For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Social Psychology: Discovering the Weakest Link in Cybersecurity
(
securityevaluators.com
)
1 point
by
WaitWaitWha
on April 27, 2022
|
past
Reverse Engineering Bumble’s API (2020)
(
securityevaluators.com
)
129 points
by
stevekemp
on June 12, 2021
|
past
|
41 comments
Reverse Engineering Bumble’s API (2020)
(
securityevaluators.com
)
3 points
by
stevekemp
on Nov 16, 2020
|
past
Security Vulnerabilities in Network Accessible Services
(
securityevaluators.com
)
1 point
by
programd
on Sept 18, 2019
|
past
Ethercombing: Finding Secrets in Popular Places
(
securityevaluators.com
)
29 points
by
wglb
on April 24, 2019
|
past
|
9 comments
Ethercombing: Finding private keys used for Ethereum blockchain transactions
(
securityevaluators.com
)
1 point
by
headalgorithm
on April 23, 2019
|
past
Password Managers: Under the Hood of Secrets Management
(
securityevaluators.com
)
350 points
by
thenaturalist
on Feb 20, 2019
|
past
|
198 comments
Password Managers: Under the Hood of Secrets Management
(
securityevaluators.com
)
33 points
by
abbracadabbra
on Feb 20, 2019
|
past
|
5 comments
Security Flaws Found in Top Password Managers
(
securityevaluators.com
)
8 points
by
eaq
on Feb 19, 2019
|
past
|
1 comment
From FAR and NEAR: Exploiting Overflows on Windows 3.x [pdf]
(
securityevaluators.com
)
1 point
by
bane
on Dec 1, 2018
|
past
ASUSWRT RCE via Buffer Overflow, ASLR Bypass
(
securityevaluators.com
)
2 points
by
regexp
on Nov 28, 2018
|
past
Hacking Asustor AS-602T (CVE-2018-12313) Vuln on SNMP API Allows Root Commands
(
securityevaluators.com
)
1 point
by
rm-rf_mydir
on Aug 22, 2018
|
past
Industry Meltdown, or Just a Spectre?
(
securityevaluators.com
)
1 point
by
Dangeranger
on Jan 5, 2018
|
past
How to Get into IoT Hardware Hacking (Introductory Tool Guide)
(
securityevaluators.com
)
3 points
by
su-rm-rf
on Jan 6, 2017
|
past
A Breach in the Same-Origin Policy Induced by Mirroring External Content
(
securityevaluators.com
)
2 points
by
adamnemecek
on Oct 19, 2016
|
past
A Breach in the Same-Origin Policy Induced by Mirroring External Content
(
securityevaluators.com
)
1 point
by
su-rm-rf
on Oct 19, 2016
|
past
Hacking the JavaScript Lottery
(
securityevaluators.com
)
2 points
by
colinprince
on June 2, 2016
|
past
Remote access to 11 out of 13 SOHO routers
(
securityevaluators.com
)
1 point
by
casca
on April 19, 2013
|
past
Exploiting Android (exploit found in G1's browser)
(
securityevaluators.com
)
1 point
by
pmjordan
on Oct 26, 2008
|
past
Exploiting the iPhone
(
securityevaluators.com
)
2 points
by
dpapathanasiou
on July 23, 2007
|
past
|
1 comment
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.