Hacker News new | comments | show | ask | jobs | submit | from login
Operation Parliament, who is doing what? (securelist.com)
1 point by kushti 3 months ago | past | web
Potent malware that hid for six years spread through routers (securelist.com)
203 points by jonbaer 4 months ago | past | web | 63 comments
Somebody’s watching When cameras are more than just ‘smart’ (securelist.com)
1 point by ge0rg 4 months ago | past | web
How to break a smart home, again (securelist.com)
108 points by kushti 4 months ago | past | web | 75 comments
[flagged] Telegram Remote Code Execution Zero-Day Vulnerability (securelist.com)
43 points by geektips 5 months ago | past | web | 16 comments
How not to use a driver to execute code with kernel privileges (securelist.com)
3 points by DiabloD3 5 months ago | past | web
Newly discovered Android malware contains never-seen surveillance features (securelist.com)
1 point by thg 5 months ago | past | web
Skygofree: Following in the footsteps of HackingTeam (securelist.com)
1 point by DiabloD3 5 months ago | past | web
Skygofree: Following in the footsteps of HackingTeam (securelist.com)
4 points by r3bl 6 months ago | past | web
Android commercial spyware (2017) (securelist.com)
1 point by detaro 6 months ago | past | web
Silence – a new Trojan attacking financial organizations (securelist.com)
2 points by beefhash 8 months ago | past | web
When fourth-party collection becomes attribution hell [pdf] (securelist.com)
22 points by nkurz 9 months ago | past | web | 2 comments
Absolute Computrace Revisited (2014) (securelist.com)
1 point by platinumrad 9 months ago | past | web
When fourth-party collection becomes attribution hell [pdf] (securelist.com)
1 point by nkurz 9 months ago | past | web
An (un)documented [Microsoft] Word feature abused by attackers (securelist.com)
2 points by pferde 10 months ago | past | web
Why Economic Incentive May Lead to the Failure of Bitcoin (securelist.com)
3 points by kushti 10 months ago | past | web
Introducing WhiteBear (securelist.com)
31 points by sandmansandine 10 months ago | past | web | 2 comments
ShadowPad in corporate networks (securelist.com)
1 point by andreasley 11 months ago | past | web
ShadowPad in corporate networks (securelist.com)
1 point by daenney 11 months ago | past | web
ExPetr/Petya/NotPetya Is a Wiper, Not Ransomware (securelist.com)
2 points by dpflan on June 29, 2017 | past | web
WannaCry mistakes that can help you restore files after infection (securelist.com)
1 point by dsr12 on June 2, 2017 | past | web
WannaCry and Lazarus Group (securelist.com)
1 point by mzs on May 16, 2017 | past | web
WannaCry and Lazarus Group – the missing link? (securelist.com)
4 points by doener on May 15, 2017 | past | web
WannaCry ransomware used in widespread attacks all over the world (securelist.com)
5 points by sajal83 on May 12, 2017 | past | web
Lazarus Under the Hood (securelist.com)
2 points by yammesicka on Apr 5, 2017 | past | web
Fileless attacks against enterprise networks (securelist.com)
1 point by spaceboy on Feb 11, 2017 | past | web
Fileless attacks against enterprise networks (securelist.com)
1 point by ghosh on Feb 10, 2017 | past | web
Fileless attacks against enterprise networks (securelist.com)
1 point by sllabres on Feb 8, 2017 | past | web
The banker that encrypted files (securelist.com)
1 point by maxt on Dec 23, 2016 | past | web
The first cryptor to exploit Telegram (securelist.com)
69 points by speps on Nov 10, 2016 | past | web | 19 comments
More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: