| | Social Psychology: Discovering the Weakest Link in Cybersecurity (securityevaluators.com) |
|
1 point by WaitWaitWha on April 27, 2022 | past
|
| | Reverse Engineering Bumble’s API (2020) (securityevaluators.com) |
|
129 points by stevekemp on June 12, 2021 | past | 41 comments
|
| | Reverse Engineering Bumble’s API (2020) (securityevaluators.com) |
|
3 points by stevekemp on Nov 16, 2020 | past
|
| | Security Vulnerabilities in Network Accessible Services (securityevaluators.com) |
|
1 point by programd on Sept 18, 2019 | past
|
| | Ethercombing: Finding Secrets in Popular Places (securityevaluators.com) |
|
29 points by wglb on April 24, 2019 | past | 9 comments
|
| | Ethercombing: Finding private keys used for Ethereum blockchain transactions (securityevaluators.com) |
|
1 point by headalgorithm on April 23, 2019 | past
|
| | Password Managers: Under the Hood of Secrets Management (securityevaluators.com) |
|
350 points by thenaturalist on Feb 20, 2019 | past | 198 comments
|
| | Password Managers: Under the Hood of Secrets Management (securityevaluators.com) |
|
33 points by abbracadabbra on Feb 20, 2019 | past | 5 comments
|
| | Security Flaws Found in Top Password Managers (securityevaluators.com) |
|
8 points by eaq on Feb 19, 2019 | past | 1 comment
|
| | From FAR and NEAR: Exploiting Overflows on Windows 3.x [pdf] (securityevaluators.com) |
|
1 point by bane on Dec 1, 2018 | past
|
| | ASUSWRT RCE via Buffer Overflow, ASLR Bypass (securityevaluators.com) |
|
2 points by regexp on Nov 28, 2018 | past
|
| | Hacking Asustor AS-602T (CVE-2018-12313) Vuln on SNMP API Allows Root Commands (securityevaluators.com) |
|
1 point by rm-rf_mydir on Aug 22, 2018 | past
|
| | Industry Meltdown, or Just a Spectre? (securityevaluators.com) |
|
1 point by Dangeranger on Jan 5, 2018 | past
|
| | How to Get into IoT Hardware Hacking (Introductory Tool Guide) (securityevaluators.com) |
|
3 points by su-rm-rf on Jan 6, 2017 | past
|
| | A Breach in the Same-Origin Policy Induced by Mirroring External Content (securityevaluators.com) |
|
2 points by adamnemecek on Oct 19, 2016 | past
|
| | A Breach in the Same-Origin Policy Induced by Mirroring External Content (securityevaluators.com) |
|
1 point by su-rm-rf on Oct 19, 2016 | past
|
| | Hacking the JavaScript Lottery (securityevaluators.com) |
|
2 points by colinprince on June 2, 2016 | past
|
| | Remote access to 11 out of 13 SOHO routers (securityevaluators.com) |
|
1 point by casca on April 19, 2013 | past
|
| | Exploiting Android (exploit found in G1's browser) (securityevaluators.com) |
|
1 point by pmjordan on Oct 26, 2008 | past
|
| | Exploiting the iPhone (securityevaluators.com) |
|
2 points by dpapathanasiou on July 23, 2007 | past | 1 comment
|