Hacker News new | past | comments | ask | show | jobs | submit | from login
JavaScript Cryptography Considered Harmful (2011 – still relevant) (matasano.com)
1 point by ColinWright on May 22, 2017 | past | web | 1 comment
Enough with the Salts: Updates on Secure Password Schemes (matasano.com)
339 points by saturdayplace on Apr 1, 2015 | past | web | 221 comments
Enough with the Salts: Updates on Secure Password Schemes (matasano.com)
16 points by alcari on Mar 26, 2015 | past | web
New Vulnerability: Mercurial Command Injection (CVE-2014-9462) (matasano.com)
35 points by wglb on Mar 18, 2015 | past | web | 4 comments
Phate: Investigations into Windows Phone 8 (matasano.com)
12 points by jerematasno on Jan 19, 2015 | past | web
Typing the Letters A-E-S Into Your Code (2009) (matasano.com)
168 points by zorked on Jan 9, 2015 | past | web | 63 comments
Ninja Threat Modeling (2009) (matasano.com)
20 points by wglb on Jan 8, 2015 | past | web
Bypassing OpenSSL Certificate Pinning in iOS Apps (matasano.com)
32 points by silenteh on Jan 7, 2015 | past | web | 13 comments
JavaScript Cryptography Considered Harmful (matasano.com)
127 points by mazsa on June 17, 2014 | past | web | 140 comments
Anatomy of a Rails Vulnerability: From Directory Traversal to Shell [pdf] (matasano.com)
46 points by wglb on May 29, 2014 | past | web
Announcing The Matasano/Square CTF (matasano.com)
297 points by alepper on Jan 17, 2014 | past | web | 72 comments
Javascript Cryptography Considered Harmful (matasano.com)
3 points by apgwoz on June 24, 2013 | past | web | 1 comment
The Matasano Crypto Challenges (matasano.com)
87 points by greyman on Apr 21, 2013 | past | web | 34 comments
Javascript Cryptography Considered Harmful (matasano.com)
95 points by LVB on Jan 27, 2013 | past | web | 103 comments
Multiple 0-days in DarkComet RAT (matasano.com)
1 point by mytummyhertz on Oct 9, 2012 | past | web
Attacking Clientside JIT Compilers (matasano.com)
4 points by wglb on Sept 20, 2011 | past | web
Javascript Cryptography Considered Harmful (matasano.com)
207 points by adgar on Aug 28, 2011 | past | web | 174 comments
Black Hat 2011: "Attacking Client Side JIT Compilers" (matasano.com)
5 points by nbpoole on Aug 8, 2011 | past | web
Getting Started with Flint (matasano.com)
1 point by wglb on Mar 27, 2010 | past | web
On reversing/anti-reversing techniques and running security competitions (matasano.com)
5 points by r11t on Jan 22, 2010 | past | web
How To Hide^H^H^Handle Security Vulnerabilities In Your Products (matasano.com)
10 points by niyazpk on Jan 12, 2010 | past | web | 1 comment
What You Need To Know About Secure Password Schemes (matasano.com)
46 points by mcantor on Jan 9, 2010 | past | web | 12 comments
If You're Typing The Letters A-E-S Into Your Code, You're Doing It Wrong (matasano.com)
94 points by jeffreyg on Jan 4, 2010 | past | web | 46 comments
Protecting the laptop herd (matasano.com)
2 points by yan on Dec 22, 2009 | past | web
"Like it or not, developing an attack plan for a penetration test requires ..." (matasano.com)
1 point by stakent on Nov 19, 2009 | past | web
Ninja Threat Modeling (matasano.com)
16 points by gthank on Oct 20, 2009 | past | web | 11 comments
A C++ Challenge - The Conclusion (matasano.com)
21 points by gthank on Oct 16, 2009 | past | web | 2 comments
Diffie Hellman Parameter Validation Attacks Explained (matasano.com)
13 points by tptacek on Oct 15, 2009 | past | web | 2 comments
A C++ Challenge (matasano.com)
33 points by wheels on Oct 12, 2009 | past | web | 24 comments
Ruby For Pentesters - WIN32OLE (matasano.com)
18 points by Shamiq on Oct 7, 2009 | past | web | 3 comments

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: