Hacker Newsnew | past | comments | ask | show | jobs | submit | luck87's submissionslogin
1.RamSec driver analysis (artemonsecurity.blogspot.com)
2 points by luck87 on Oct 5, 2016 | past
2.South Korea military cyber command was hacked (yonhapnews.co.kr)
97 points by luck87 on Oct 2, 2016 | past | 58 comments
3.Cybercrime meets ransomware (securelist.com)
6 points by luck87 on Sept 29, 2016 | past
4.Microsoft Patches CVE-2016-3351 Zero-Day, Exploited (proofpoint.com)
2 points by luck87 on Sept 20, 2016 | past
5.Ripper atm malware (trendmicro.com)
1 point by luck87 on Sept 20, 2016 | past
6.OPSEC for honeypots (xiphosresearch.com)
75 points by luck87 on Dec 11, 2015 | past | 8 comments
7.Attack floods Internet root servers with 5M queries a second (arstechnica.com)
2 points by luck87 on Dec 10, 2015 | past
8.The ultimate guide to creating a brilliant startup pitch presentation (mauriziolacava.com)
3 points by luck87 on Nov 19, 2015 | past
9.Ask HN: Mi Band Xiaomi hack?
2 points by luck87 on Oct 20, 2015 | past | 4 comments
10.Eternity Wall: the public registry underneath Bitcoin (eternitywall.it)
3 points by luck87 on Oct 20, 2015 | past | 1 comment
11.Researchers Say They Have Designed an 'Unhackable' Fiber Network (vice.com)
1 point by luck87 on Oct 5, 2015 | past
12.Mac OS X 10.9.5 / 10.10.5 – rsh/libmalloc Privilege Escalation (exploit-db.com)
1 point by luck87 on Oct 5, 2015 | past
13.The new art of war: trolls, hackers and spies (toinformistoinfluence.com)
3 points by luck87 on Sept 16, 2015 | past
14.Darpa Protecting Software from Reverse Engineering Through Obfuscation (threatpost.com)
2 points by luck87 on Sept 15, 2015 | past
15.Digital identity verification tool (out-law.com)
1 point by luck87 on Sept 9, 2015 | past
16.Ask HN: Android Material design pattern guide?
1 point by luck87 on Sept 9, 2015 | past
17.Caffeine Content in Espresso vs. Drip Coffee (coffeechemistry.com)
3 points by luck87 on Sept 8, 2015 | past
18.Boffins laugh at Play Store bonehead security with instant app checker (theregister.co.uk)
2 points by luck87 on Aug 31, 2015 | past
19.PARANOID release internal infosec guide (theregister.co.uk)
1 point by luck87 on Aug 31, 2015 | past
20.Mother Nature teaches Google a lesson (networkworld.com)
3 points by luck87 on Aug 24, 2015 | past
21.Your router: Gateway for hackers (networkworld.com)
2 points by luck87 on Aug 24, 2015 | past
22.Cheap thermal imagers can steal user PINs (itnews.com.au)
3 points by luck87 on Aug 23, 2015 | past
23.How to Bypass SMS Verification of Any Website/Service (effecthacking.com)
1 point by luck87 on Aug 23, 2015 | past | 1 comment
24.How Google's icon experiment could improve online security (csmonitor.com)
7 points by luck87 on Aug 15, 2015 | past | 1 comment
25.How to Turn Your Android Smartphone into a Super Spy (effecthacking.com)
15 points by luck87 on Aug 12, 2015 | past | 4 comments
26.Ask HN: GitHub cloned your project, what can I do?
46 points by luck87 on Aug 12, 2015 | past | 22 comments
27.Ask HN: Could secure offline transactions be possible?
3 points by luck87 on Aug 12, 2015 | past | 1 comment
28.Dilbert about coder's life (dilbert.com)
1 point by luck87 on July 29, 2015 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: