Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Bluetooth Headphone Jacking: Full Disclosure of Airoha Race Vulnerabilities (insinuator.net)
6 points by marvinborner 48 days ago | past | 2 comments
Vulnerability in Windows Hello for Business – The Face Swap (insinuator.net)
1 point by Harvesterify 6 months ago | past
CVEs in Bluetooth Headphones and Earbuds (insinuator.net)
6 points by n_plus_1_acc 7 months ago | past
Security Advisory: Airoha-Based Bluetooth Headphones and Earbuds (insinuator.net)
2 points by perlgeek 7 months ago | past
Vulnerabilities in Airoha-Based Bluetooth Headphones (insinuator.net)
2 points by incognitojam 7 months ago | past | 2 comments
Security Advisory: Airoha-Based Bluetooth Headphones and Earbuds (insinuator.net)
5 points by todsacerdoti 7 months ago | past
When Your Edge Browser Syncs Private Data to Your Employer (insinuator.net)
3 points by exiguus 8 months ago | past
Cookie Prefixes – The Lesser Known Cookie Security Feature (insinuator.net)
1 point by exiguus 8 months ago | past
Lua-Resty-JWT Authentication Bypass (insinuator.net)
1 point by 8organicbits on Oct 12, 2023 | past
Assesment of Visual Voicemail on iPhones (2012) (insinuator.net)
1 point by rubatuga on July 15, 2023 | past
Of Corona, Buggy Audio Drivers and Industrial Espionage (insinuator.net)
1 point by beatrobot on April 27, 2021 | past
Of Corona, Buggy Audio Drivers and Industrial Espionage (insinuator.net)
6 points by todsacerdoti on April 26, 2021 | past
VMware NSX-T MitM Vulnerability (CVE-2020-3993) (insinuator.net)
1 point by wolframio on Nov 27, 2020 | past
An Android 8.0-9.0 Bluetooth Zero-Click RCE (insinuator.net)
139 points by faebi on April 24, 2020 | past | 61 comments
Critical Bluetooth vulnerability in Android (insinuator.net)
504 points by photon-torpedo on Feb 7, 2020 | past | 300 comments
A Brief History of the IPv4 Address Space (insinuator.net)
2 points by wolframio on Sept 1, 2019 | past
IPv6 Security in an IPv4-Only Environment (insinuator.net)
1 point by wolframio on Feb 21, 2019 | past
Local Packet Filtering with IPv6 (2017) (insinuator.net)
1 point by okket on May 8, 2018 | past
TLS in the Enterprise: Is Heartbleed Still a Problem? (insinuator.net)
2 points by wolframio on Feb 19, 2018 | past
Let’s talk about RFC 6980 (insinuator.net)
1 point by wolframio on Dec 1, 2017 | past
RedStar OS Watermarking (insinuator.net)
2 points by rscnt on June 2, 2017 | past
IoT the S Is for Secure – Unknown Administration Interface in Wireless Plug (insinuator.net)
2 points by demouser7 on Nov 21, 2016 | past
How to become part of an iot botnet (insinuator.net)
1 point by Daviey on Oct 2, 2016 | past
Considerations on DMZ Design in 2016, Part 1 (insinuator.net)
2 points by okket on Aug 27, 2016 | past
Ss7MAPer – A SS7 pen testing toolkit (insinuator.net)
3 points by okket on Aug 1, 2016 | past | 1 comment
The Beauty of IPv6 Link-Local Addressing. Not (insinuator.net)
3 points by okket on May 29, 2016 | past
Xen XSA 155: Double fetches in paravirtualized devices (insinuator.net)
1 point by joosters on Dec 20, 2015 | past
Xen XSA 155: Double fetches in paravirtualized devices (insinuator.net)
10 points by fwilhelm on Dec 17, 2015 | past | 1 comment
Some Notes on the “Drop IPv6 Fragments” vs. “This Will Break DNS[SEC]” Debate (insinuator.net)
1 point by liotier on Nov 3, 2015 | past
What Can Happen in the Course of Vulnerability Disclosure (insinuator.net)
38 points by edwinjm on Sept 11, 2015 | past | 6 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: