| 691. |  | Unpatched routers being used to build vast proxy army, spy on networks
           (arstechnica.com)
          Security | 
|  | 105 points by rbanffy 1 hours ago | 46 comments | 
  |
      | 692. |  | Google wants to get rid of URLs but doesn’t know what to use instead
           (arstechnica.com)
          Security | 
|  | 34 points by pestkranker 1 hours ago | 79 comments | 
  |
      | 693. |  | Windows Task Scheduler Zero Day Exploited by Malware
           (bleepingcomputer.com)
          Security Microsoft | 
|  | 41 points by rbanffy 4 hours ago | 31 comments | 
  |
      | 694. |  | 400,000 websites vulnerable through exposed .git directories
           (scmagazine.com)
          Security | 
|  | 61 points by Bedon292 59 minutes ago | 40 comments | 
  |
      | 695. |  | North Korean Spy to Be Charged in Sony Pictures Hacking
           (nytimes.com)
          Politics Security | 
|  | 65 points by NN88 22 hours ago | 45 comments | 
  |
      | 696. |  | You can't contain me: elevation-of-privilege vulnerability in Docker for Windows
           (srcincite.io)
          Security Microsoft | 
|  | 144 points by ingve 6 hours ago | 46 comments | 
  |
      | 697. |  | PowerPool malware exploits ALPC LPE zero-day only 2 days after disclosure
           (welivesecurity.com)
          Security Microsoft | 
|  | 6 points by lysp 14 hours ago | 0 comments | 
  |
      | 698. |  | Rogue MEGA Chrome Extension Stole Passwords and Crypto Keys
           (torrentfreak.com)
          Security Google | 
|  | 6 points by Cowicide 18 hours ago | 1 comments | 
  |
      | 699. |  | British Airways customer data stolen from its website
           (theguardian.com)
          Politics Security | 
|  | 11 points by bart42_0 17 hours ago | 0 comments | 
  |
      | 700. |  | Show HN: BitMidi – Wayback machine for old-school MIDI files
           (bitmidi.com)
          Security Apple | 
|  | 166 points by feross 14 hours ago | 80 comments | 
  |
      | 701. |  | Keybase:“Our browser extension subverts our encryption, but why should we care?”
           (palant.de)
          Security | 
|  | 225 points by fallenhitokiri 8 hours ago | 75 comments | 
  |
      | 702. |  | How Spam Filtering Works: From SPF to DKIM to Blacklists
           (deliciousbrains.com)
          Security | 
|  | 142 points by prostoalex 23 hours ago | 62 comments | 
  |
      | 703. |  | A Popular Mac App That Sent Users' Browsing History to China Has Been Removed
           (buzzfeednews.com)
          Mobile Security | 
|  | 163 points by tortilla 21 hours ago | 137 comments | 
  |
      | 704. |  | Slack is Down
           (slack.com)
          Security | 
|  | 42 points by sinak 19 hours ago | 10 comments | 
  |
      | 705. |  | God's Own Cryptosystem
           (jacobitemag.com)
          Security | 
|  | 14 points by DanAndersen 20 hours ago | 1 comments | 
  |
      | 706. |  | Fundamentals of penetration testing
           (hpe.com)
          Security | 
|  | 11 points by ohjeez 19 hours ago | 0 comments | 
  |
      | 707. |  | Wi-Fi Gets More Secure: Everything You Need to Know About WPA3
           (ieee.org)
          Security | 
|  | 260 points by NicoJuicy 15 hours ago | 151 comments | 
  |
      | 708. |  | What the Heck Happened on the International Space Station?
           (theatlantic.com)
          Politics Security Science | 
|  | 18 points by CraneWorm 5 hours ago | 0 comments | 
  |
      | 709. |  | Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob
           (wired.com)
          Security | 
|  | 10 points by snake117 20 hours ago | 0 comments | 
  |
      | 710. |  | Spoofing DNS with fragments
           (powerdns.com)
          Security | 
|  | 31 points by ahubert 17 hours ago | 44 comments | 
  |
      | 711. |  | Tesla Model S Can Be Stolen in Seconds by Cloning Its Key Fob
           (kuleuven.be)
          Security | 
|  | 62 points by rubenbe 20 hours ago | 33 comments | 
  |
      | 712. |  | Tesla’s keyless entry vulnerable to spoofing attack, researchers find
           (theverge.com)
          Mobile Security | 
|  | 13 points by rbanffy 16 hours ago | 2 comments | 
  |
      | 713. |  | Exploit vendor drops Tor Browser zero-day on Twitter (for previous version)
           (zdnet.com)
          Security | 
|  | 7 points by detaro 17 hours ago | 2 comments | 
  |
      | 714. |  | The NSA Continues to Blame Technology for Breaking the Law
           (eff.org)
          Politics Security | 
|  | 26 points by raleighm 11 hours ago | 0 comments | 
  |
      | 715. |  | GAO Says Equifax Missed Flaws, Intrusion in Massive Breach
           (darkreading.com)
          Security | 
|  | 16 points by xref 15 hours ago | 0 comments | 
  |
      | 716. |  | ProtonVPN and NordVPN Bugs Left Windows Vulnerable to Hackers
           (ampproject.org)
          Security | 
|  | 23 points by axiomdata316 15 hours ago | 17 comments | 
  |
      | 717. |  | California's bad IoT law
           (erratasec.com)
          Security | 
|  | 20 points by raleighm 9 hours ago | 5 comments | 
  |
      | 718. |  | India's Aadhaar Software Hacked, 1.2B ID Database Compromised, Experts Confirm
           (huffingtonpost.in)
          Security | 
|  | 453 points by anivar 8 hours ago | 151 comments | 
  |
      | 719. |  | Slack is down
           (slack.com)
          Security | 
|  | 4 points by fr33104d 6 hours ago | 0 comments | 
  |
      | 720. |  | Certificate Transparency logs and how they are a gold mine to Bug Hunters
           (chris408.com)
          Security Google | 
|  | 64 points by chris408 9 hours ago | 10 comments | 
  |
|
    |
|  | More |