Hacker News new | past | comments | ask | show | jobs | submit | from login
What the Fuzz (mwrinfosecurity.com)
1 point by pentestercrab on Jan 25, 2019 | past
Apple Safari – Wasm Section Exploit [pdf] (mwrinfosecurity.com)
2 points by dsr12 on April 17, 2018 | past
Some Brief Notes on WebKit Heap Hardening (mwrinfosecurity.com)
2 points by detaro on April 14, 2018 | past
Some Brief Notes on WebKit Heap Hardening (mwrinfosecurity.com)
2 points by pizlonator on April 13, 2018 | past
Alexa, are you listening? (mwrinfosecurity.com)
182 points by hammock on Dec 5, 2017 | past | 153 comments
High Interaction Honeypots with Sysdig and Falco (mwrinfosecurity.com)
10 points by pmoriarty on Nov 6, 2017 | past
Hacking WebUSB (mwrinfosecurity.com)
2 points by yarapavan on Oct 4, 2017 | past | 1 comment
WebUSB – How a website could steal data off your phone (mwrinfosecurity.com)
10 points by modinfo on Oct 3, 2017 | past
Jailbreak Amazon Echo (mwrinfosecurity.com)
2 points by kfihihc on Aug 3, 2017 | past
Alexa, are you listening? (mwrinfosecurity.com)
1 point by daegloe on Aug 3, 2017 | past
Alexa, are you listening? (mwrinfosecurity.com)
3 points by xkcd-sucks on Aug 2, 2017 | past
Researchers discover way to turn Amazon Echos into covert listening devices (mwrinfosecurity.com)
2 points by microwavecamera on Aug 1, 2017 | past
Alexa, are you listening? (mwrinfosecurity.com)
3 points by g0xA52A2A on Aug 1, 2017 | past
Digital Lockpicking: Why Your Front Door Shouldn't Be on the Internet (mwrinfosecurity.com)
2 points by maxt on Jan 10, 2017 | past
AirDroid – Multiple Vulnerabilities (mwrinfosecurity.com)
1 point by maxt on Jan 9, 2017 | past
Analyzing honeypot interactions (mwrinfosecurity.com)
48 points by apurvadave on Jan 4, 2017 | past | 1 comment
Creating Malicious Outlook Rules (mwrinfosecurity.com)
1 point by Daviey on Sept 3, 2016 | past
QNX: Security Architecture Whitepaper (mwrinfosecurity.com)
1 point by transpute on March 17, 2016 | past
Win an invitation to HackFu 2015 (mwrinfosecurity.com)
1 point by simas on March 24, 2015 | past
Windows 8 Kernel Memory Protections Bypass (mwrinfosecurity.com)
77 points by flurpitude on Aug 18, 2014 | past | 12 comments
Android 4.4.2 Secure USB Debugging Bypass (mwrinfosecurity.com)
2 points by lelf on July 7, 2014 | past
Laravel cookie forgery, decryption, and RCE (mwrinfosecurity.com)
25 points by krapp on April 20, 2014 | past | 12 comments
Paypal Android App Remote Code Execution (mwrinfosecurity.com)
32 points by ge0rg on March 29, 2014 | past | 13 comments
Remote Code Execution in Paypal for Android because of SSL Bypass (mwrinfosecurity.com)
2 points by henryhn on March 12, 2014 | past
Mercury 2.2 is out (mwrinfosecurity.com)
1 point by Hellcat on July 22, 2013 | past
A framework to search for android vulnerabilities (mwrinfosecurity.com)
1 point by daralthus on Sept 12, 2012 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: