Posts

Showing posts from November, 2020

Why is Apple's M1 chip so fast?

Why is Apple's M1 chip so fast? 448 by socialdemocrat | 456 comments on Hacker News.

AlphaFold: a solution to a 50-year-old grand challenge in biology

AlphaFold: a solution to a 50-year-old grand challenge in biology 461 by momeara | 510 comments on Hacker News.

How to Run a Ponzi Scheme for Tech People

How to Run a Ponzi Scheme for Tech People 429 by nish1500 | 229 comments on Hacker News.

Sleep duration is associated with brain structure and cognitive performance

Sleep duration is associated with brain structure and cognitive performance 431 by mcguire | 308 comments on Hacker News.

Ask HN: Top Coursera Courses?

Ask HN: Top Coursera Courses? 460 by joshlk | 155 comments on Hacker News. In any field that “interesting” to HN

Growl in Retirement

Growl in Retirement 450 by flyingyeti | 232 comments on Hacker News.

Chess tactics explained

Chess tactics explained 511 by kensai | 229 comments on Hacker News.

Reveal.js: HTML presentation framework

Reveal.js: HTML presentation framework 405 by lopespm | 105 comments on Hacker News.

A free-as-in-freedom re-implementation of Google’s Android user space

A free-as-in-freedom re-implementation of Google’s Android user space 527 by doener | 134 comments on Hacker News.

DeepMind Solved Protein Folding

DeepMind Solved Protein Folding 759 by felixr | 224 comments on Hacker News.

Quick Guide — How to Troubleshoot Active Directory Account Lockouts

Image
Active Directory account lockouts can be hugely problematic for organizations. There have been documented instances of attackers leveraging the account lockout feature in a type of denial of service attack. By intentionally entering numerous bad passwords, attackers can theoretically lock all of the users out of their accounts. But what do you do if you are experiencing problems with account from The Hacker News https://ift.tt/2VfLCqj via IFTTT

Show HN: I Rebuilt MySpace from 2007

Show HN: I Rebuilt MySpace from 2007 472 by partyguy | 147 comments on Hacker News.

‘Tokenized’: Black Workers’ Struggles at Coinbase

‘Tokenized’: Black Workers’ Struggles at Coinbase 466 by xwvvvvwx | 565 comments on Hacker News.

CAPTCHAs don’t prove you’re human – they prove you’re American (2017)

CAPTCHAs don’t prove you’re human – they prove you’re American (2017) 682 by notRobot | 668 comments on Hacker News.

Microsoft's Creepy New 'Productivity Score' Gamifies Workplace Surveillance

Microsoft's Creepy New 'Productivity Score' Gamifies Workplace Surveillance 504 by ourmandave | 254 comments on Hacker News.

How io_uring and eBPF Will Revolutionize Programming in Linux

How io_uring and eBPF Will Revolutionize Programming in Linux 691 by harporoeder | 310 comments on Hacker News.

Modern storage is plenty fast, but the APIs are bad

Modern storage is plenty fast, but the APIs are bad 499 by harporoeder | 158 comments on Hacker News.

PHP 8

PHP 8 462 by pow-tac | 262 comments on Hacker News.

Tony Hsieh has died

Tony Hsieh has died 769 by MrMcDowall | 174 comments on Hacker News.

How to Think for Yourself

How to Think for Yourself 676 by neilkakkar | 576 comments on Hacker News.

Digitally Signed Bandook Malware Once Again Targets Multiple Sectors

Image
A cyberespionage group with suspected ties to the Kazakh and Lebanese governments has unleashed a new wave of attacks against a multitude of industries with a retooled version of a 13-year-old backdoor Trojan. Check Point Research called out hackers affiliated with a group named Dark Caracal in a new report published yesterday for their efforts to deploy "dozens of digitally signed variants" of from The Hacker News https://ift.tt/3q4QXPr via IFTTT

Thank You Dang

Thank You Dang 701 by sinak | 91 comments on Hacker News. Since it’s Thanksgiving here in the US, I thought it would be nice to say a big thank you to dang for his tireless work moderating HN. Thank you dang. You keep this community vibrant and interesting, yet civil.

I Spent Eleven Years Working on This Line Rider Track

I Spent Eleven Years Working on This Line Rider Track 580 by todsacerdoti | 84 comments on Hacker News.

Become a White Hat Hacker — Get 10 Top-Rated Courses at 97% OFF

Image
Many of us here would love to turn hacking into a full-time career. To make that dream come true, you need to master your subject and earn some key certifications. To speed up this process, you might want to take a little guidance from the experts. Featuring 98 hours of content from top instructors, The Ultimate 2020 White Hat Hacker Certification Bundle is the ultimate launchpad for your career from The Hacker News https://ift.tt/2V4bAxe via IFTTT

Interpol Arrests 3 Nigerian BEC Scammers For Targeting Over 500,000 Entities

Image
Three Nigerian citizens suspected of being members of an organized cybercrime group behind distributing malware, carrying out phishing campaigns, and extensive Business Email Compromise (BEC) scams have been arrested in the city of Lagos, Interpol reported yesterday. The investigation, dubbed "Operation Falcon," was jointly undertaken by the international police organization along with from The Hacker News https://ift.tt/377HeiJ via IFTTT

hCaptcha now runs on fifteen percent of the internet

hCaptcha now runs on fifteen percent of the internet 485 by fab1an | 301 comments on Hacker News.

macOS has checked app signatures online for over 2 years

macOS has checked app signatures online for over 2 years 421 by giuliomagnifico | 303 comments on Hacker News.

Why AWS loves Rust, and how we’d like to help

Why AWS loves Rust, and how we’d like to help 471 by carllerche | 315 comments on Hacker News.

Apple Silicon M1: Black Magic Fuckery

Apple Silicon M1: Black Magic Fuckery 681 by singhkays | 635 comments on Hacker News.

2-Factor Authentication Bypass Flaw Reported in cPanel and WHM Software

Image
cPanel, a provider of popular administrative tools to manage web hosting, has patched a security vulnerability that could have allowed remote attackers with access to valid credentials to bypass two-factor authentication (2FA) protection on an account. The issue, tracked as "SEC-575" and discovered by researchers from Digital Defense, has been remedied by the company in versions 11.92.0.2, from The Hacker News https://ift.tt/3l4pKso via IFTTT

Baidu's Android Apps Caught Collecting and Leaking Sensitive User Data

Image
Two popular Android apps from Chinese tech giant Baidu have been removed from the Google Play Store in October after they were caught collecting sensitive user details. The two apps in question—Baidu Maps and Baidu Search Box—were found to collect device identifiers, such as the International Mobile Subscriber Identity (IMSI) number or MAC address, without users' knowledge, thus making them  from The Hacker News https://ift.tt/3fyxy4K via IFTTT

Email a Dumpster Fire

Email a Dumpster Fire 664 by bschne | 186 comments on Hacker News.

Metal monolith found by helicopter crew in Utah desert

Metal monolith found by helicopter crew in Utah desert 626 by m1 | 377 comments on Hacker News.

Microsoft 365 has employee surveillance and analytics built in

Microsoft 365 has employee surveillance and analytics built in 738 by ColinWright | 350 comments on Hacker News.

Microsoft 365 has employee surveillance and analytics built in

Microsoft 365 has employee surveillance and analytics built in 698 by ColinWright | 346 comments on Hacker News.

Microsoft 365 has employee surveillance and analytics built in

Microsoft 365 has employee surveillance and analytics built in 650 by ColinWright | 333 comments on Hacker News.

Stantinko Botnet Now Targeting Linux Servers to Hide Behind Proxies

Image
An adware and coin-miner botnet targeting Russia, Ukraine, Belarus, and Kazakhstan at least since 2012 has now set its sights on Linux servers to fly under the radar. According to a new analysis published by Intezer today and shared with The Hacker News, the trojan masquerades as HTTPd, a commonly used program on Linux servers, and is a new version of the malware belonging to a threat actor from The Hacker News https://ift.tt/39duiL4 via IFTTT

Apple’s head of security indicted in Santa Clara County CCW case

Apple’s head of security indicted in Santa Clara County CCW case 506 by spike021 | 757 comments on Hacker News.

Critical Unpatched VMware Flaw Affects Multiple Corporates Products

Image
VMware has released temporary workarounds to address a critical vulnerability in its products that could be exploited by an attacker to take control of an affected system. "A malicious actor with network access to the administrative configurator on port 8443 and a valid password for the configurator admin account can execute commands with unrestricted privileges on the underlying operating from The Hacker News https://ift.tt/363DmQN via IFTTT

Zoomquilt (2004)

Zoomquilt (2004) 509 by xingyzt | 96 comments on Hacker News.

Another free CA as an alternative to Let's Encrypt

Another free CA as an alternative to Let's Encrypt 480 by c0r0n3r | 112 comments on Hacker News.

The Nintendo Switch uses my open source code

The Nintendo Switch uses my open source code 464 by danso | 250 comments on Hacker News.

Linux on iPad

Linux on iPad 462 by homarp | 277 comments on Hacker News.

Solomon Islands set to ban Facebook in the name of 'national unity'

Solomon Islands set to ban Facebook in the name of 'national unity' 493 by hentrep | 189 comments on Hacker News.

WTF Happened in 1971? (2019)

WTF Happened in 1971? (2019) 604 by dgudkov | 325 comments on Hacker News.

Oxford University breakthrough on global COVID-19 vaccine

Oxford University breakthrough on global COVID-19 vaccine 483 by mychaelangelo | 438 comments on Hacker News.

Why Replace Traditional Web Application Firewall (WAF) With New Age WAF?

Image
At present, web applications have become the top targets for attackers because of potential monetization opportunities. Security breaches on the web application can cost millions. Strikingly, DNS (Domain Name System) related outage and Distributed denial of service (DDoS) lead a negative impact on businesses. Among the wide range of countermeasures, a web application firewall is the first line from The Hacker News https://ift.tt/3pOvpXv via IFTTT

Building Your Color Palette

Building Your Color Palette 653 by clessg | 130 comments on Hacker News.

Booting from a vinyl record

Booting from a vinyl record 753 by ruik | 129 comments on Hacker News.

WhiteHat Jr’s founder files $2.6M defamation suit against critic

WhiteHat Jr’s founder files $2.6M defamation suit against critic 614 by villgax | 251 comments on Hacker News.

Gimp is 25 years old today

Gimp is 25 years old today 591 by constantinum | 246 comments on Hacker News.

I Miss Working from the Office

I Miss Working from the Office 562 by sysoleg | 467 comments on Hacker News.

Cover Your Tracks

Cover Your Tracks 687 by cpeterso | 253 comments on Hacker News.

Transitioning from Docker to Podman

Transitioning from Docker to Podman 457 by indentit | 253 comments on Hacker News.

Moving from Macbook to Linux

Moving from Macbook to Linux 512 by gk1 | 491 comments on Hacker News.

PostgREST: REST API for any Postgres database

PostgREST: REST API for any Postgres database 487 by swyx | 200 comments on Hacker News.

Dev Fonts

Dev Fonts 634 by syck | 329 comments on Hacker News.

Facebook Messenger Bug Lets Hackers Listen to You Before You Pick Up the Call

Image
Facebook has patched a bug in its widely installed Messenger app for Android that could have allowed a remote attacker to call unsuspecting targets and listen to them before even they picked up the audio call. The flaw was discovered and reported to Facebook by Natalie Silvanovich of Google's Project Zero bug-hunting team last month on October 6 with a 90-day deadline, and impacts version from The Hacker News https://ift.tt/3ffUYvz via IFTTT

1MB Club

1MB Club 686 by bradley_taunt | 299 comments on Hacker News.

Arecibo telescope, on the brink of collapse, will be dismantled

Arecibo telescope, on the brink of collapse, will be dismantled 624 by LUmBULtERA | 240 comments on Hacker News.

YouTube will now show ads on all videos even if creators don’t want them

YouTube will now show ads on all videos even if creators don’t want them 624 by patrickaljord | 542 comments on Hacker News.

Beirut Port Explosion

Beirut Port Explosion 701 by AliCollins | 111 comments on Hacker News.

Free and liberated e-books, carefully produced for the true book lover

Free and liberated e-books, carefully produced for the true book lover 605 by Pick-A-Hill2019 | 102 comments on Hacker News.

I should have loved biology

I should have loved biology 691 by jsomers | 270 comments on Hacker News.

Brow.sh: a modern text-based browser

Brow.sh: a modern text-based browser 665 by definetheword | 100 comments on Hacker News.

WARNING: Unpatched Bug in GO SMS Pro App Exposes Millions of Media Messages

Image
GO SMS Pro, a popular messaging app for Android with over 100 million installs, has been found to have an unpatched security flaw that publicly exposes media transferred between users, including private voice messages, photos, and videos. "This means any sensitive media shared between users of this messenger app is at risk of being compromised by an unauthenticated attacker or curious user," from The Hacker News https://ift.tt/38WTvsN via IFTTT

Evolution of Emotet: From Banking Trojan to Malware Distributor

Image
Emotet is one of the most dangerous and widespread malware threats active today. Ever since its discovery in 2014—when Emotet was a standard credential stealer and banking Trojan, the malware has evolved into a modular, polymorphic platform for distributing other kinds of computer viruses. Being constantly under development, Emotet updates itself regularly to improve stealthiness, persistence, from The Hacker News https://ift.tt/3kP0NBg via IFTTT

‘Extremely aggressive’ internet censorship spreads in the world’s democracies

‘Extremely aggressive’ internet censorship spreads in the world’s democracies 807 by rbanffy | 505 comments on Hacker News.

TailwindCSS v2.0

TailwindCSS v2.0 796 by sarathyweb | 388 comments on Hacker News.

Researchers Warn of Critical Flaws Affecting Industrial Automation Systems

Image
A critical vulnerability uncovered in Real-Time Automation's (RTA) 499ES EtherNet/IP (ENIP) stack could open up the industrial control systems to remote attacks by adversaries. RTA's ENIP stack is one of the widely used industrial automation devices and is billed as the "standard for factory floor I/O applications in North America." "Successful exploitation of this vulnerability could cause a from The Hacker News https://ift.tt/38SGyjX via IFTTT

DisneyMustPay Alan Dean Foster

DisneyMustPay Alan Dean Foster 721 by healsdata | 173 comments on Hacker News.

Six Months of Tiny Projects

Six Months of Tiny Projects 729 by tinyprojects | 116 comments on Hacker News.

Apple Announces App Store Small Business Program

Apple Announces App Store Small Business Program 696 by todsacerdoti | 528 comments on Hacker News.

Use This Ultimate Template to Plan and Monitor Your Cybersecurity Budgets

Image
Sound security budget planning and execution are essential for CIO's/CISO's success. Now, for the first time, the Ultimate Security Budget Plan and Track Excel template (download here) provide security executives a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that security needs are addressed while maintaining the budgetary frame. The dynamic nature of the from The Hacker News https://ift.tt/2v9mYhI via IFTTT

Apple Lets Some of its Big Sur macOS Apps Bypass Firewall and VPNs

Image
Apple is facing the heat for a new feature in macOS Big Sur that allows many of its own apps to bypass firewalls and VPNs, thereby potentially allowing malware to exploit the same shortcoming to access sensitive data stored on users' systems and transmit them to remote servers. The issue was first spotted last month by a Twitter user named Maxwell in a beta version of the operating system. "Some from The Hacker News https://ift.tt/38Unkua via IFTTT

2020 Mac Mini – Putting Apple Silicon M1 To The Test

2020 Mac Mini – Putting Apple Silicon M1 To The Test 589 by kissiel | 570 comments on Hacker News.

Servo’s new home

Servo’s new home 634 by gbrown_ | 198 comments on Hacker News.

Firefox 83 introduces HTTPS-Only Mode

Firefox 83 introduces HTTPS-Only Mode 732 by tomwas54 | 385 comments on Hacker News.

Airbnb S-1

Airbnb S-1 578 by xoxoy | 412 comments on Hacker News.

Apple apps on Big Sur bypass some firewalls and VPNs

Apple apps on Big Sur bypass some firewalls and VPNs 574 by esolyt | 257 comments on Hacker News.

What Gödel Discovered

What Gödel Discovered 664 by stopachka | 162 comments on Hacker News.

Chinese APT Hackers Target Southeast Asian Government Institutions

Image
Cybersecurity researchers today unveiled a complex and targeted espionage attack on potential government sector victims in South East Asia that they believe was carried out by a sophisticated Chinese APT group at least since 2018. "The attack has a complex and complete arsenal of droppers, backdoors and other tools involving Chinoxy backdoor, PcShare RAT and FunnyDream backdoor binaries, with from The Hacker News https://ift.tt/36I0nYj via IFTTT

Researcher Discloses Critical RCE Flaws In Cisco Security Manager

Image
Cisco has published multiple security advisories concerning critical flaws in Cisco Security Manager (CSM) a week after the networking equipment maker quietly released patches with version 4.22 of the platform. The development comes after Code White researcher Florian Hauser (frycos) yesterday publicly disclosed proof-of-concept (PoC) code for as many as 12 security vulnerabilities affecting the from The Hacker News https://ift.tt/2UxSTBN via IFTTT

Moderna Covid vaccine candidate almost 95% effective, trials show

Moderna Covid vaccine candidate almost 95% effective, trials show 616 by m1 | 1149 comments on Hacker News.

Yelp Is Screwing over Restaurants by Quietly Replacing Their Phone Numbers

Yelp Is Screwing over Restaurants by Quietly Replacing Their Phone Numbers 612 by elorant | 210 comments on Hacker News.

Moderna's Covid vaccine shows nearly 95% protection

Moderna's Covid vaccine shows nearly 95% protection 659 by n_parks | 5 comments on Hacker News.

Does Apple really log every app you run? A technical look

Does Apple really log every app you run? A technical look 612 by jacopoj | 326 comments on Hacker News.

Google sued: Idle Android eats mobile data to send telemetry and preload ads

Google sued: Idle Android eats mobile data to send telemetry and preload ads 672 by WarOnPrivacy | 303 comments on Hacker News.

Standing up for developers: YouTube-dl is back

Standing up for developers: YouTube-dl is back 785 by todsacerdoti | 134 comments on Hacker News.

YouTube-dl's repository has been restored

YouTube-dl's repository has been restored 965 by fusl | 195 comments on Hacker News.

Trojanized Security Software Hits South Korea Users in Supply-Chain Attack

Image
Cybersecurity researchers took the wraps off a novel supply chain attack in South Korea that abuses legitimate security software and stolen digital certificates to distribute remote administration tools (RATs) on target systems. Attributing the operation to the Lazarus Group, also known as Hidden Cobra, Slovak internet security company ESET said the state-sponsored threat actor leveraged the from The Hacker News https://ift.tt/3lEpmlF via IFTTT

“Facebook has taken the name of my open source project ”

“Facebook has taken the name of my open source project ” 670 by capableweb | 162 comments on Hacker News.

Bypassing Firewalls in macOS Big Sur

Bypassing Firewalls in macOS Big Sur 658 by polyrand | 207 comments on Hacker News.

Intel's disruption is now complete

Intel's disruption is now complete 656 by davnicwil | 464 comments on Hacker News.

Never Use Third Party Auth to Sign In

Never Use Third Party Auth to Sign In 551 by gurjeet | 343 comments on Hacker News.

Xi Jinping personally halted Ant's IPO after Jack Ma snubbed government leaders

Xi Jinping personally halted Ant's IPO after Jack Ma snubbed government leaders 548 by onetimemanytime | 401 comments on Hacker News.

So you've made a mistake and it's public

So you've made a mistake and it's public 721 by abbe98 | 341 comments on Hacker News.

Google Widevine Content Decryption Module DMCA

Google Widevine Content Decryption Module DMCA 647 by abbe98 | 360 comments on Hacker News.

Docker fails to launch on Apple Silicon

Docker fails to launch on Apple Silicon 639 by bartkappenburg | 259 comments on Hacker News.

macOS Big Sur

macOS Big Sur 640 by todsacerdoti | 796 comments on Hacker News.

Funkwhale – Decentralized, self-hosted music server

Funkwhale – Decentralized, self-hosted music server 544 by peterstensmyr | 287 comments on Hacker News.

Your Computer Isn't Yours

Your Computer Isn't Yours 805 by sneak | 425 comments on Hacker News.

Live Webinar: Reducing Complexity by Increasing Consolidation for SMEs

Image
Complexity is the bane of effective cybersecurity. The need to maintain an increasing array of cybersecurity tools to protect organizations from an expanding set of cyber threats is leading to runaway costs, staff inefficiencies, and suboptimal threat response. Small to medium-sized enterprises (SMEs) with limited budgets and staff are significantly impacted. On average, SMEs manage more than a from The Hacker News https://ift.tt/3knJ1Vr via IFTTT

SAD DNS — New Flaws Re-Enable DNS Cache Poisoning Attacks

Image
A group of academics from the University of California and Tsinghua University has uncovered a series of critical security flaws that could lead to a revival of DNS cache poisoning attacks. Dubbed "SAD DNS attack" (short for Side-channel AttackeD DNS), the technique makes it possible for a malicious actor to carry out an off-path attack, rerouting any traffic originally destined to a specific from The Hacker News https://ift.tt/36v9xYi via IFTTT

macOS unable to open any non-Apple application

macOS unable to open any non-Apple application 733 by mattsolle | 457 comments on Hacker News.

Guido van Rossum joins Microsoft

Guido van Rossum joins Microsoft 712 by 0xmohit | 384 comments on Hacker News.

Uncovered: APT 'Hackers For Hire' Target Financial, Entertainment Firms

Image
A hackers-for-hire operation has been discovered using a strain of previously undocumented malware to target South Asian financial institutions and global entertainment companies. Dubbed "CostaRicto" by Blackberry researchers, the campaign appears to be the handiwork of APT mercenaries who possess bespoke malware tooling and complex VPN proxy and SSH tunneling capabilities. "CostaRicto targets from The Hacker News https://ift.tt/2IvtHZS via IFTTT

An updated daily front page of The New York Times as artwork on your wall

An updated daily front page of The New York Times as artwork on your wall 626 by knes | 206 comments on Hacker News.

New ModPipe Point of Sale (POS) Malware Targeting Restaurants, Hotels

Image
Cybersecurity researchers today disclosed a new kind of modular backdoor that targets point-of-sale (POS) restaurant management software from Oracle in an attempt to pilfer sensitive payment information stored in the devices. The backdoor — dubbed "ModPipe" — impacts Oracle MICROS Restaurant Enterprise Series (RES) 3700 POS systems, widely used software suite restaurants, and hospitality from The Hacker News https://ift.tt/32C00xk via IFTTT

MISSIONS — The Next Level of Interactive Developer Security Training

Image
If organizations want to get serious about software security, they need to empower their engineers to play a defensive role against cyberattacks as they craft their code. The problem is, developers haven't had the most inspiring introduction to security training over the years, and anything that can be done to make their experience more engaging, productive, and fun is going to be a powerful from The Hacker News https://ift.tt/3eRuqjU via IFTTT

Apple Silicon M1 chip in MacBook Air outperforms high-end 16-inch MacBook Pro

Apple Silicon M1 chip in MacBook Air outperforms high-end 16-inch MacBook Pro 595 by antipaul | 634 comments on Hacker News.

Google Photos will end its free unlimited storage in June 2021

Google Photos will end its free unlimited storage in June 2021 549 by mvgoogler | 528 comments on Hacker News.

Introducing the next generation of Mac

Introducing the next generation of Mac 630 by redm | 961 comments on Hacker News.

The Lonely Work of Moderating Hacker News (2019)

The Lonely Work of Moderating Hacker News (2019) 595 by bluu00 | 271 comments on Hacker News.

Origins of the youtube-dl project

Origins of the youtube-dl project 539 by rg3 | 58 comments on Hacker News.

Two New Chrome 0-Days Under Active Attacks – Update Your Browser

Image
Google has patched two more zero-day flaws in the Chrome web browser for desktop, making it the fourth and fifth actively exploited vulnerabilities addressed by the search giant in recent weeks. The company released 86.0.4240.198 for Windows, Mac, and Linux, which it said will be rolling out over the coming days/weeks to all users. Tracked as CVE-2020-16013 and CVE-2020-16017, the flaws were from The Hacker News https://ift.tt/2UlxQlz via IFTTT

How to get root on Ubuntu 20.04 by pretending nobody’s /home

How to get root on Ubuntu 20.04 by pretending nobody’s /home 731 by generalizations | 199 comments on Hacker News.

Over 2800 e-Shops Running Outdated Magento Software Hit by Credit Card Hackers

Image
A wave of cyberattacks against retailers running the Magento 1.x e-commerce platform earlier this September has been attributed to one single group, according to the latest research. "This group has carried out a large number of diverse Magecart attacks that often compromise large numbers of websites at once through supply chain attacks, such as the Adverline incident, or through the use of from The Hacker News https://ift.tt/3eQaVrW via IFTTT

Build Your 2021 Cybersecurity Plan With This Free PPT Template

Image
The end of the year is coming, and it's time for security decision-makers to make plans for 2021 and get management approval. Typically, this entails making a solid case regarding why current resources, while yielding significant value, need to be reallocated and enhanced. The Definitive 2021 Security Plan PPT Template is built to simplify this task, providing security decision-makers with an from The Hacker News https://ift.tt/32hyK47 via IFTTT

Microsoft Releases Windows Security Updates For Critical Flaws

Image
Microsoft formally released fixes for 112 newly discovered security vulnerabilities as part of its November 2020 Patch Tuesday, including an actively exploited zero-day flaw disclosed by Google's security team last week. The rollout addresses flaws, 17 of which are rated as Critical, 93 are rated as Important, and two are rated Low in severity, once again bringing the patch count over 110 after from The Hacker News https://ift.tt/2UcWvZL via IFTTT

.NET 5.0

.NET 5.0 648 by benaadams | 345 comments on Hacker News.

I sold Baremetrics

I sold Baremetrics 636 by anttiai | 409 comments on Hacker News.

Apple unveils M1, its first system-on-a-chip for portable Mac computers

Apple unveils M1, its first system-on-a-chip for portable Mac computers 655 by runesoerensen | 764 comments on Hacker News.

On Apple's Piss-Poor Documentation

On Apple's Piss-Poor Documentation 615 by ingve | 183 comments on Hacker News.

Amazon Review Scam

Amazon Review Scam 561 by StreamBright | 295 comments on Hacker News.

Zoom lied to users about end-to-end encryption for years, FTC says

Zoom lied to users about end-to-end encryption for years, FTC says 597 by eddieoz | 169 comments on Hacker News.

Watch Out! New Android Banking Trojan Steals From 112 Financial Apps

Image
Four months after security researchers uncovered a "Tetrade" of four Brazilian banking Trojans targeting financial institutions in Brazil, Latin America, and Europe, new findings show that the criminals behind the operation have expanded their tactics to infect mobile devices with spyware. According to Kaspersky's Global Research and Analysis Team (GReAT), the Brazil-based threat group Guildma from The Hacker News https://ift.tt/35fvXgJ via IFTTT

I now have an Oculus paperweight

I now have an Oculus paperweight 551 by elsewhen | 203 comments on Hacker News.

Voters overwhelmingly back community broadband in Chicago and Denver

Voters overwhelmingly back community broadband in Chicago and Denver 572 by danso | 199 comments on Hacker News.

Attention Is My Most Valuable Asset for Productivity as a Software Developer

Attention Is My Most Valuable Asset for Productivity as a Software Developer 562 by zwbetz | 220 comments on Hacker News.

AltStore: An alternative app store for non-jailbroken iOS devices

AltStore: An alternative app store for non-jailbroken iOS devices 570 by dariosalvi78 | 170 comments on Hacker News.

No More Free Work from Marak: Pay Me or Fork This

No More Free Work from Marak: Pay Me or Fork This 742 by ingve | 618 comments on Hacker News.

Covid vaccine: First ‘milestone’ vaccine offers 90% protection

Covid vaccine: First ‘milestone’ vaccine offers 90% protection 652 by isp | 443 comments on Hacker News.

Worried About SaaS Misconfigurations? Check These 5 Settings Everybody Misses

Image
Image credit: Adaptive Shield Enterprises depend on SaaS applications for countless functions, like collaboration, marketing, file sharing, and more. But problematically, they often lack the resources to configure those apps to prevent cyberattacks, data exfiltration, and other risks. Catastrophic and costly data breaches result from SaaS security configuration errors. The Verizon 2020 Data from The Hacker News https://ift.tt/3peGIHS via IFTTT

About iSH’s pending removal from the App Store

About iSH’s pending removal from the App Store 627 by tbodt | 359 comments on Hacker News.

Windows 10, iOS, Chrome, Firefox and Others Hacked at Tianfu Cup Competition

Image
Multiple software products from Adobe, Apple, Google, Microsoft, Mozilla, and Samsung were successfully pwned with previously unseen exploits in Tianfu Cup 2020, the third edition of the international cybersecurity contest held in the city of Chengdu, China. "Many mature and hard targets have been pwned on this year's contest," the event organizers said. "11 out of 16 targets cracked with 23 from The Hacker News https://ift.tt/2In2NmD via IFTTT

EU Draft Council Declaration Against Encryption [pdf]

EU Draft Council Declaration Against Encryption [pdf] 648 by Daniel_sk | 370 comments on Hacker News.

Alex Trebek has died

Alex Trebek has died 559 by slater | 108 comments on Hacker News.

Biden wins White House, vowing new direction for divided U.S.

Biden wins White House, vowing new direction for divided U.S. 852 by granzymes | 801 comments on Hacker News.

Standing on our own two feet

Standing on our own two feet 491 by gpff | 166 comments on Hacker News.

Technical debt as a lack of understanding

Technical debt as a lack of understanding 436 by BerislavLopac | 219 comments on Hacker News.

HP Instant Ink is “ink as a service”

HP Instant Ink is “ink as a service” 448 by samizdis | 276 comments on Hacker News.

San Francisco voters approve taxes on highly paid CEOs, big businesses

San Francisco voters approve taxes on highly paid CEOs, big businesses 433 by Circumnavigate | 709 comments on Hacker News.

Deprecating scp

Deprecating scp 457 by Tomte | 248 comments on Hacker News.

Helsinki Relocation Package: City as a Service

Helsinki Relocation Package: City as a Service 462 by mannylopez | 394 comments on Hacker News.

Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered

Image
Apple on Thursday released multiple security updates to patch three zero-day vulnerabilities that were revealed as being actively exploited in the wild. Rolled out as part of its iOS, iPadOS, macOS, and watchOS updates, the flaws reside in the FontParser component and the kernel, allowing adversaries to remotely execute arbitrary code and run malicious programs with kernel-level privileges. The from The Hacker News https://ift.tt/350m6Lq via IFTTT

Show HN: Ugliest.app – Ugly but good app platform

Show HN: Ugliest.app – Ugly but good app platform 424 by bloopbloop10000 | 148 comments on Hacker News.

Thank You for 20 Years of Discogs

Thank You for 20 Years of Discogs 433 by paulcapewell | 85 comments on Hacker News.

SVG Path Editor

SVG Path Editor 475 by blindm | 44 comments on Hacker News.

Dutch brewery burns iron as a clean, recyclable fuel

Dutch brewery burns iron as a clean, recyclable fuel 614 by bornelsewhere | 218 comments on Hacker News.

Massachusetts voters pass right-to-repair expansion opening up car data

Massachusetts voters pass right-to-repair expansion opening up car data 478 by teruakohatu | 88 comments on Hacker News.

Building an artificial sun that looks realistic [video]

Building an artificial sun that looks realistic [video] 491 by julvo | 121 comments on Hacker News.

Why do printers still suck?

Why do printers still suck? 476 by harha | 491 comments on Hacker News.

Voyager 2 is back online after eight months of radio silence

Voyager 2 is back online after eight months of radio silence 525 by sohkamyung | 115 comments on Hacker News.

North Korean Hackers Used 'Torisma' Spyware in Job Offers-based Attacks

Image
A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims' machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought. The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and defense contractors based in Russia from The Hacker News https://ift.tt/3et0A5j via IFTTT

Premium-Rate Phone Fraudsters Hack VoIP Servers of 1200 Companies

Image
Cybersecurity researchers today took the wraps off an on-going cyber fraud operation led by hackers in Gaza, West Bank, and Egypt to compromise VoIP servers of more than 1,200 organizations across 60 countries over the past 12 months. According to findings published by Check Point Research, the threat actors — believed to be located in the Palestinian Gaza Strip — have targeted Sangoma PBX, an from The Hacker News https://ift.tt/38eg2B2 via IFTTT

Deception Technology: No Longer Only A Fortune 2000 Solution

Image
A cyber-attacker successfully breaks into your environment and begins sneaking around to find something valuable - intellectual property, bank account credentials, company plans, whatever. The attacker makes his way to a certain host on a network node to browse the directories, and suddenly, his connection is cut off. The stolen username and password he acquired no longer works.  Unknowingly, from The Hacker News https://ift.tt/3k6yVZe via IFTTT

If You Don't Have A SASE Cloud Service, You Don't Have SASE At All

Image
The Secure Access Service Edge (or SASE) has been a very hot buzzword in the past year. A term and category created by Gartner 2019, SASE states that the future of networking and security lies in the convergence of these categories into a single, cloud-based platform.The capabilities that SASE delivers aren't new and include SD-WAN, threat prevention, remote access, and others that were from The Hacker News https://ift.tt/3oUEpdb via IFTTT

GitHub Source Code Leak

GitHub Source Code Leak 604 by resynth1943 | 211 comments on Hacker News.

Disclosure: Unlimited Chase Ultimate Rewards Points

Disclosure: Unlimited Chase Ultimate Rewards Points 661 by ic4l | 123 comments on Hacker News.

A nameless hiker and the case the internet can’t crack

A nameless hiker and the case the internet can’t crack 579 by danso | 306 comments on Hacker News.

GitHub: Widespread Injection Vulnerabilities in Actions

GitHub: Widespread Injection Vulnerabilities in Actions 600 by looperhacks | 132 comments on Hacker News.

The public has a right to know how companies that pay no taxes pull it off

The public has a right to know how companies that pay no taxes pull it off 569 by chmaynard | 390 comments on Hacker News.

A tech antitrust problem no one is talking about: US broadband providers

A tech antitrust problem no one is talking about: US broadband providers 601 by elsewhen | 284 comments on Hacker News.

New Kimsuky Module Makes North Korean Spyware More Powerful

Image
A week after the US government issued an advisory about a "global intelligence gathering mission" operated by North Korean state-sponsored hackers, new findings have emerged about the threat group's spyware capabilities. The APT — dubbed "Kimsuky" (aka Black Banshee or Thallium) and believed to be active as early as 2012 — has been now linked to as many as three hitherto undocumented malware, from The Hacker News https://ift.tt/3kWSfsQ via IFTTT

New Chrome Zero-Day Under Active Attacks – Update Your Browser

Image
Google has patched a second actively exploited zero-day flaw in the Chrome browser in two weeks, along with addressing nine other security vulnerabilities in its latest update. The company released 86.0.4240.183 for Windows, Mac, and Linux, which it said will be rolling out over the coming days/weeks to all users. The zero-day flaw, tracked as CVE-2020-16009, was reported by Clement Lecigne of from The Hacker News https://ift.tt/2HR61iJ via IFTTT

No More Google

No More Google 582 by mengledowl | 332 comments on Hacker News.

“Before cancelling your subscription, you must agree to the following”

“Before cancelling your subscription, you must agree to the following” 565 by luu | 165 comments on Hacker News.

South Park creators have new political satire series with AI-generated deepfakes

South Park creators have new political satire series with AI-generated deepfakes 569 by LaSombra | 232 comments on Hacker News.

Google users locked out after 15 years' use

Google users locked out after 15 years' use 605 by eitland | 455 comments on Hacker News.

How to Protect Yourself From Pwned and Password Reuse Attacks

Image
Many businesses are currently looking at how to bolster security across their organization as the pandemic and remote work situation continues to progress towards the end of the year. As organizations continue to implement security measures to protect business-critical data, there is an extremely important area of security that often gets overlooked – passwords. Weak passwords have long been a from The Hacker News https://ift.tt/323NpCX via IFTTT

Raspberry Pi 400 Desktop PC

Raspberry Pi 400 Desktop PC 533 by schappim | 197 comments on Hacker News.

New NAT/Firewall Bypass Attack Lets Hackers Access Any TCP/UDP Service

Image
A new research has demonstrated a technique that allows an attacker to bypass firewall protection and remotely access any TCP/UDP service on a victim machine. Called NAT Slipstreaming, the method involves sending the target a link to a malicious site (or a legitimate site loaded with malicious ads) that, when visited, ultimately triggers the gateway to open any TCP/UDP port on the victim, from The Hacker News https://ift.tt/2TLdh1M via IFTTT

WARNING: Google Discloses Windows Zero-Day Bug Exploited in the Wild

Image
Google has disclosed details of a new zero-day privilege escalation flaw in the Windows operating system that's being actively exploited in the wild. The elevation of privileges (EoP) vulnerability, tracked as CVE-2020-17087, concerns a buffer overflow present since at least Windows 7 in the Windows Kernel Cryptography Driver ("cng.sys") that can be exploited for a sandbox escape. "The bug from The Hacker News https://ift.tt/2GkjTRH via IFTTT

Danish military intelligence uses XKEYSCORE to tap cables in co-op with the NSA

Danish military intelligence uses XKEYSCORE to tap cables in co-op with the NSA 483 by XzetaU8 | 169 comments on Hacker News.

New youtube-dl release: v2020.11.01.1

New youtube-dl release: v2020.11.01.1 580 by geophertz | 179 comments on Hacker News.

NAT Slipstreaming

NAT Slipstreaming 489 by todsacerdoti | 152 comments on Hacker News.

Web based Windows XP desktop recreation, built with React

Web based Windows XP desktop recreation, built with React 544 by fibo | 143 comments on Hacker News.

Foundations of Software Engineering

Foundations of Software Engineering 470 by charlysl | 119 comments on Hacker News.

How to deal with extreme physical pain

How to deal with extreme physical pain 545 by LyalinDotCom | 325 comments on Hacker News.

Ask HN: Please stop writing tutorials/tech articles on Medium

Ask HN: Please stop writing tutorials/tech articles on Medium 502 by gls2ro | 233 comments on Hacker News. Let me put this as simple as I can: Writing tutorials on Medium means you are putting them behind a paywall, thus restricting learning opportunities. Medium is not StackOverflow, it limits the number of articles that can be freely read. If you ever learned something from a blog or from stackoverflow do contribute back by sharing your knowledge open on the internet not behind a paywall.

Photos from inside a Typhoon class submarine

Photos from inside a Typhoon class submarine 546 by hestefisk | 335 comments on Hacker News.