail-records.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/a3_1yCVriw0/hacking-jail-records.html","updated_at":"2017-12-05T08:38:48+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/a3_1yCVriw0/hacking-jail-records.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Is Your DJI Drone a Chinese Spy? Leaked DHS Memo Suggests","description":"The United States Department of Homeland Security (DHS) has recently accused Da-Jiang Innovations (DJI), one of the largest drone manufacturers, of sending sensitive information about U.S. infrastructure to China through its commercial drones and software.\n\nA copy memo from the Los Angeles office of the Immigration and Customs Enforcement bureau (ICE) has begun circulating online more recently<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=xYjBlMUcpBI:pdCbVFld2cs:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xYjBlMUcpBI" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/xYjBlMUcpBI/dji-drone-china-spying.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xYjBlMUcpBI/dji-drone-china-spying.html","updated_at":"2017-12-04T13:05:19+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/xYjBlMUcpBI/dji-drone-china-spying.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"PayPal Subsidiary Data Breach Hits Up to 1.6 Million Customers","description":"Global e-commerce business PayPal has disclosed a data breach that may have compromised personally identifiable information for roughly 1.6 million customers at a payment processing company PayPal acquired earlier this year.\n\nPayPal Holdings Inc. said Friday that a review of its recently acquired company TIO Networks showed evidence of unauthorized access to the company's network, including<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=2SgcIyiWMX4:atGicoGxH3o:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/2SgcIyiWMX4" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/2SgcIyiWMX4/paypal-tio-data-breach.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2SgcIyiWMX4/paypal-tio-data-breach.html","updated_at":"2017-12-04T08:30:14+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/2SgcIyiWMX4/paypal-tio-data-breach.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"Here's the NSA Employee Who Kept Top Secret Documents at Home ","description":"A former employee—who worked for an elite hacking group operated by the U.S. National Security Agency—pleaded guilty on Friday to illegally taking classified documents home, which were later stolen by Russian hackers.\n\nIn a press release published Friday, the US Justice Department announced that Nghia Hoang Pho, a 67-year-old of Ellicott City, Maryland, took documents that contained top-secret<div class="feedflare">\n<a href="http://feeds.feedburner.com/~ff/TheHackersNews?a=CxmyNYgoKbQ:dG48QbLHhF4:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/TheHackersNews?d=yIl2AUoC8zA" border="0"></img></a>\n</div><img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/CxmyNYgoKbQ" height="1" width="1" alt=""/>","link":"http://feedproxy.google.com/~r/TheHackersNews/~3/CxmyNYgoKbQ/nghia-hoang-pho-nsa.html","comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/CxmyNYgoKbQ/nghia-hoang-pho-nsa.html","updated_at":"2017-12-02T10:14:27+00:00","link_to_comments":"http://feedproxy.google.com/~r/TheHackersNews/~3/CxmyNYgoKbQ/nghia-hoang-pho-nsa.html","link_host":"thehackernews.com","from":"thehackernews"},{"title":"How to fix a program without the source code? Patch the binary directly","description":"Microsoft abandons typical Patch Tuesday playbook to fix Equation Editor flaw.","link":"https://arstechnica.com/?p=1206499","comments":"https://arstechnica.com/?p=1206499","updated_at":"2017-11-17T21:24:54+00:00","link_to_comments":"https://arstechnica.com/?p=1206499","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Firefox’s faster, slicker, slimmer Quantum edition now out","description":"It's as much as twice as fast as it was a year ago.","link":"https://arstechnica.com/?p=1204081","comments":"https://arstechnica.com/?p=1204081","updated_at":"2017-11-14T14:00:56+00:00","link_to_comments":"https://arstechnica.com/?p=1204081","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Facebook is struggling to meet the burden of securing itself, security chief says","description":"Chief Security Officer described security report as a “very painful process.”","link":"https://arstechnica.com/?p=1190835","comments":"https://arstechnica.com/?p=1190835","updated_at":"2017-10-19T23:48:02+00:00","link_to_comments":"https://arstechnica.com/?p=1190835","link_host":"arstechnica.com","from":"arssecurity"},{"title":"If Bill Gates really thinks ctrl-alt-del was a mistake, he should have fixed it himself","description":"You can't pin the blame for this one on IBM.","link":"http://arstechnica.com/?p=346525","comments":"http://arstechnica.com/?p=346525","updated_at":"2017-09-21T17:55:37+00:00","link_to_comments":"http://arstechnica.com/?p=346525","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft: Windows getting more stable, faster, and lasting longer on battery","description":"Even as Windows 10 users grow, support calls are declining.","link":"https://arstechnica.com/?p=1171013","comments":"https://arstechnica.com/?p=1171013","updated_at":"2017-09-21T00:26:46+00:00","link_to_comments":"https://arstechnica.com/?p=1171013","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Azure