Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
RF Exploitation: IoT Hacking with SDR (2019) [pdf] (hitb.org)
1 point by teleforce on Aug 2, 2024 | past
One-Click to Completely Take over a macOS Device (hitb.org)
1 point by kinduff on Aug 25, 2022 | past
AWS GuardDuty cover channel vulnerability (hitb.org)
2 points by sbtmuller on May 26, 2021 | past
Crowdfense launches $15M 0-day 2019 global Acquisition Program (hitb.org)
1 point by DyslexicAtheist on March 11, 2019 | past
DHCP is hard: a story in five bugs [pdf] (hitb.org)
3 points by fanf2 on Jan 8, 2019 | past
In the Trails of Windshift APT (PDF Slides) (hitb.org)
2 points by laacz on Dec 29, 2018 | past
Australian gov’t wants to force tech firms to weaken crypto (hitb.org)
3 points by DyslexicAtheist on Aug 16, 2018 | past
Facebook approves $10M a year for Zuckerberg family security (hitb.org)
2 points by DyslexicAtheist on July 28, 2018 | past
Critical Tor Browser flaw leaks users’ real IP address (hitb.org)
2 points by beefhash on Nov 4, 2017 | past
Spy vs. Spy: A Modern Study of Microphone Bugs [con Presentation and Whitepaper] (hitb.org)
2 points by bahjoite on Sept 20, 2017 | past
A Surprise Encounter with a Telco APT [pdf] (hitb.org)
1 point by smueller1234 on April 21, 2017 | past
Pwning banks – Miika Turkia [pdf] (hitb.org)
2 points by Buetol on April 18, 2017 | past | 1 comment
Greek MNO Compromised (yet again?) (hitb.org)
1 point by vtsingaras on March 27, 2017 | past
TeLeScope – peering into the depths of TLS traffic from the hypervisor [pdf] (hitb.org)
2 points by walterbell on June 27, 2016 | past
TeLeScope – real-time peering into the depths of TLS traffic from the hypervisor [pdf] (hitb.org)
4 points by NeutronBoy on June 15, 2016 | past
IRON-HID: Create your own bad USB [pdf] (hitb.org)
4 points by josephscott on May 30, 2016 | past | 1 comment
Hack in the Box 2016 – All Presentation PDFs (hitb.org)
2 points by campuscodi on May 28, 2016 | past
Escape from the Docker-KVM-QEMU Machine [pdf] (hitb.org)
3 points by trexert on May 26, 2016 | past
Hackers Made Millions Insider Trading by Stealing Press Releases (hitb.org)
4 points by USNetizen on Aug 12, 2015 | past
Non-Hidden Hidden Services Considered Harmful [pdf] (hitb.org)
1 point by jakobdabo on June 2, 2015 | past
Non-Hidden Hidden Services Considered Harmful [pdf] (hitb.org)
1 point by icehawk on June 1, 2015 | past
Attack Allows ISPs to Detect Users' .onion Visits [pdf] (hitb.org)
1 point by jasonmp85 on June 1, 2015 | past
Infecting BIOSes Is a LOT Easier Than You May Have Realised [pdf] (hitb.org)
2 points by ZoFreX on May 28, 2015 | past
Major security alert as 40K MongoDB databases left unsecured on the internet (hitb.org)
2 points by mcknz on Feb 12, 2015 | past
Weapons of Mass Distraction: Sock Puppetry for Fun and Profit (hitb.org)
1 point by singold on Dec 22, 2014 | past
Weapons of Mass Distraction: Sock Puppetry for Fun and Profit [pdf] (hitb.org)
1 point by SworDsy on Nov 18, 2014 | past
Malware Analysis Using Visualization (2013) [pdf] (hitb.org)
11 points by pmoriarty on Nov 9, 2014 | past
Mozilla adopts plain-vanilla password sign-in for Firefox sync (hitb.org)
34 points by hiburo on Feb 3, 2014 | past | 42 comments
Apple Can Read iMessages (hitb.org)
7 points by abaschin on Sept 21, 2013 | past | 5 comments
Abusing Twitter API & OAuth Implementation (hitb.org)
1 point by FredericJ on April 10, 2013 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: