1. | | United Nations signs off on 'right to privacy in the digital age' (theregister.co.uk) |
| 2 points by turnersr on Jan 17, 2014 | past |
|
2. | | "Red October" - part two, the modules (securelist.com) |
| 3 points by turnersr on Jan 18, 2013 | past |
|
3. | | JS Implementation Of WebCrypt, funded by the US Department of Homeland Security (polycrypt.net) |
| 3 points by turnersr on Jan 14, 2013 | past | 1 comment |
|
4. | | The Parallella Board Uncovered (adapteva.com) |
| 3 points by turnersr on Oct 24, 2012 | past |
|
5. | | Everything You Wanted To Know About OpenSSL (But Were Afraid to Ask) |
| 3 points by turnersr on Oct 22, 2012 | past |
|
6. | | New Metasploit 0-day exploit for IE 7, 8 & 9 on Windows XP, Vista, and 7 (rapid7.com) |
| 138 points by turnersr on Sept 17, 2012 | past | 51 comments |
|
7. | | Protect JS crypto keys from XSS, using iframes and postMessage (hoffman-andrews.com) |
| 3 points by turnersr on Aug 5, 2012 | past |
|
8. | | Advanced Exploitation of Mozilla Firefox Use-after-free Vulnerability (vupen.com) |
| 1 point by turnersr on June 25, 2012 | past |
|
9. | | Efficient Padding Oracle Attacks on Cryptographic Hardware (inria.fr) |
| 2 points by turnersr on June 25, 2012 | past |
|
10. | | Tor malware (torproject.org) |
| 1 point by turnersr on June 24, 2012 | past |
|
11. | | Symbolic methods for security analysis (ucsd.edu) |
| 1 point by turnersr on June 3, 2012 | past |
|
12. | | Ethiopia Introduces Deep Packet Inspection (torproject.org) |
| 2 points by turnersr on May 31, 2012 | past |
|
13. | | Swift: Scripting Language for Many-Task Computing (uchicago.edu) |
| 50 points by turnersr on May 31, 2012 | past | 13 comments |
|
14. | | Dempsy: Distributed Elastic Message Processing System (dempsy.github.com) |
| 35 points by turnersr on May 29, 2012 | past | 5 comments |
|
15. | | Backdoor found in a China-made US military chip (cam.ac.uk) |
| 536 points by turnersr on May 27, 2012 | past | 149 comments |
|
16. | | Ruby SQL injection library:UNION stacked queries, logarithmic blind injection (sourceforge.net) |
| 1 point by turnersr on May 11, 2012 | past |
|
17. | | Encrypted chat in the browser (crypto.cat) |
| 2 points by turnersr on April 30, 2012 | past |
|
18. | | Plaid CTF April 27, 2012 21:00 UTC (plaidctf.com) |
| 1 point by turnersr on April 9, 2012 | past |
|
19. | | Exploit Linux Machines Through Fun Challenges (exploit-exercises.com) |
| 160 points by turnersr on April 8, 2012 | past | 14 comments |
|
20. | | VX Heavens Collection (thepiratebay.se) |
| 1 point by turnersr on April 5, 2012 | past |
|
21. | | Cracking PIN and Password Locks On Android (spreitzenbarth.de) |
| 1 point by turnersr on April 4, 2012 | past |
|
22. | | Prototyping Cryptosystems With Python (charm-crypto.com) |
| 2 points by turnersr on April 4, 2012 | past |
|
23. | | Secure Multi-Party Computations With Python (viff.dk) |
| 17 points by turnersr on April 4, 2012 | past | 1 comment |
|
24. | | Side-Channel Vulnerabilities in Web Applications (virginia.edu) |
| 2 points by turnersr on Feb 22, 2012 | past |
|
25. | | Inferring Context-Free Grammars (wikipedia.org) |
| 2 points by turnersr on Dec 8, 2011 | past |
|
26. | | Ask HN: Security Researcher Jobs |
| 7 points by turnersr on Nov 26, 2011 | past | 3 comments |
|
27. | | Interested in a 2nd edition of "Real World Haskell"? (spreadsheets.google.com) |
| 6 points by turnersr on Aug 25, 2011 | past | 3 comments |
|
28. | | Application of Algebraic Coding Theory (youtube.com) |
| 4 points by turnersr on Aug 12, 2011 | past |
|