Toggle navigation
HN
Paper
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Stats
Stories by wglb
Illegal marketing of signal jamming devices [pdf]
2 points
wglb
2014-06-22T13:38:49Z
transition.fcc.gov
Clayton Christensen and disruptive innovation: Is the concept a myth?
2 points
wglb
2014-06-18T18:19:40Z
www.slate.com
The nine companies that know more about you than Google or Facebook
5 points
wglb
2014-06-18T17:42:03Z
qz.com
P.F. Chang’s Breach Likely Began in Sept. 2013
32 points
wglb
2014-06-18T15:21:40Z
krebsonsecurity.com
Final post on JavaScript crypto
1 points
wglb
2014-06-17T16:44:56Z
rdist.root.org
Hackers compromise personal data of 600,000 Domino’s Pizza customers
5 points
wglb
2014-06-15T18:36:17Z
www.myce.com
SourceClear Raises $1.5M Seed Round For Its Software Security Platform
3 points
wglb
2014-06-11T22:39:12Z
techcrunch.com
U.S. ports vulnerable to cyber attacks, new report suggests
1 points
wglb
2014-06-11T19:32:09Z
www.nola.com
Ars tests Internet surveillance by spying on an NPR reporter
244 points
wglb
2014-06-11T19:26:39Z
arstechnica.com
Private Line Service For High Frequency Direction Finding Facilities
1 points
wglb
2014-06-11T13:57:51Z
transition.fcc.gov
Aiming to make recruiting more accountable
2 points
wglb
2014-06-10T15:03:38Z
bluesky.chicagotribune.com
MH370: crowdfunding campaign to raise money to reward potential 'whistleblower'
4 points
wglb
2014-06-08T21:19:06Z
www.thestar.com.my
OpenSSL DTLS Fragment Out-of-Bounds Write: Breaking up is hard to do
1 points
wglb
2014-06-05T17:59:24Z
h30499.www3.hp.com
kCura's National Day of Civic Hacking churned out some sweet hacks
3 points
wglb
2014-06-05T17:18:50Z
www.builtinchicago.org
Appeals courts in Chicago holds highly unusual 'secret' session
3 points
wglb
2014-06-04T22:56:23Z
www.chicagotribune.com
Sold Down the River (widespread IPMI exposure)
8 points
wglb
2014-06-04T22:45:44Z
fish2.com
Judge Releases Information about Police Use of Stingray Cell Phone Trackers
251 points
wglb
2014-06-04T01:46:16Z
www.aclu.org
US cybercrime laws being used to target security researchers
273 points
wglb
2014-05-29T17:54:41Z
www.theguardian.com
Anatomy of a Rails Vulnerability: From Directory Traversal to Shell [pdf]
46 points
wglb
2014-05-29T17:42:45Z
matasano.com
The Serval Mesh
43 points
wglb
2014-05-29T17:38:02Z
play.google.com
123
124
125
126
127
128
129
130
131
132