Confidential Computing will keep data secret, even from Microsoft","description":"Virtual machines and hardware features will provide secrecy.","link":"https://arstechnica.com/?p=1166719","comments":"https://arstechnica.com/?p=1166719","updated_at":"2017-09-14T19:03:26+00:00","link_to_comments":"https://arstechnica.com/?p=1166719","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Apple says Face ID didn’t actually fail during its iPhone X event","description":"The iPhone maker says its new face unlocking tech worked as intended.","link":"https://arstechnica.com/?p=1166603","comments":"https://arstechnica.com/?p=1166603","updated_at":"2017-09-14T15:28:15+00:00","link_to_comments":"https://arstechnica.com/?p=1166603","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Kaspersky software banned from US government agencies","description":"Kaspersky: We have “never helped, nor will help, any government with cyberespionage.”","link":"https://arstechnica.com/?p=1165929","comments":"https://arstechnica.com/?p=1165929","updated_at":"2017-09-13T19:35:33+00:00","link_to_comments":"https://arstechnica.com/?p=1165929","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Leak of >1,700 valid passwords could make the IoT mess much worse","description":"List of unsecured devices lived in obscurity since June. Now, it's going mainstream.","link":"https://arstechnica.com/?p=1153815","comments":"https://arstechnica.com/?p=1153815","updated_at":"2017-08-25T19:40:03+00:00","link_to_comments":"https://arstechnica.com/?p=1153815","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Secret chips in replacement parts can completely hijack your phone’s security","description":"Booby-trapped touchscreens can log passwords, install malicious apps, and more.","link":"https://arstechnica.com/?p=1148889","comments":"https://arstechnica.com/?p=1148889","updated_at":"2017-08-18T12:27:29+00:00","link_to_comments":"https://arstechnica.com/?p=1148889","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Building America’s Trust Act would amp up privacy concerns at the border","description":"Civil libertarians tell Ars they’re worried about “mass surveillance expansion.”","link":"https://arstechnica.com/?p=1146953","comments":"https://arstechnica.com/?p=1146953","updated_at":"2017-08-15T08:00:38+00:00","link_to_comments":"https://arstechnica.com/?p=1146953","link_host":"arstechnica.com","from":"arssecurity"},{"title":"After phishing attacks, Chrome extensions push adware to millions","description":"Compromised accounts push fraudulent extension updates to unsuspecting users.","link":"https://arstechnica.com/?p=1142099","comments":"https://arstechnica.com/?p=1142099","updated_at":"2017-08-03T15:45:25+00:00","link_to_comments":"https://arstechnica.com/?p=1142099","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft expands bug bounty program to cover any Windows flaw","description":"Now every part of Windows is covered by a bug bounty scheme.","link":"https://arstechnica.com/?p=1138451","comments":"https://arstechnica.com/?p=1138451","updated_at":"2017-07-26T20:28:19+00:00","link_to_comments":"https://arstechnica.com/?p=1138451","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 will try to combat ransomware by locking up your data","description":"But how to protect files from users who have access to those files remains tricky.","link":"https://arstechnica.com/?p=1126335","comments":"https://arstechnica.com/?p=1126335","updated_at":"2017-06-29T19:25:19+00:00","link_to_comments":"https://arstechnica.com/?p=1126335","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Ryzen Pro: AMD takes on Intel on the corporate desktop, with one key omission","description":"AMD wants to go after Intel vPro while avoiding Intel's excessive product segmentation.","link":"https://arstechnica.com/?p=1120511","comments":"https://arstechnica.com/?p=1120511","updated_at":"2017-06-29T13:00:32+00:00","link_to_comments":"https://arstechnica.com/?p=1120511","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Microsoft bringing EMET back as a built-in part of Windows 10","description":"The built-in exploit mitigations are getting stronger and easier to configure.","link":"https://arstechnica.com/?p=1124813","comments":"https://arstechnica.com/?p=1124813","updated_at":"2017-06-27T19:47:31+00:00","link_to_comments":"https://arstechnica.com/?p=1124813","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Windows 10 S security brought down by, of course, Word macros","description":"Analysis: Windows 10 S promises many good things. It currently doesn't deliver.","link":"https://arstechnica.com/?p=1123201","comments":"https://arstechnica.com/?p=1123201","updated_at":"2017-06-23T20:11:21+00:00","link_to_comments":"https://arstechnica.com/?p=1123201","link_host":"arstechnica.com","from":"arssecurity"},{"title":"Check Point says Fireball malware hit 250 million; Microsoft says no","description":"Either way, Microsoft assures us that Windows 10 S would have been immune.","link":"https://arstechnica.com/?p=1122335","comments":"https://arstechnica.com/?p=1122335","updated_at":"2017-06-23T12:00:44+00:00","link_to_comments":"https://arstechnica.com/?p=1122335","link_host":"arstechnica.com","from":"arssecurity"}]