Hacker News new | past | comments | ask | show | jobs | submit | from login
Someone has been hacking telecommunications networks around the world (schneier.com)
4 points by DemiGuru 3 days ago | past | 2 comments
Problems with Multifactor Authentication (schneier.com)
4 points by DemiGuru 4 days ago | past | discuss
Textbook Rental Scam (schneier.com)
1 point by CapitalistCartr 4 days ago | past | discuss
Using Machine Learning to Guess Pins from Video (schneier.com)
17 points by CapitalistCartr 5 days ago | past | 14 comments
AI Can Guess your Credit card PINs even when covering the ATM pad (schneier.com)
5 points by ROARosen 6 days ago | past | 1 comment
Ransomware Attacks Against Water Treatment Plant (schneier.com)
1 point by CapitalistCartr 6 days ago | past | discuss
The Missouri Governor Doesn’t Understand Responsible Disclosure (schneier.com)
13 points by CapitalistCartr 6 days ago | past | discuss
Security Risks of Client-Side Scanning (schneier.com)
3 points by CapitalistCartr 7 days ago | past | discuss
Recovering Real Faces from Face-Generation ML System (schneier.com)
1 point by CapitalistCartr 10 days ago | past | discuss
Suing Infrastructure Companies for Copyright Violations (schneier.com)
1 point by CapitalistCartr 11 days ago | past | discuss
War on the Unexpected: Airline Passenger Mistakes Vintage Camera for a Bomb (schneier.com)
3 points by CapitalistCartr 13 days ago | past | discuss
European Parliament Voted to Ban Remote Biometric Surveillance (schneier.com)
207 points by CapitalistCartr 14 days ago | past | 45 comments
Syniverse Hack (schneier.com)
1 point by CapitalistCartr 19 days ago | past
Check What Information the Browser Leaks (schneier.com)
1 point by CapitalistCartr 24 days ago | past
Did NSA Put a Secret Backdoor in the Encryption Standard? (schneier.com)
9 points by iio7 30 days ago | past | 1 comment
I Am Not Satoshi Nakamoto (schneier.com)
165 points by zdw 30 days ago | past | 167 comments
Protonmail now keeps IP Logs (schneier.com)
46 points by lorenz_li 45 days ago | past | 15 comments
Security Risks of Relying on a Single Smartphone (schneier.com)
2 points by CTOSian 47 days ago | past
Zero-Click iPhone Exploits (schneier.com)
2 points by aqrre 54 days ago | past
More Military Cryptanalytics, Part III (schneier.com)
2 points by CTOSian 55 days ago | past
Interesting Privilege Escalation Vulnerability (schneier.com)
1 point by DemiGuru 58 days ago | past
Surveillance of the Internet Backbone (schneier.com)
70 points by todsacerdoti 60 days ago | past | 2 comments
Apple's NeuralHash Algorithm Has Been Reverse-Engineered (schneier.com)
50 points by oedmarap 68 days ago | past | 1 comment
Disrupting Ransomware by Disrupting Bitcoin (schneier.com)
2 points by sorokod 71 days ago | past
Scaring People into Supporting Backdoors (2019) (schneier.com)
46 points by ByteWelder 73 days ago | past
Cobalt Strike Vulnerability Affects Botnet Servers (schneier.com)
1 point by warrenm 73 days ago | past
Scaring People into Supporting Backdoors (schneier.com)
17 points by midnightGhost 75 days ago | past | 1 comment
Apple Adds a Backdoor to iMesssage and iCloud Storage (schneier.com)
32 points by TroisM 76 days ago | past | 4 comments
Using “Master Faces” to Bypass Face-Recognition Authenticating Systems (schneier.com)
2 points by CTOSian 80 days ago | past
Class Breaks (schneier.com)
3 points by pdkl95 84 days ago | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: