Hacker Newsnew | past | comments | ask | show | jobs | submit | neilwillgettoit's submissionslogin
1.All Trains in the USA are vulnerable to wireless RF command injection (cisa.gov)
2 points by neilwillgettoit 7 months ago | past | 2 comments
2.0x01 – Killing Windows Kernel Mitigations (wetw0rk.github.io)
118 points by neilwillgettoit on Dec 8, 2024 | past | 13 comments
3.UBNT AirVision Auth Bypass – One Way Shodan.io Gets Images (medium.com/neilwillgettoit)
3 points by neilwillgettoit on Feb 16, 2016 | past
4.How Threat Intelligence can work against you
2 points by neilwillgettoit on Aug 4, 2015 | past
5.How Government Can Prepare for and Respond to Social Media Hacks (youtube.com)
2 points by neilwillgettoit on Jan 18, 2015 | past
6.Gitrob – OSINT gathering tool for GitHub (michenriksen.com)
63 points by neilwillgettoit on Jan 13, 2015 | past | 7 comments
7.Facebook – Taking Down the Lecpetex Botnet (facebook.com)
2 points by neilwillgettoit on July 9, 2014 | past
8.So you want to hack a TV station? (l8security.com)
2 points by neilwillgettoit on March 7, 2013 | past
9.PayPal Bug Bounty - a lesson in not being a fuckup (l8security.com)
168 points by neilwillgettoit on Oct 19, 2012 | past | 25 comments
10.Beating Google Two-Factor Authentication with App Specific Passwords. (l8security.com)
8 points by neilwillgettoit on Aug 14, 2012 | past | 13 comments
11.Civil GPS spoofing attacks - practical use cases. (zingcheckout.com)
3 points by neilwillgettoit on July 24, 2012 | past
12.Mom Hacks into a school computer 110 times to change her children's grades (mashable.com)
2 points by neilwillgettoit on July 23, 2012 | past
13.OpenDNS 2012 Sysadmin Awards Applications open (opendns.com)
1 point by neilwillgettoit on June 19, 2012 | past
14.Festi BotMaster Igor Artimovich Responds to Kerb's Article about Him. (krebsonsecurity.com)
3 points by neilwillgettoit on June 14, 2012 | past
15.The Critical Security Flaws that Resulted in Last Friday's Hack (cloudflare.com)
189 points by neilwillgettoit on June 5, 2012 | past | 48 comments
16.Forget 'Brogrammers,' Women Have The Edge In DEFCON Social Engineering Contest (threatpost.com)
3 points by neilwillgettoit on May 21, 2012 | past
17.Lazy function parameters using C++11 lambdas (github.com/leszekswirski)
3 points by neilwillgettoit on May 19, 2012 | past
18.F-35 Joint Strike Fighter Coding Standard Documentation (att.com)
133 points by neilwillgettoit on May 13, 2012 | past | 52 comments
19.IFixit's Review of the New iPad's User Repairability. (ifixit.org)
2 points by neilwillgettoit on March 18, 2012 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: