Hacker News new | past | comments | ask | show | jobs | submit | from login
Bluetooth LE – Increasingly popular, but still not private (contextis.com)
2 points by Dishwasher_Safe on Aug 13, 2019 | past
Basic Electron Framework Exploitation (contextis.com)
169 points by adambb on Aug 7, 2019 | past | 128 comments
Electron Exploitation: Persistence and Data Egress (Skype, Slack, VSCode) (contextis.com)
2 points by howlett on Jan 24, 2019 | past
A Remote Code Execution Vulnerability in the Steam Client (contextis.com)
75 points by lainon on May 31, 2018 | past | 36 comments
Binary SMS – The old backdoor to your new thing (contextis.com)
213 points by wolframio on May 17, 2018 | past | 37 comments
Don't Feed Them After Midnight: Reverse-Engineering the Furby Connect (contextis.com)
106 points by pdjstone on Nov 24, 2017 | past | 26 comments
Hacking the Virgin Media Super Hub (contextis.com)
1 point by sr2 on June 12, 2017 | past
Comma Separated Vulnerabilities (contextis.com)
201 points by gfalcao on June 5, 2017 | past | 25 comments
Hacking the CloudPets Unicorn with Web Bluetooth (contextis.com)
3 points by pdjstone on March 2, 2017 | past | 1 comment
Hacking the CloudPets Unicorn with Web Bluetooth (contextis.com)
3 points by pdjstone on Feb 28, 2017 | past
Phwning the boardroom: hacking an Android conference phone (contextis.com)
1 point by spaceboy on Feb 15, 2017 | past
WAP just happened to my Samsung Galaxy? (contextis.com)
4 points by lightlyused on Jan 29, 2017 | past
WAP just happened to my Samsung Galaxy? (contextis.com)
1 point by type0 on Jan 24, 2017 | past
Manually Testing SSL/TLS Weaknesses (contextis.com)
2 points by zerognowl on Nov 25, 2016 | past | 1 comment
Porting exploits to a Netgear WNR2200 router (contextis.com)
2 points by Daviey on Oct 2, 2016 | past
Sniffing HTTPS URLS with Malicious PAC Files by Alex Chapman and Paul Stone 201607 (contextis.com)
4 points by based2 on Aug 6, 2016 | past
Reversing the string encryption in the Pangu 9.3 jailbreak (contextis.com)
2 points by tomstokes on Aug 2, 2016 | past
Binary SMS – The old backdoor to your new thing (contextis.com)
2 points by mrb on July 26, 2016 | past
Bluetooth LE – Increasingly popular, but still not very private (contextis.com)
2 points by pdjstone on May 5, 2016 | past
Subverting the Agent on Network PATROL (CVE-2016-2348) (contextis.com)
1 point by gwdg on April 7, 2016 | past
Debugging the Windows Kernel with WinDbg (contextis.com)
2 points by wolframio on March 18, 2016 | past
Android app to scan for nearby fitness trackers (contextis.com)
2 points by TomAnthony on May 22, 2015 | past
Thanks for the Memories: Identifying Malware from a Memory Capture (contextis.com)
33 points by 2510c39011c5 on March 2, 2015 | past | 6 comments
Glibc Adventures: The Forgotten Chunks [pdf] (contextis.com)
29 points by 2510c39011c5 on Feb 22, 2015 | past | 1 comment
Comma Separated Vulnerabilities (contextis.com)
6 points by vibhubhola on Dec 31, 2014 | past
Pixel Perfect Timing Attacks with HTML5 (contextis.com)
2 points by jarek-foksa on March 31, 2014 | past
Framesniffing side-channel technique extracts data from SharePoint and LinkedIn (contextis.com)
2 points by stonedyak on March 14, 2012 | past
WebGL – More WebGL Security Flaws (contextis.com)
2 points by robin_reala on June 16, 2011 | past
WebGL - A New Dimension for Browser Exploitation (contextis.com)
24 points by pwg on May 13, 2011 | past | 8 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: