Hacker Newsnew | past | comments | ask | show | jobs | submit | TheloniusPhunk's submissionslogin
1.Malvertising Or Just Advertising? The Curious Case Of Counterclank (threatpost.com)
2 points by TheloniusPhunk on Jan 30, 2012 | past
2.Revamped Pwn2Own to Offer $105K in Prizes (threatpost.com)
1 point by TheloniusPhunk on Jan 23, 2012 | past
3.Bill Gates's Trustworthy Computing Memo: Ten Years Later (threatpost.com)
2 points by TheloniusPhunk on Jan 12, 2012 | past
4.Losing The Cops In A Foot Chase? There's An App For That (threatpost.com)
2 points by TheloniusPhunk on Jan 5, 2012 | past
5.Survey Suggest Most Americans are Media Pirates (threatpost.com)
1 point by TheloniusPhunk on Jan 5, 2012 | past
6.Lilupophilupop SQL Injection Attack Tops 1 Million Infected URLs (threatpost.com)
1 point by TheloniusPhunk on Jan 4, 2012 | past
7.Thinking About Software Security Holistically (threatpost.com)
2 points by TheloniusPhunk on Dec 30, 2011 | past
8.Quality Coding Takes A Break For The Holidays. But Why? (threatpost.com)
3 points by TheloniusPhunk on Dec 20, 2011 | past
9.Generation Y Won't Listen To IT (threatpost.com)
2 points by TheloniusPhunk on Dec 15, 2011 | past
10.Combination of Eyes and Algorithms Wins $50K Prize In DARPA's Shredder Challenge (threatpost.com)
1 point by TheloniusPhunk on Dec 12, 2011 | past
11.Insecure Applications: We Are The 84 Percent (threatpost.com)
1 point by TheloniusPhunk on Dec 7, 2011 | past
12.Twitter Acquires Mobile Security Firm WhisperSystems (threatpost.com)
1 point by TheloniusPhunk on Nov 28, 2011 | past
13.Was The 3 Character Password at Hacked Water Treatment Plant A Siemens Default? (threatpost.com)
18 points by TheloniusPhunk on Nov 22, 2011 | past | 8 comments
14.Facebook & Twitter Erode Your Co.'s Security From Within. Here's How To Stop It. (threatpost.com)
1 point by TheloniusPhunk on Nov 10, 2011 | past
15.Apple Trips Up Again on Security (threatpost.com)
1 point by TheloniusPhunk on Nov 9, 2011 | past
16.Apple Drops Researcher From Dev Program Over iOS Bug Demo App (threatpost.com)
2 points by TheloniusPhunk on Nov 8, 2011 | past
17.Government's Auditing Program For the Cloud Falling Behind Schedule (threatpost.com)
1 point by TheloniusPhunk on Nov 3, 2011 | past
18.Things to do when the Internet is down (imgur.com)
1 point by TheloniusPhunk on Nov 2, 2011 | past
19.Compromised WordPress Sites Redirecting to Black Hole Exploit Kit Servers (threatpost.com)
1 point by TheloniusPhunk on Nov 2, 2011 | past
20.Fortune 500 Gets "F" In Social Engineering Hacking Test (threatpost.com)
2 points by TheloniusPhunk on Oct 31, 2011 | past
21.Facebook Flaw Allows Users to Send Executables (threatpost.com)
2 points by TheloniusPhunk on Oct 28, 2011 | past
22.EFF Data Shows Five CAs Compromised Since June (threatpost.com)
33 points by TheloniusPhunk on Oct 27, 2011 | past | 2 comments
23.So many things moving/storing data, they don't even know what they're all doing (threatpost.com)
1 point by TheloniusPhunk on Oct 27, 2011 | past
24.Google Report Shows It Complied With 93% of U.S. Law Enforcement Data Requests (threatpost.com)
3 points by TheloniusPhunk on Oct 25, 2011 | past
25.Walking Among Security Giants (threatpost.com)
2 points by TheloniusPhunk on Oct 25, 2011 | past
26.New Research Shows Possibility of Using an iPhone as a Keylogger (threatpost.com)
1 point by TheloniusPhunk on Oct 18, 2011 | past
27.Informant Says Hacks, Threats Followed Release Of Occupy Wall Street E-Mail (threatpost.com)
7 points by TheloniusPhunk on Oct 18, 2011 | past | 4 comments
28.Inside a Hacker Forum (threatpost.com)
1 point by TheloniusPhunk on Oct 17, 2011 | past
29.It's Time For an Apple Patch Tuesday (threatpost.com)
1 point by TheloniusPhunk on Oct 14, 2011 | past
30.Thousands of Patients at Risk of ID Theft Following Genentech Breach (threatpost.com)
2 points by TheloniusPhunk on Oct 13, 2011 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: