Hacker Newsnew | past | comments | ask | show | jobs | submit | Daviey's submissionslogin
31.Unauthorized Bread: Real rebellions involve jailbreaking IoT toasters (arstechnica.com)
1 point by Daviey on Feb 22, 2020 | past
32.Stop making data scientists manage Kubernetes clusters (towardsdatascience.com)
4 points by Daviey on Feb 19, 2020 | past
33.Pigeons identify breast cancer 'as well as humans' (bbc.co.uk)
1 point by Daviey on Jan 25, 2020 | past
34.Double Ratchet and the Quantum Computers (fredericjacobs.com)
1 point by Daviey on Jan 3, 2020 | past
35.First Full Version of the Cyber Security Body of Knowledge Published – NCSC (ncsc.gov.uk)
3 points by Daviey on Dec 24, 2019 | past
36.Open letter concerning Facebook's proposals to apply end-to-end encryption (gov.uk)
136 points by Daviey on Dec 23, 2019 | past | 133 comments
37.Forging a Path Away from Containers and Config Tools (medium.com/michaeldehaan)
3 points by Daviey on Nov 24, 2019 | past
38.Pointless work meetings 'a form of therapy' (bbc.co.uk)
2 points by Daviey on Nov 19, 2019 | past
39.Weekly Threat Reports – NCSC (ncsc.gov.uk)
1 point by Daviey on Nov 6, 2019 | past
40.PHP Remote Code Execution 0-Day Discovered in Real World CTF Exercise (wallarm.com)
1 point by Daviey on Oct 29, 2019 | past
41.YARA – A pattern-matching Swiss knife for malware researchers (virustotal.github.io)
101 points by Daviey on Oct 22, 2019 | past | 12 comments
42.LastPass bug leaks credentials from previous site (zdnet.com)
310 points by Daviey on Sept 16, 2019 | past | 192 comments
43.Telegram addresses another privacy issue – inputzero (inputzero.io)
2 points by Daviey on Sept 16, 2019 | past
44.Key Negotiation of Bluetooth Attack (knobattack.com)
306 points by Daviey on Aug 16, 2019 | past | 103 comments
45.A Secure Cloud with Minimal Provider Trust [pdf] (usenix.org)
1 point by Daviey on Aug 10, 2019 | past
46.Saying Goodbye to Flash in Chrome (blog.google)
3 points by Daviey on Aug 10, 2019 | past | 3 comments
47.What Is the Spotify Model for Agile? (madebymikal.com)
2 points by Daviey on Aug 6, 2019 | past
48.QualPwn – Exploiting Qualcomm WLAN and Modem over the Air (tencent.com)
1 point by Daviey on Aug 6, 2019 | past
49.Anteater – CI/CD Gate Check Framework (github.com/anteater)
2 points by Daviey on June 27, 2019 | past
50.How to get started with Threat Modeling, before you get hacked (hackernoon.com)
2 points by Daviey on June 27, 2019 | past
51.Workload Identity: Better Authentication for Your GKE (cloud.google.com)
3 points by Daviey on June 26, 2019 | past
52.My Arsenal of Cloud Native (Security) Tools (2018) (marcolancini.it)
1 point by Daviey on June 19, 2019 | past
53.Can insurers think bigger with their heads in the cloud? (linkedin.com)
1 point by Daviey on June 18, 2019 | past
54.74% of Bitcoin mining is powered by renewable energy – HodlHodl news (hodlhodl.com)
3 points by Daviey on June 10, 2019 | past | 1 comment
55.Healthchecks: A Cron Monitoring Tool Written in Python and Django (github.com/healthchecks)
2 points by Daviey on May 15, 2019 | past
56.OpenSSH 8.0 Released (marc.info)
1 point by Daviey on April 18, 2019 | past | 1 comment
57.AI: EU Commission takes forward its work on ethics guidelines (europa.eu)
3 points by Daviey on April 10, 2019 | past | 1 comment
58.Security, complexity and Huawei; protecting UK's telco networks – NCSC (ncsc.gov.uk)
2 points by Daviey on April 3, 2019 | past
59.Huawei cyber security evaluation centre oversight board: annual report – Gov.uk (gov.uk)
1 point by Daviey on March 28, 2019 | past
60.Online Courses for the Ghidra reverse-engineering tool (ghidra.re)
7 points by Daviey on March 8, 2019 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: