Hacker   12323

« earlier     later »

Trust War: Dangerous Trends in Cyber Conflict
Cyber-attacks on trust and integrity are harder to detect, defend against, and recover from than attacks designed to cause physical destruction or widespread disruption. When a denial of service attack happens, a site goes down and it is pretty clear something has gone wrong. Theft of information is somewhat harder to detect, but existing security tools are often able to determine what data left the system. It is, however, extremely difficult for the defender to know whether an attacker manipulated data or weakened system integrity, and even harder to restore trust
lowtrustsociety  hacker  to_blog 
5 weeks ago by yorksranter
Twitter
#knuth #bowdoin #story #birthday #hacker #security https://t.co/AB0Xr9dOni
story  birthday  knuth  security  hacker  via:packrati.us  bowdoin 
6 weeks ago by mshook
The Aviationist » Defining Asymmetrical Warfare: Extremists Use Retail Drones to Attack Russian Air Base in Syria
Well, this has eventually happened. the monster, super expensive son-of-Sergeant-York SPAAG they're using against them is telling in itself
aviation  uav  hacker  gps  syria  russia  4gw 
6 weeks ago by yorksranter
Hacker News Hiring Trends - Most Popular Programming Languages
Hacker News Hiring Trends
Tracking the most popular programming languages, databases and software development tools in whoishiring discussion threads.
news  hacker  hiring  trend  programming 
6 weeks ago by kaxing
I’m harvesting credit card numbers and passwords from your site. Here’s how.
ant to click the little follow button below to get a notification when it’s out, you may go ahead and do that now.
read  hack  npm  modules  hacker  privacy  safety 
6 weeks ago by billkeller

« earlier    later »

related tags

&  ++  /  -  138  2017  2600  4gw  a  advice  aggregator  ai  algorithm  algorithms  amt  and  app  apt28  armed  art  article  articles  asm  assembly  automation  aviation  awesome  beach  bgp  birthday  bitcoin  blockchain  blog  book  books  bowdoin  bug  bugs  bundle  business  c4istar  calvin  cancer  carr  casagora  catch  category.theory  cctv  charity  china  chronicle  clickman  cloud  cmd  collection  commands  community  computer  computers  computing  corpus  cpu  cracking  crypto  cryptocurrency  culture  custom  cyberpunk  cybersecurity  cyberwar  cypherpunk  daily_read?  dangerous  data  database  dataleak  david  dccc  debian  democratic  development  dial  dict  disinformation  diy  dnc  documentation  doj  donaldtrump  doooomed  download  drive  dvr  e.  eap  ebooks  edition  edition:  editor  education  election2016  encryption  engineering  eric  esr  ew  exec  expert-experience  exploit  exposed  farming  fbi  fear  feed  feedly  felon  flir  folklore  follow  freesoftware  fun  funny  gabriellacoleman  gadget  git  github  google  gop  gps  graham  gtd  guide  hack  hacker-news  hacker  hacker_news  hackernews  hackers  hackerspace  hacking  hacks  hardware  hat  hiring  history  hn  holder  house  hrc  hrmcmaster  https://sites.google.com/view/clickmanllc/  humor  humour  i.  improv  influence  init  intel  intelligence  internet  internet_filter  internet_of_shit  interview  intro  iversen  jagron  jamescomey  japan  jaredkushner  jargon  javascript  jeffsessions  job  jones  jupyter  karamoon  keyboard  keylogger  king  knowledge  knuth  koan  kubernetes  language  lawyers  learning  links  linux  list  listening  llc  llp.pdf  lock  lowtrustsociety  machinelearning  maker  malware  math  meltdown  modules  moralhorror  movie  movies  mshta  murphy  nc  netart  networking  news  newsletter  nfc  notebook  npm  nsa  nsc  nyc  nymag  nyt  obama  opensource  opporesearch  os  overcast  painter  painters  painting  palm  password  paul  paulmanafort  peerproduction  pentest  phd  php  pinterest  pipelines  plt  podcast  podcasting  politics  portsmouth  pr  privacy  prof  profhacker  programming  pullrequest  putin  python  raspberry_pi  raymond  read  recommendations  recursos  reincepriebus  republican  research  resource  rfid  rms  roadmap  robert  robertmuller  rootkits:  rotation  rss  russia  safety  scandals  scripting  scripts  searchengine  second  secrets  security  server  service  sh  shaving  shop  shopping  social  socialmedia  socialnetworking  software  solutions  south…  spam  spectre  spectrometry  spectroscopy  spy  staffers  startup  stephenmiller  stewart  story  strategy  structure  structures  stupidity  style  submissions  sudduth  swat  syria  system  talk  technical  technology  techtariat  text  to  to_blog  tool  tools  trend  trezor  tutorial  twitter  uav  uber  ui  vbscript  video  wapo  web  webdev  white  whitehat  whitehouse  wifi  wikileaks  win-t  windows  wood  writing  wsj  xijinping  yak  yokohama  zine  |   

Copy this bookmark:



description:


tags: