Posts

Showing posts from October, 2020

Sean Connery has died

Sean Connery has died 541 by bitshifta | 190 comments on Hacker News.

From McDonald's to Google

From McDonald's to Google 513 by kelseyhightower | 132 comments on Hacker News.

Intermittent fasting from dawn to sunset induces anticancer response

Intermittent fasting from dawn to sunset induces anticancer response 499 by voisin | 325 comments on Hacker News.

Show HN: What would mechanical programming look like?

Show HN: What would mechanical programming look like? 478 by felipereigosa | 97 comments on Hacker News.

Browsers Bugs Exploited to Install 2 New Backdoors on Targeted Computers

Image
Cybersecurity researchers have disclosed details about a new watering hole attack targeting the Korean diaspora that exploits vulnerabilities in web browsers such as Google Chrome and Internet Explorer to deploy malware for espionage purposes. Dubbed "Operation Earth Kitsune" by Trend Micro, the campaign involves the use of SLUB (for SLack and githUB) malware and two new backdoors — dneSpy and from The Hacker News https://ift.tt/3oNUn8X via IFTTT

FBI, DHS, HHS Warn of Imminent Ransomware Threat Against U.S. Hospitals

FBI, DHS, HHS Warn of Imminent Ransomware Threat Against U.S. Hospitals 455 by parsecs | 314 comments on Hacker News.

Woman allegedly impersonated prosecutor, dropped charges against herself

Woman allegedly impersonated prosecutor, dropped charges against herself 521 by coloneltcb | 293 comments on Hacker News.

A Theory of Software Architecture

A Theory of Software Architecture 485 by nreece | 238 comments on Hacker News.

Amazon destroys $1.5m of sellers inventory – now homeless

Amazon destroys $1.5m of sellers inventory – now homeless 487 by shortweb3 | 348 comments on Hacker News.

A Guy Walks into an Apple Store

A Guy Walks into an Apple Store 552 by tobr | 370 comments on Hacker News.

My Resignation from the Intercept

My Resignation from the Intercept 650 by yasp | 742 comments on Hacker News.

KashmirBlack Botnet Hijacks Thousands of Sites Running On Popular CMS Platforms

Image
An active botnet comprising hundreds of thousands of hijacked systems spread across 30 countries is exploiting "dozens of known vulnerabilities" to target widely-used content management systems (CMS). The "KashmirBlack" campaign, which is believed to have started around November 2019, aims for popular CMS platforms such as WordPress, Joomla!, PrestaShop, Magneto, Drupal, Vbulletin, OsCommerence, from The Hacker News https://ift.tt/31V0cHL via IFTTT

How to Run Google SERP API Without Constantly Changing Proxy Servers

Image
You've probably run into a major problem when trying to scrape Google search results. Web scraping tools allow you to extract information from a web page. Companies and coders from across the world use them to download Google's SERP data. And they work well – for a little while. After several scrapes, Google's automated security system kicks in. Then it kicks you out. The standard was to bypass from The Hacker News https://ift.tt/35IMZD1 via IFTTT

I Violated a Code of Conduct

I Violated a Code of Conduct 682 by tosh | 474 comments on Hacker News.

FBI, DHS Warn Of Possible Major Ransomware Attacks On Healthcare Systems

Image
The US Federal Bureau of Investigation (FBI), Departments of Homeland Security, and Health and Human Services (HHS) issued a joint alert Wednesday warning of an "imminent" increase in ransomware and other cyberattacks against hospitals and healthcare providers. "Malicious cyber actors are targeting the [Healthcare and Public Health] Sector with TrickBot malware, often leading to ransomware from The Hacker News https://ift.tt/3kQkdq4 via IFTTT

Wikimedia is moving to Gitlab

Wikimedia is moving to Gitlab 644 by input_sh | 285 comments on Hacker News.

Over 80% of Covid-19 patients in a hospital study have Vitamin D deficiency

Over 80% of Covid-19 patients in a hospital study have Vitamin D deficiency 579 by walterbell | 318 comments on Hacker News.

[Webinar and eBook]: Are You’re Getting The Best Value From Your EDR Solution?

Image
Many companies rely on Endpoint Detection and Response (EDR) solutions as their primary security tool to protect their organizations against cyber threats. EDR was introduced around eight years ago, and analysts now peg the EDR market size as $1.5 to $2.0 billion in annual revenue globally, expecting it to quadruple over the next five years. The recent introduction of Extended Detection and from The Hacker News https://ift.tt/3kwxunI via IFTTT

Google's new logos are bad

Google's new logos are bad 577 by LopRabbit | 257 comments on Hacker News.

TrickBot Linux Variants Active in the Wild Despite Recent Takedown

Image
Efforts to disrupt TrickBot may have shut down most of its critical infrastructure, but the operators behind the notorious malware aren't sitting idle. According to new findings shared by cybersecurity firm Netscout, TrickBot's authors have moved portions of their code to Linux in an attempt to widen the scope of victims that could be targeted. TrickBot, a financial Trojan first detected in 2016 from The Hacker News https://ift.tt/34xCdjm via IFTTT

AMD to Acquire Xilinx

AMD to Acquire Xilinx 541 by ajdlinux | 215 comments on Hacker News.

RIAA’s YouTube-dl takedown ticks off developers and GitHub’s CEO

RIAA’s YouTube-dl takedown ticks off developers and GitHub’s CEO 536 by ikeboy | 202 comments on Hacker News.

An Intuition for Lisp Syntax

An Intuition for Lisp Syntax 529 by simonpure | 190 comments on Hacker News.

The RIAA’s attack on YouTube-dl is not a DMCA 512 infringement

The RIAA’s attack on YouTube-dl is not a DMCA 512 infringement 523 by URfejk | 214 comments on Hacker News.

Twitter still hasn't unlocked the New York Post's account

Twitter still hasn't unlocked the New York Post's account 607 by dsaavy | 647 comments on Hacker News.

Google Removes 21 Malicious Android Apps from Play Store

Image
Google has stepped in to remove several Android applications from the official Play Store following the disclosure that the apps in question were found to serve intrusive ads. The findings were reported by the Czech cybersecurity firm Avast on Monday, which said the 21 malicious apps (list here) were downloaded nearly eight million times from Google's app marketplace. The apps masqueraded as from The Hacker News https://ift.tt/3oxrNIw via IFTTT

Fastly hires entire Wasmtime team from Mozilla

Fastly hires entire Wasmtime team from Mozilla 575 by swyx | 81 comments on Hacker News.

How journalists use youtube-dl

How journalists use youtube-dl 646 by thisisparker | 148 comments on Hacker News.

Vaccine hopes rise as Oxford jab prompts immune response among old and young

Vaccine hopes rise as Oxford jab prompts immune response among old and young 514 by pseudolus | 393 comments on Hacker News.

Experts Warn of Privacy Risks Caused by Link Previews in Messaging Apps

Image
Cybersecurity researchers over the weekend disclosed new security risks associated with link previews in popular messaging apps that cause the services to leak IP addresses, expose links sent via end-to-end encrypted chats, and even unnecessarily download gigabytes of data stealthily in the background. "Links shared in chats may contain private information intended only for the recipients," from The Hacker News https://ift.tt/31IQ2df via IFTTT

I am seriously considering going back to desktop computers

I am seriously considering going back to desktop computers 496 by sT370ma2 | 537 comments on Hacker News.

Washington crews destroy first U.S. “murder hornet” nest

Washington crews destroy first U.S. “murder hornet” nest 436 by cwwc | 301 comments on Hacker News.

Zoom Deleted Events Discussing Zoom “Censorship”

Zoom Deleted Events Discussing Zoom “Censorship” 429 by aspenmayer | 136 comments on Hacker News.

Delete Facebook and You'll Lose All Oculus Games for Good

Delete Facebook and You'll Lose All Oculus Games for Good 417 by AdmiralAsshat | 227 comments on Hacker News.

Pandoc – A universal document converter

Pandoc – A universal document converter 424 by johnsonjo | 89 comments on Hacker News.

YouTube-dl is now part of GitHub/dmca.git

YouTube-dl is now part of GitHub/dmca.git 394 by madars | 92 comments on Hacker News.

Microsoft Tilecode

Microsoft Tilecode 385 by Impossible | 37 comments on Hacker News.

I am an Uighur who faced China’s concentration camps

I am an Uighur who faced China’s concentration camps 377 by yk42bb | 136 comments on Hacker News.

The world needs nuclear power and we shouldn’t be afraid of it

The world needs nuclear power and we shouldn’t be afraid of it 455 by bra-ket | 425 comments on Hacker News.

Spotify revises TOS to allow transfers of user-created playlists

Spotify revises TOS to allow transfers of user-created playlists 519 by mortenjorck | 120 comments on Hacker News.

You can no longer reinstall CS 2 or 3 even if you have the original disks

You can no longer reinstall CS 2 or 3 even if you have the original disks 558 by interestica | 392 comments on Hacker News.

The physiological effects of slow breathing in the healthy human

The physiological effects of slow breathing in the healthy human 373 by luu | 265 comments on Hacker News.

OAuth 3

OAuth 3 401 by andyroid | 205 comments on Hacker News.

Notes on My Colon Cancer

Notes on My Colon Cancer 507 by whatrocks | 289 comments on Hacker News.

YouTube-dl has received a DMCA takedown from RIAA

YouTube-dl has received a DMCA takedown from RIAA 932 by phantop | 356 comments on Hacker News.

Bongo Cat

Bongo Cat 663 by mrpadie | 105 comments on Hacker News.

New Framework Released to Protect Machine Learning Systems From Adversarial Attacks

Image
Microsoft, in collaboration with MITRE, IBM, NVIDIA, and Bosch, has released a new open framework that aims to help security analysts detect, respond to, and remediate adversarial attacks against machine learning (ML) systems. Called the Adversarial ML Threat Matrix, the initiative is an attempt to organize the different techniques employed by malicious adversaries in subverting ML systems. Just from The Hacker News https://ift.tt/3kp6w1n via IFTTT

“I reverse engineered mcdonald's internal API”

“I reverse engineered mcdonald's internal API” 519 by swyx | 316 comments on Hacker News.

James Randi Has Died

James Randi Has Died 482 by omnibrain | 67 comments on Hacker News.

Hands-Free Coding: How I develop software using dictation and eye-tracking

Hands-Free Coding: How I develop software using dictation and eye-tracking 450 by joshwcomeau | 99 comments on Hacker News.

Facebook Container for Firefox

Facebook Container for Firefox 481 by sushicalculus | 164 comments on Hacker News.

PayPal to allow cryptocurrency buying, selling and shopping on its network

PayPal to allow cryptocurrency buying, selling and shopping on its network 517 by epaga | 180 comments on Hacker News.

New Chrome 0-day Under Active Attacks – Update Your Browser Now

Image
Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today. Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to from The Hacker News https://ift.tt/2HoX6o0 via IFTTT

Tom Lehrer releases song lyrics to public domain

Tom Lehrer releases song lyrics to public domain 438 by kpozin | 115 comments on Hacker News.

Palo Alto Networks sends cease-and-desist letter to take down review videos

Palo Alto Networks sends cease-and-desist letter to take down review videos 429 by bonfire | 115 comments on Hacker News.

Popular Mobile Browsers Found Vulnerable To Address Bar Spoofing Attacks

Image
Graphic for illustration Cybersecurity researchers on Tuesday disclosed details about an address bar spoofing vulnerability affecting multiple mobile browsers, such as Apple Safari and Opera Touch, leaving the door open for spear-phishing attacks and delivering malware. Other impacted browsers include UCWeb, Yandex Browser, Bolt Browser, and RITS Browser. The flaws were discovered by Pakistani from The Hacker News https://ift.tt/3m6TiGR via IFTTT

Nokia selected by NASA to build cellular network on the moon

Nokia selected by NASA to build cellular network on the moon 408 by kungfudoi | 190 comments on Hacker News.

I miss Microsoft Encarta (2019)

I miss Microsoft Encarta (2019) 407 by IA21 | 185 comments on Hacker News.

Early Work

Early Work 450 by harscoat | 121 comments on Hacker News.

Apple's apps bypass firewalls like LittleSnitch and LuLu on macOS Big Sur

Apple's apps bypass firewalls like LittleSnitch and LuLu on macOS Big Sur 446 by robenkleene | 233 comments on Hacker News.

U.S. Accuses Google of Illegally Protecting Monopoly

U.S. Accuses Google of Illegally Protecting Monopoly 466 by 1915cb1f | 300 comments on Hacker News.

Windows GravityRAT Malware Now Also Targets macOS and Android Devices

Image
A Windows-based remote access Trojan believed to be designed by Pakistani hacker groups to infiltrate computers and steal users' data has resurfaced after a two-year span with retooled capabilities to target Android and macOS devices. According to cybersecurity firm Kaspersky, the malware — dubbed "GravityRAT" — now masquerades as legitimate Android and macOS apps to capture device data, contact from The Hacker News https://ift.tt/3m9gHaz via IFTTT

Download Ultimate 'Security for Management' Presentation Template

Image
There is a person in every organization that is the direct owner of breach protection. His or her task is to oversee and govern the process of design, build, maintain, and continuously enhance the security level of the organization. Title-wise, this person is most often either the CIO, CISO, or Directory of IT. For convenience, we'll refer to this individual as the CISO. This person is the from The Hacker News https://ift.tt/2Nrn0HJ via IFTTT

Foxconn’s empty buildings, empty factories, and empty promises in Wisconsin

Foxconn’s empty buildings, empty factories, and empty promises in Wisconsin 434 by rhd1729 | 192 comments on Hacker News.

U.S. Charges 6 Russian Intelligence Officers Over Destructive Cyberattacks

Image
The US government on Monday formally charged six Russian intelligence officers for carrying out destructive malware attacks with an aim to disrupt and destabilize other nations and cause monetary losses. The individuals, who work for Unit 74455 of the Russian Main Intelligence Directorate (GRU), have been accused of perpetrating the "most disruptive and destructive series of computer attacks from The Hacker News https://ift.tt/3kgnYov via IFTTT

How Discord Won

How Discord Won 405 by ivanagas | 423 comments on Hacker News.

Face ID and Touch ID for the Web

Face ID and Touch ID for the Web 411 by Austin_Conlon | 229 comments on Hacker News.

Analyzing the Design of Unusual Japanese Butter Tableware

Analyzing the Design of Unusual Japanese Butter Tableware 391 by kasbah | 183 comments on Hacker News.

No-till no-herbicide farming system in trial since 1981

No-till no-herbicide farming system in trial since 1981 439 by sudoaza | 207 comments on Hacker News.

Emerging Architectures for Modern Data Infrastructure

Emerging Architectures for Modern Data Infrastructure 413 by soumyadeb | 102 comments on Hacker News.

We deleted the production database by accident

We deleted the production database by accident 431 by caspii | 413 comments on Hacker News.

ARM chips have an instruction with JavaScript in the name

ARM chips have an instruction with JavaScript in the name 398 by kdeldycke | 281 comments on Hacker News.

Tinnitus Treatment from Neuromod

Tinnitus Treatment from Neuromod 391 by Mopolo | 166 comments on Hacker News.

This page is a truly naked, brutalist HTML quine

This page is a truly naked, brutalist HTML quine 533 by Symmetry | 106 comments on Hacker News.

Gravity is not a force – free-fall parabolas are straight lines in spacetime

Gravity is not a force – free-fall parabolas are straight lines in spacetime 474 by tim_hutton | 273 comments on Hacker News.

Reading too much political news is bad for your well-being

Reading too much political news is bad for your well-being 430 by DarkContinent | 238 comments on Hacker News.

Welcome to the Old Internet Again

Welcome to the Old Internet Again 407 by doener | 186 comments on Hacker News.

So you want to build an embedded Linux system?

So you want to build an embedded Linux system? 522 by cushychicken | 106 comments on Hacker News.

ElectronJS alternative: SciterJS – HTML/CSS/JS in 4.5 MB executable

ElectronJS alternative: SciterJS – HTML/CSS/JS in 4.5 MB executable 486 by c-smile | 188 comments on Hacker News.

Hum to Search Song

Hum to Search Song 517 by kodisha | 211 comments on Hacker News.

Waypoint: Build, deploy, and release applications across any platform

Waypoint: Build, deploy, and release applications across any platform 543 by jacobwg | 135 comments on Hacker News.

Chrome exempts Google sites from user site data settings

Chrome exempts Google sites from user site data settings 734 by arm | 244 comments on Hacker News.

An animation of how bridges were built in Central Europe in the middle-ages

An animation of how bridges were built in Central Europe in the middle-ages 613 by BerislavLopac | 166 comments on Hacker News.

AWS forked my project and launched it as its own service

AWS forked my project and launched it as its own service 662 by tnolet | 309 comments on Hacker News.

Google Warns of Zero-Click Bluetooth Flaws in Linux-based Devices

Image
Google security researchers are warning of a new set of zero-click vulnerabilities in the Linux Bluetooth software stack that can allow a nearby unauthenticated, remote attacker to execute arbitrary code with kernel privileges on vulnerable devices. According to security engineer Andy Nguyen, the three flaws — collectively called BleedingTooth — reside in the open-source BlueZ protocol stack from The Hacker News https://ift.tt/3j1aWtB via IFTTT

Twitter and Facebook's action over Joe Biden article reignites bias claims

Twitter and Facebook's action over Joe Biden article reignites bias claims 594 by nkurz | 1227 comments on Hacker News.

Google disabled my husband's account

Google disabled my husband's account 567 by Eyas | 399 comments on Hacker News.

Dropbox Converts to Permanent WFH

Dropbox Converts to Permanent WFH 487 by jeffbee | 265 comments on Hacker News.

A warning about Glassdoor

A warning about Glassdoor 559 by nosmokewhereiam | 184 comments on Hacker News.

Congress should invest in open-source software

Congress should invest in open-source software 493 by gilad | 115 comments on Hacker News.

Google employees are free to speak up, except on antitrust

Google employees are free to speak up, except on antitrust 445 by bigpumpkin | 314 comments on Hacker News.

India Witnessed Spike in Cyber Attacks Amidst Covid-19 - Here's Why?

Image
The COVID-19 outreach is turning out to be not only health, social, and economic hazard but also a cybersecurity crisis. The pandemic has presented new challenges for businesses in the areas of remote collaboration and business continuity. With increased remote working for better business continuity, employees are using numerous Internet tools. As businesses and people have started relying more from The Hacker News https://ift.tt/3iWErgp via IFTTT

iPhone 12 and iPhone 12 Pro

iPhone 12 and iPhone 12 Pro 417 by tosh | 1143 comments on Hacker News.
helo