| 1. | | RamSec driver analysis (artemonsecurity.blogspot.com) |
| 2 points by luck87 on Oct 5, 2016 | past |
|
| 2. | | South Korea military cyber command was hacked (yonhapnews.co.kr) |
| 97 points by luck87 on Oct 2, 2016 | past | 58 comments |
|
| 3. | | Cybercrime meets ransomware (securelist.com) |
| 6 points by luck87 on Sept 29, 2016 | past |
|
| 4. | | Microsoft Patches CVE-2016-3351 Zero-Day, Exploited (proofpoint.com) |
| 2 points by luck87 on Sept 20, 2016 | past |
|
| 5. | | Ripper atm malware (trendmicro.com) |
| 1 point by luck87 on Sept 20, 2016 | past |
|
| 6. | | OPSEC for honeypots (xiphosresearch.com) |
| 75 points by luck87 on Dec 11, 2015 | past | 8 comments |
|
| 7. | | Attack floods Internet root servers with 5M queries a second (arstechnica.com) |
| 2 points by luck87 on Dec 10, 2015 | past |
|
| 8. | | The ultimate guide to creating a brilliant startup pitch presentation (mauriziolacava.com) |
| 3 points by luck87 on Nov 19, 2015 | past |
|
| 9. | | Ask HN: Mi Band Xiaomi hack? |
| 2 points by luck87 on Oct 20, 2015 | past | 4 comments |
|
| 10. | | Eternity Wall: the public registry underneath Bitcoin (eternitywall.it) |
| 3 points by luck87 on Oct 20, 2015 | past | 1 comment |
|
| 11. | | Researchers Say They Have Designed an 'Unhackable' Fiber Network (vice.com) |
| 1 point by luck87 on Oct 5, 2015 | past |
|
| 12. | | Mac OS X 10.9.5 / 10.10.5 – rsh/libmalloc Privilege Escalation (exploit-db.com) |
| 1 point by luck87 on Oct 5, 2015 | past |
|
| 13. | | The new art of war: trolls, hackers and spies (toinformistoinfluence.com) |
| 3 points by luck87 on Sept 16, 2015 | past |
|
| 14. | | Darpa Protecting Software from Reverse Engineering Through Obfuscation (threatpost.com) |
| 2 points by luck87 on Sept 15, 2015 | past |
|
| 15. | | Digital identity verification tool (out-law.com) |
| 1 point by luck87 on Sept 9, 2015 | past |
|
| 16. | | Ask HN: Android Material design pattern guide? |
| 1 point by luck87 on Sept 9, 2015 | past |
|
| 17. | | Caffeine Content in Espresso vs. Drip Coffee (coffeechemistry.com) |
| 3 points by luck87 on Sept 8, 2015 | past |
|
| 18. | | Boffins laugh at Play Store bonehead security with instant app checker (theregister.co.uk) |
| 2 points by luck87 on Aug 31, 2015 | past |
|
| 19. | | PARANOID release internal infosec guide (theregister.co.uk) |
| 1 point by luck87 on Aug 31, 2015 | past |
|
| 20. | | Mother Nature teaches Google a lesson (networkworld.com) |
| 3 points by luck87 on Aug 24, 2015 | past |
|
| 21. | | Your router: Gateway for hackers (networkworld.com) |
| 2 points by luck87 on Aug 24, 2015 | past |
|
| 22. | | Cheap thermal imagers can steal user PINs (itnews.com.au) |
| 3 points by luck87 on Aug 23, 2015 | past |
|
| 23. | | How to Bypass SMS Verification of Any Website/Service (effecthacking.com) |
| 1 point by luck87 on Aug 23, 2015 | past | 1 comment |
|
| 24. | | How Google's icon experiment could improve online security (csmonitor.com) |
| 7 points by luck87 on Aug 15, 2015 | past | 1 comment |
|
| 25. | | How to Turn Your Android Smartphone into a Super Spy (effecthacking.com) |
| 15 points by luck87 on Aug 12, 2015 | past | 4 comments |
|
| 26. | | Ask HN: GitHub cloned your project, what can I do? |
| 46 points by luck87 on Aug 12, 2015 | past | 22 comments |
|
| 27. | | Ask HN: Could secure offline transactions be possible? |
| 3 points by luck87 on Aug 12, 2015 | past | 1 comment |
|
| 28. | | Dilbert about coder's life (dilbert.com) |
| 1 point by luck87 on July 29, 2015 | past |
|