security
Home
Recent
Comments
Search
Login
Stories
tagged
as
security
– Netsec, appsec, and infosec
14
The Web is still a DARPA weapon
historical
javascript
networking
security
web
medium.com
authored by
Shamar
1 month ago
|
cached
|
20 comments
20
4
Who's afraid of Spectre & Meltdown?
hardware
security
fsfla.org
via
pizzaiolo
1 month ago
|
cached
|
2 comments
2
2
Making a Blind SQL Injection a Little Less Blind
databases
security
medium.com
via
calvin
1 month ago
|
cached
|
no comments
0
3
An Introduction to Verifiedexec in NetBSD (2012)
video
netbsd
security
unix
youtube.com
via
sevan
1 month ago
|
cached
|
no comments
0
2
Race Detection for Event-Driven Mobile Applications (2014)
☶
pdf
mobile
programming
security
web.eecs.umich.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
3
Improving PHP extensions as a persistence method
php
security
x-c3ll.github.io
via
calvin
1 month ago
|
cached
|
no comments
0
12
Detecting the use of "curl | bash" server side (2016)
security
unix
idontplaydarts.com
via
friendlysock
1 month ago
|
cached
|
no comments
0
2
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets
pdf
security
wp.internetsociety.org
via
fro
1 month ago
|
cached
|
no comments
0
41
Recommend a password manager?
☶
ask
security
authored by
duclare
1 month ago
|
47 comments
47
1
On the Weaknesses of Function Table Randomization
pdf
security
ei.ruhr-uni-bochum.de
via
fro
1 month ago
|
cached
|
no comments
0
13
Remote Spectre exploits demonstrated
security
lwn.net
via
Flisk
1 month ago
|
cached
|
1 comment
1
4
The Design and Implementation of Hyperupcalls
☶
pdf
performance
security
virtualization
usenix.org
via
ceh
1 month ago
|
cached
|
no comments
0
15
Vulnerability in Hangouts Chat a.k.a. how Electron makes open redirect great again
browsers
security
web
blog.bentkowski.info
via
whbboyd
1 month ago
|
cached
|
3 comments
3
3
Clickjacking Chrome Extensions
browsers
security
blog.lizzie.io
authored by
l_zzie
1 month ago
|
cached
|
no comments
0
10
Microsoft finds cryptocurrency miners deployed via PDF Fonts
security
cloudblogs.microsoft.com
via
jkirchartz
1 month ago
|
cached
|
1 comment
1
2
A NEaT Design for Reliable and Scalable Network Stacks (2016)
☶
pdf
networking
security
cs.vu.nl
via
nickpsecurity
1 month ago
|
cached
|
1 comment
1
34
NetSpectre: Read Arbitrary Memory over Network
pdf
hardware
security
misc0110.net
via
alex_gaynor
1 month ago
|
cached
|
1 comment
1
5
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
☶
pdf
hardware
security
s3.eurecom.fr
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
2
Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs
☶
pdf
compsci
security
weis2016.econinfosec.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
6
Breaking the Bluetooth Pairing – Fixed Coordinate Invalid Curve Attack
security
cs.technion.ac.il
via
oda
1 month ago
|
cached
|
no comments
0
7
Cracking the Walls of the Safari Sandbox Fuzzing the macOS WindowServer for Exploitable Vulnerabilit
mac
security
blog.ret2.io
via
SeanW
1 month ago
|
cached
|
no comments
0
19
RISC-V Foundation Forms Security Committee
hardware
security
embedded-computing.com
via
minimax
1 month ago
|
cached
|
no comments
0
4
Diffy: A digital forensics and incident response tool
python
security
github.com
via
ceh
1 month ago
|
cached
|
no comments
0
1
Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M
security
krebsonsecurity.com
via
bunny
1 month ago
|
cached
|
no comments
0
5
Decade of research shows little improvement in password guidance
security
web
plymouth.ac.uk
via
mempko
1 month ago
|
cached
|
2 comments
2
<< Page 4
|
Page 6 >>