For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Expert: TrickBot Malware Now Checks Screen Resolution to Evade Analysis
(
informationsecuritybuzz.com
)
2 points
by
farrah08
on July 2, 2020
|
past
Experts on Password “123456”
(
informationsecuritybuzz.com
)
1 point
by
farrah08
on July 2, 2020
|
past
Expert on AnarchyGrabber Trojan Update Stealing Discord Clients Passwords
(
informationsecuritybuzz.com
)
1 point
by
joyia88
on June 1, 2020
|
past
Hacker Steals 31 SQL Databases (1.6 mln rows of data)
(
informationsecuritybuzz.com
)
2 points
by
keydutch
on May 27, 2020
|
past
UK airline easyJet data breach impacts 9M customers – expert commentary
(
informationsecuritybuzz.com
)
1 point
by
keydutch
on May 20, 2020
|
past
Phishing Techniques Bypass Two-Factor Authentication
(
informationsecuritybuzz.com
)
2 points
by
joyia88
on Sept 9, 2019
|
past
620M Account Details for Sale on Dark Web
(
informationsecuritybuzz.com
)
2 points
by
keydutch
on Feb 12, 2019
|
past
Getting the Airlines Back on Their Feet After a Disaster
(
informationsecuritybuzz.com
)
6 points
by
kiyanwang
on Oct 1, 2018
|
past
New Mac OS X Malware Steals Audio, Video and Keystrokes
(
informationsecuritybuzz.com
)
2 points
by
djmoch
on Sept 13, 2016
|
past
Sage Breach: Lessons Learned
(
informationsecuritybuzz.com
)
1 point
by
noam717
on Aug 21, 2016
|
past
Lady Trojan Turns Linux Servers into Bitcoin Miners
(
informationsecuritybuzz.com
)
1 point
by
laamalif
on Aug 17, 2016
|
past
1 in 20 Banking Customer Devices Is Infected with Malware
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Feb 13, 2015
|
past
White House Announces Creation of New Cyber Threat Agency – Expert Comments
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Feb 12, 2015
|
past
Young Children Left Vulnerable as Cyberbullying Education Comes Too Late
(
informationsecuritybuzz.com
)
3 points
by
DMBisson
on Feb 11, 2015
|
past
Year of the Digital Threat: The Four Biggest Cyber Security Incidents of 2014
(
informationsecuritybuzz.com
)
2 points
by
DMBisson
on Feb 10, 2015
|
past
Guide to Protection Against a Data Breach
(
informationsecuritybuzz.com
)
2 points
by
DMBisson
on Feb 9, 2015
|
past
Anthem Data Breach – Expert Comments
(
informationsecuritybuzz.com
)
2 points
by
DMBisson
on Feb 6, 2015
|
past
More U.K. Companies Identifying Security as a Major Risk, Uncertainty
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Feb 5, 2015
|
past
Small Business Moves to Secure Internet of Things (IoT) Opportunity
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Feb 4, 2015
|
past
Websense Discovers F0xy, a Cunning and Trickster Malware
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Feb 3, 2015
|
past
Lest We Forget the Sony Hack
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Feb 2, 2015
|
past
Lizard Squad Strikes Again – Nexusguard Comment
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Jan 30, 2015
|
past
Making the Year of the Retail Breach a Thing of the Past
(
informationsecuritybuzz.com
)
2 points
by
DMBisson
on Jan 29, 2015
|
past
Security and the State of Application Delivery
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Jan 28, 2015
|
past
Chrome 40 and SHA-2: Certificate Boogaloo
(
informationsecuritybuzz.com
)
1 point
by
DMBisson
on Jan 27, 2015
|
past
Healthcare.gov May Be Leaking Sensitive Information – Voltage Security Comment
(
informationsecuritybuzz.com
)
3 points
by
DMBisson
on Jan 26, 2015
|
past
Is Penetration Testing Missing the Threat Inside?
(
informationsecuritybuzz.com
)
2 points
by
DMBisson
on Jan 23, 2015
|
past
5 Reasons to Not Move to the Cloud
(
informationsecuritybuzz.com
)
2 points
by
DMBisson
on Jan 22, 2015
|
past
Game of Hacks: Promoting Secure Coding Practices
(
informationsecuritybuzz.com
)
2 points
by
DMBisson
on Jan 21, 2015
|
past
32 Percent Take No Precautions When Letting Others Use Their Devices
(
informationsecuritybuzz.com
)
4 points
by
DMBisson
on Jan 20, 2015
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.