Hacker News new | past | comments | ask | show | jobs | submit | from login
Social Psychology: Discovering the Weakest Link in Cybersecurity (securityevaluators.com)
1 point by WaitWaitWha on April 27, 2022 | past
Reverse Engineering Bumble’s API (2020) (securityevaluators.com)
129 points by stevekemp on June 12, 2021 | past | 41 comments
Reverse Engineering Bumble’s API (2020) (securityevaluators.com)
3 points by stevekemp on Nov 16, 2020 | past
Security Vulnerabilities in Network Accessible Services (securityevaluators.com)
1 point by programd on Sept 18, 2019 | past
Ethercombing: Finding Secrets in Popular Places (securityevaluators.com)
29 points by wglb on April 24, 2019 | past | 9 comments
Ethercombing: Finding private keys used for Ethereum blockchain transactions (securityevaluators.com)
1 point by headalgorithm on April 23, 2019 | past
Password Managers: Under the Hood of Secrets Management (securityevaluators.com)
350 points by thenaturalist on Feb 20, 2019 | past | 198 comments
Password Managers: Under the Hood of Secrets Management (securityevaluators.com)
33 points by abbracadabbra on Feb 20, 2019 | past | 5 comments
Security Flaws Found in Top Password Managers (securityevaluators.com)
8 points by eaq on Feb 19, 2019 | past | 1 comment
From FAR and NEAR: Exploiting Overflows on Windows 3.x [pdf] (securityevaluators.com)
1 point by bane on Dec 1, 2018 | past
ASUSWRT RCE via Buffer Overflow, ASLR Bypass (securityevaluators.com)
2 points by regexp on Nov 28, 2018 | past
Hacking Asustor AS-602T (CVE-2018-12313) Vuln on SNMP API Allows Root Commands (securityevaluators.com)
1 point by rm-rf_mydir on Aug 22, 2018 | past
Industry Meltdown, or Just a Spectre? (securityevaluators.com)
1 point by Dangeranger on Jan 5, 2018 | past
How to Get into IoT Hardware Hacking (Introductory Tool Guide) (securityevaluators.com)
3 points by su-rm-rf on Jan 6, 2017 | past
A Breach in the Same-Origin Policy Induced by Mirroring External Content (securityevaluators.com)
2 points by adamnemecek on Oct 19, 2016 | past
A Breach in the Same-Origin Policy Induced by Mirroring External Content (securityevaluators.com)
1 point by su-rm-rf on Oct 19, 2016 | past
Hacking the JavaScript Lottery (securityevaluators.com)
2 points by colinprince on June 2, 2016 | past
Remote access to 11 out of 13 SOHO routers (securityevaluators.com)
1 point by casca on April 19, 2013 | past
Exploiting Android (exploit found in G1's browser) (securityevaluators.com)
1 point by pmjordan on Oct 26, 2008 | past
Exploiting the iPhone (securityevaluators.com)
2 points by dpapathanasiou on July 23, 2007 | past | 1 comment

Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: