Curation by crmsnbleyd 10 months, 3 weeks ago for query hacker
Original results
-
http://seclists.org/ — found via Mwmbl
SecLists.Org Security Mailing List Archive
Any hacker will tell you that the latest news and exploits are not found on any web site—not even Insecure.Org . No, the cutting edge in security research…
-
https://www.wired.com/2014/11/what-is-a-zero-day/ — found via Mwmbl
Hacker Lexicon: What Is a Zero Day? | WIRED
Zero-day vulnerability refers to a security hole in software---such as browser software or operating system software---that is yet unknown to the software…
-
http://www.paulgraham.com/hackernews.html — found via Mwmbl
What I've Learned from Hacker News
Hacker News was two years old last week. Initially it was supposed to be a side project—an application to sharpen Arc on, and a place for current and futu…
-
https://cyberscoop.com/dc-health-data-posted-online/ — found via Mwmbl
Hacker posts more D.C. Health Link data online, exposing lawmake…
The initial breach was first reported last week after a House official warned lawmakers that they could have been exposed. But over the weekend, the scope…
-
http://mashable.com/2014/12/08/hackers-emailed-sony-execs/ — found via Mwmbl
Hackers sent extortion email to Sony executives 3 days before at…
The hackers behind the massive Sony Pictures breach warned of a damaging cyberattack in a jumbled email sent to company executives three days before the h…
-
https://hackernoon.com/why-is-python-so-slow-e5074b6fe55b — found via Mwmbl
Why is Python so slow? | HackerNoon
LEARN MORE ABOUT @ANTHONY.P.SHAW 'S EXPERTISE AND PLACE ON THE INTERNET. Python is booming in popularity. It is used in DevOps, Data Science, Web Developm…
-
http://blog.wired.com/27bstroke6/2008/04/hacker-in-murdo.html — found via Mwmbl
Hacker in Murdoch Trial Acknowledges Receiving Money from Murdoc…
An American hacker who is at the core of a piracy trial against a Rupert Murdoch subsidiary, testified this week that he created pirating software for the…
-
https://www.intigriti.com/ — found via Mwmbl
Intigriti - Bug Bounty & Agile Pentesting Platform
Malicious hackers don’t always follow a predefined security methodology like penetration testers, and automated tools only scratch the surface. Connect wi…
-
https://techcrunch.com/2020/04/01/zoom-doom/ — found via Mwmbl
Ex-NSA hacker drops new zero-day doom for Zoom
Now that a large portion of the world is working from home to ride out the coronavirus pandemic , Zoom’s popularity has rocketed, but also has led to an i…
-
https://www.wired.com/2016/06/hacker-lexicon-password-hashing/ — found via Mwmbl
Hacker Lexicon: What Is Password Hashing? | WIRED
Digital megabreaches have lately become so commonplace as to be almost indistinguishable on the alarm scale---a hundred million passwords stolen from one …
-
http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ — found via Mwmbl
Hackers Remotely Kill a Jeep on the Highway—With Me in It | WIRED
I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold. Though I hadn't touched the dashboard, the vents in the Jeep C…
-
https://hackernoon.com/the-decline-of-stack-overflow-7cb69faa575d — found via Mwmbl
The decline of Stack Overflow | HackerNoon
For many years, Stack Overflow has been one of the most popular resources for programmers trying to solve a common problem. As questions on Stack Overflow…
-
https://www.wired.com/story/matt-walsh-twitter-hack-doomed/ — found via Mwmbl
The Hacker Who Hijacked Matt Walsh’s Twitter Was Just ‘Bored’ | …
The hacker who claims to have compromised the Twitter account of right-wing commentator Matt Walsh last night says he meant no harm—though he was clearly…
-
https://news.ycombinator.com/item?id=35598281 — found via Mwmbl
MiniGPT-4 | Hacker News
On a technical level, they're doing something really simple -- take BLIP2's ViT-L+Q-former, connect it to Vicuna-13B with a linear layer, and train just t…
-
http://en.wikipedia.org/wiki/Hackers_Conference?ref=longnow.org — found via Mwmbl
The Hackers Conference - Wikipedia
The Hackers Conference is an annual invitation-only gathering of designers , engineers and programmers to discuss the latest developments and innovations …
-
https://hackernoon.com/garbled-circuits-basic-scheme-and-applications — found via Mwmbl
Garbled Circuits: Basic Scheme and Applications | HackerNoon
Garbled Circuits: Basic Scheme and Applications Too Long; Didn't Read Garbled circuits are the simplest form of general-purpose "multi-party computation"…
-
http://www.thesmokinggun.com/documents/sidney-blumenthal-email-hack-687341 — found via Mwmbl
Hacker Targets Clinton Confidant In New Attack | The Smoking Gun
Hacker Targets Clinton Confidant In New Attack MARCH 15--The hacker who has spent the past several months breaking into the e-mail accounts of family, fri…
-
https://www.crowdstrike.com/blog/who-is-fancy-bear/ — found via Mwmbl
Fancy Bear Hackers (APT28): Targets & Methods | CrowdStrike
The nation-state adversary group known as FANCY BEAR (also known as APT28 or Sofacy) has been operating since at least 2008 and represents a constant thre…
-
https://hackernoon.com/top-5-free-linux-courses-for-programmers-4a433b4edade — found via Mwmbl
Top 5 Free Linux Courses for Programmers | HackerNoon
A curated list of some of the best free online courses to learn Linux in 2019 There is no doubt that Linux is one of the most popular operating systems to…
-
http://www.thesmokinggun.com/archive/years/2008/1008081palin1.html — found via Mwmbl
Palin Hacker Indicted | The Smoking Gun
Palin Hacker Indicted Palin Hacker Indicted OCTOBER 8--A Tennessee man has been indicted for hacking into the e-mail account of Republican vice president…
-
https://hackernoon.com/the-great-bitcoin-scaling-debate-a-timeline-6108081dbada — found via Mwmbl
The Great Bitcoin Scaling Debate — A Timeline | HackerNoon
This timeline chronicles the repeated attempts to scale Bitcoin’s blockchain, and details how each attempt has — so far — been unsuccessful. It covers all…
-
http://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ — found via Mwmbl
Hackers Finally Post Stolen Ashley Madison Data | WIRED
The other shoe just dropped. The hackers who breached the cheating site AshleyMadison.com appeared to make good on their threat to expose customer data on…
-
https://hackernoon.com/10-websites-to-learn-javascript-for-beginners-31e13bbdbb5c — found via Mwmbl
10 Websites to Learn JavaScript for Beginners | HackerNoon
Hello All, We are fortunate to live in a world of technology where you have access to a lot of resources to learn whatever we want, all thanks to the Inte…
-
https://hackernoon.com/the-big-fat-compendium-of-russiagate-debunkery-4278a753a3af — found via Mwmbl
The Big Fat Compendium Of Russiagate Debunkery | HackerNoon
Russiagate is like a mirage: from a distance it looks like something, but once you move in for a closer look, there’s nothing there. Nothing. Nothing soli…
-
https://hackernoon.com/top-5-tensorflow-and-ml-courses-for-programmers-8b30111cad2c — found via Mwmbl
Top 5 TensorFlow and ML Courses for Programmers | HackerNoon
If you are curious about Artificial Intelligence, Data Science, and Machine Learning, then I am sure you have heard about TensorFlow, Google’s Machine Lea…
-
https://electrek.co/2023/08/03/hackers-manage-unlock-tesla-software-locked-features/ — found via Mwmbl
Hackers manage to unlock Tesla software-locked features worth up…
It creates a market for people trying to get around the software lock. A group of security researchers (aka hackers) at TU Berlin announced that they mana…
-
https://hackernoon.com/top-5-free-c-courses-to-learn-programming-in-2019-d27352277da0 — found via Mwmbl
Top 5 Free C++ Courses to Learn Programming | HackerNoon
C++ is one of the most popular and powerful object-oriented programming languages and if you want to do low-level stuff then it’s the best language to sta…
-
https://hackernoon.com/top-5-courses-to-learn-python-in-2018-best-of-lot-26644a99e7ec — found via Mwmbl
Top 5 Courses to Learn Python in 2018 — Best of Lot | HackerNoon
If you have just started learning to code a Computer Science graduate and thinking to learn Python in 2018 then you have come to the right place. In this …
-
http://www.thesmokinggun.com/buster/sidney-blumenthal/hacker-distributes-memos-784091 — found via Mwmbl
Hacker Begins Distributing Confidential Memos Sent To Hillary Cl…
Armed with confidential memos to Hillary Clinton that were stolen from the e-mail account of a former White House aide, a hacker has distributed some of t…
-
http://www.thedailybeast.com/hackers-vow-to-release-apparent-trove-of-uae-ambassadors-emails — found via Mwmbl
Hackers Vow to Release Apparent Trove of U.A.E. Ambassador’s Ema…
A hacker group calling itself “GlobalLeaks” has begun distributing hacked emails stolen from the inbox of Yousef Al Otaiba, the United Arab Emirates ’ amb…
-
http://www.nytimes.com/2016/12/09/us/obama-russia-election-hack.html — found via Mwmbl
Russian Hackers Acted to Aid Trump in Election, U.S. Says - The …
They based that conclusion, in part, on another finding — which they say was also reached with high confidence — that the Russians hacked the Republican N…
-
http://www.esquire.com/news-politics/a49791/russian-dnc-emails-hacked/ — found via Mwmbl
Russia Hackers to Blame for Wikileaks Emails - Proof Vladmir Put…
Putin, Wikileaks, the NSA and the DNC email fiasco that gave Trump and Clinton another reason to be at odds. By Thomas Rid Published: Oct 20, 2016 On an A…
-
https://hackernoon.com/openais-new-model-is-amazing-dalle-2-explained-simply?source=rss — found via Mwmbl
OpenAI's New Model is Amazing! DALL·E 2 Explained Simply | Hacke…
Last year I shared DALL·E, an amazing model by OpenAI capable of generating images from a text input with incredible results. Now is time for his big brot…
-
https://www.axios.com/local/twin-cities/2023/03/23/hackers-post-minneapolis-schools-data — found via Mwmbl
Hackers asking for a $1M ransom have posted Minneapolis Public S…
What they're saying: MPS said last Friday it was working with cybersecurity specialists to download the data and review it to "determine the full scope of…
-
https://hackernoon.com/how-to-measure-what-an-instagram-influencer-is-worth-cb488f605ffe — found via Mwmbl
How To Measure What an Instagram Influencer is Worth. | HackerNo…
How to pay Instagram influencers to promote your product or service on Instagram is still a mystery. There is no “standard” value for social media influen…
-
https://hackernoon.com/when-burning-man-gets-boring-silicon-valley-should-worry-z412f36f3 — found via Mwmbl
When Burning Man Gets Boring, Silicon Valley Should Worry | Hack…
When Burning Man Gets Boring, Silicon Valley Should Worry about it, says Frida Ghitis. Ghitis: The decline of Burning Man’s principle of radical self-expr…
-
https://www.vice.com/en_us/article/gyz489/hackers-dissect-mr-robot-season-4-episode-9-conflict — found via Mwmbl
Hackers Dissect 'Mr. Robot' Season 4 Episode 9: ‘Conflict’
Hackers Dissect 'Mr. Robot' Season 4 Episode 9: ‘Conflict’ Episode 9 of Mr. Robot’s final season was not only amazing plot-wise but also happily filled w…
-
https://hackernoon.com/top-5-free-courses-to-learn-git-and-github-best-of-lot-2f394c6533b0 — found via Mwmbl
Top 5 Free Courses to Learn Git and Github — Best of Lot | Hacke…
One of the important skill for a programmer is to learn and master Git and I have been searching some good tutorials and courses to start with. The Intern…
-
https://hackernoon.com/the-principles-behind-how-the-instagram-algorithm-works-bec902eca17e — found via Mwmbl
The Principles Behind How The Instagram Algorithm Works | Hacker…
LEARN MORE ABOUT @THEEDUARDOMORALES 'S EXPERTISE AND PLACE ON THE INTERNET. If you’re reading this, you’re probably wondering why no one is seeing your In…
-
http://gawker.com/ipad-hacker-and-troll-weev-is-now-a-straight-up-white-1641763761 — found via Mwmbl
iPad Hacker and "Troll" Weev Is Now a Straight-Up White Supremac…
Four years ago , Andrew " Weev " Aurenheimer poked an easy hole in Apple's iPad security, exposed the information of 114,000 users, and embarrassed both t…
-
http://www.thesmokinggun.com/documents/crime/dnc-hacker-leaks-trump-oppo-report-647293 — found via Mwmbl
DNC Hacker Releases Trump Oppo Report | The Smoking Gun
DNC Hacker Releases Trump Oppo Report JUNE 15--An online vandal using the name “Guccifer 2.0” has claimed credit for the recent hacking of the Democratic …
-
https://hackernoon.com/top-10-angular-courses-tutorials-and-books-for-web-developers-e8a8e2c490c2 — found via Mwmbl
Top 10 Angular Courses, Tutorials, and Books for Web Developers …
Hello guys, if you are interested in learning the Angular framework , one of the most popular JavaScript frameworks for developing component-based Web GUI…
-
https://hackernoon.com/meet-spoofy-how-a-single-entity-dominates-the-price-of-bitcoin-39c711d28eb4 — found via Mwmbl
Meet ‘Spoofy’. How a Single entity dominates the price of Bitcoi…
This story is about a trader, or a group of traders, or possibly even Bitfinex themselves manipulates the price of Bitcoin. The past few months I’ve slowl…
-
http://motherboard.vice.com/read/hacker-obtained-childrens-headshots-and-chatlogs-from-toymaker-vtech — found via Mwmbl
Hacker Obtained Children's Headshots and Chatlogs From Toymaker …
If storing the personal data of almost 5 million parents and more than 200,000 kids wasn't bad enough, it turns out that hacked toymaker VTech also left t…
-
http://motherboard.vice.com/read/hacker-plans-to-dump-alleged-details-of-20000-fbi-9000-dhs-employees — found via Mwmbl
Hacker Plans to Dump Alleged Details of 20,000 FBI, 9,000 DHS Em…
On Sunday, Motherboard obtained the supposedly soon-to-be-leaked data and called a large selection of random numbers in both the DHS and FBI databases. Ma…
-
https://motherboard.vice.com/en_us/article/hackers-we-will-remotely-wipe-iphones-unless-apple-pays-ransom — found via Mwmbl
Hackers: We Will Remotely Wipe iPhones Unless Apple Pays Ransom
A hacker or group of hackers is apparently trying to extort Apple over alleged access to a large cache of iCloud and other Apple email accounts. The hacke…
-
https://www.vice.com/en_us/article/jgxd3d/twitter-insider-access-panel-account-hacks-biden-uber-bezos — found via Mwmbl
Hackers Convinced Twitter Employee to Help Them Hijack Accounts
"We used a rep that literally done all the work for us," one of the sources told Motherboard. The second source added they paid the Twitter insider. (Upda…
-
https://hackernoon.com/top-5-free-online-courses-to-learn-html-css-web-development-in-2020-ae8e7466dfa7 — found via Mwmbl
Top 5 (Free) Online Courses to Learn HTML, CSS & Web Development…
Hello guys, I have been sharing a lot of free online courses and books on various technology and programming language like Python , Java , C++ , JavaScrip…
-
https://hackernoon.com/10-free-courses-to-learn-docker-for-programmers-and-devops-engineers-7ff2781fd6e0 — found via Mwmbl
10 Free Courses to Learn Docker for Programmers and DevOps Engin…
As the software development is moving towards automation, a good knowledge and experience about the Docker could be very valuable for your career, especia…
-
https://hackernoon.com/how-to-search-for-and-find-the-most-valuable-influencers-on-instagram-df8ddd5b2243 — found via Mwmbl
How To Search for and Find The Most Valuable Influencers on Inst…
LEARN MORE ABOUT @THEEDUARDOMORALES 'S EXPERTISE AND PLACE ON THE INTERNET. I’ve organized and executed thousands of influencer marketing campaigns for br…
-
https://www.cps.gov.uk/cps/news/computer-hacker-famous-musicians-digital-accounts-jailed — found via Mwmbl
Computer hacker of famous musicians’ digital accounts is jailed …
Kwiatkowski pleaded guilty to three charges of unauthorised access to computer material, 14 charges of making for sale an article infringing copyright, on…
-
https://siliconangle.com/2023/08/15/hackers-target-citrix-netscaler-vulnerabilities-gain-persistent-access/ — found via Mwmbl
Hackers target Citrix NetScaler vulnerabilities to gain persiste…
A new report released today by Fox-IT, part of NCC Group PLC, has detailed how about 2,000 Citrix NetScalers have been exploited by a threat actor to gai…
-
https://www.wsj.com/articles/russian-hackers-stole-nsa-data-on-u-s-cyber-defense-1507222108 — found via Mwmbl
Russian Hackers Stole NSA Data on U.S. Cyber Defense - WSJ
The breach, considered the most serious in years, could enable Russia to evade NSA surveillance and more easily infiltrate U.S. networks The National Secu…
-
https://hackernoon.com/more-than-a-million-pro-repeal-net-neutrality-comments-were-likely-faked-e9f0e3ed36a6 — found via Mwmbl
More than a Million Pro-Repeal Net Neutrality Comments were Like…
I used natural language processing techniques to analyze net neutrality comments submitted to the FCC from April-October 2017, and the results were distur…
-
http://motherboard.vice.com/read/how-hackers-broke-into-john-podesta-and-colin-powells-gmail-accounts — found via Mwmbl
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Acc…
On March 19 of this year, Hillary Clinton's campaign chairman John Podesta received an alarming email that appeared to come from Google. The email, howeve…
-
https://medium.com/hackernoon/12-signs-youre-working-in-a-feature-factory-44a5b938d6a2 — found via Mwmbl
12 Signs You’re Working in a Feature Factory | by John Cutler | …
12 Signs You’re Working in a Feature Factory I’ve used the term Feature Factory at a couple conference talks over the past two years. I started using the…
-
https://hackernoon.com/top-5-amazon-web-services-or-aws-courses-to-learn-online-free-and-best-of-lot-d94e192054b7 — found via Mwmbl
Top 5 Amazon Web Services or AWS Courses to Learn Online — FREE …
A list of some free AWS courses to learn Amazon Web Services online at your own pace Hello guys, if you want to learn Amazon Web Services, popularly known…
-
https://motherboard.vice.com/read/yahoo-supposed-data-breach-200-million-credentials-dark-web — found via Mwmbl
Yahoo 'Aware' Hacker Is Advertising 200 Million Supposed Account…
A notorious cybercriminal is advertising 200 million of alleged Yahoo user credentials on the dark web, and the company has said it is "aware" of the hack…
-
https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin — found via Mwmbl
The Hackers Who Can Hijack Your SIM Card Using Only Your Phone N…
It seemed like any other warm September night in the suburbs of Salt Lake City. Rachel Ostlund had just put her kids to bed and was getting ready to go to…
-
https://hackernoon.com/10-data-structure-algorithms-and-programming-courses-to-crack-any-coding-interview-e1c50b30b927 — found via Mwmbl
10 Data Structure, Algorithms, and Programming Courses to Crack …
Many junior developers dream of making it at one of the larger tech companies, but, to be honest with you, getting your first job is never easy. It is, in…
-
https://www.darkreading.com/vulnerabilities-threats/3-ways-hackers-use-chatgpt-to-cause-security-headaches — found via Mwmbl
3 Ways Hackers Use ChatGPT to Cause Security Headaches
3 Ways Hackers Use ChatGPT to Cause Security Headaches With ChatGPT making headlines everywhere, it feels like the world has entered a Black Mirror episo…
-
http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/ — found via Mwmbl
Hackers Reveal Nasty New Car Attacks--With Me Behind The Wheel (…
Stomping on the brakes of a 3,500-pound Ford Escape that refuses to stop--or even slow down--produces a unique feeling of anxiety. In this case it also pr…
-
https://www.bloomberg.com/news/articles/2017-11-21/uber-concealed-cyberattack-that-exposed-57-million-people-s-data — found via Mwmbl
Uber Paid Hackers to Delete Stolen Data on 57 Million People - B…
Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc. , a massive breach that the company concealed for more tha…
-
https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html — found via Mwmbl
Cyberattack on Saudi Oil Firm Disquiets U.S. - The New York Times
The hackers picked the one day of the year they knew they could inflict the most damage on the world’s most valuable company, Saudi Aramco. On Aug. 15, mo…
-
https://medium.com/hackernoon/godaddy-revoked-and-then-un-revoked-a-certificate-without-request-11f86074bbf8 — found via Mwmbl
GoDaddy Revoked and then Un-Revoked a certificate without reques…
GoDaddy Revoked and then Un-Revoked a certificate without request Update: GoDaddy have confirmed that they re-verified all the initially revoked certific…
-
http://www.theverge.com/2014/11/25/7281097/sony-pictures-hackers-say-they-want-equality-worked-with-staff-to-break-in — found via Mwmbl
Sony Pictures hackers say they want 'equality,' worked with staf…
The hackers who took down Sony Pictures' computer systems yesterday say that they are working for "equality" and suggest that their attack was assisted or…
-
http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ — found via Mwmbl
How “omnipotent” hackers tied to NSA hid for 14 years—and were f…
CANCUN, Mexico — In 2009, one or more prestigious researchers received a CD by mail that contained pictures and other materials from a recent scientific c…
-
http://thecaucus.blogs.nytimes.com/2013/04/23/hacked-a-p-twitter-feed-sends-erroneous-message-about-explosions-at-white-house/ — found via Mwmbl
In Hacking, A.P. Twitter Feed Sends False Report of Explosions -…
Hackers hijacked the Twitter account for The Associated Press on Tuesday and sent out an erroneous message reporting explosions at the White House that in…
-
https://netzpolitik.org/2014/gamma-finfisher-hacked-40-gb-of-internal-documents-and-source-code-of-government-malware-published/ — found via Mwmbl
Gamma FinFisher hacked: 40 GB of internal documents and source c…
A hacker claims to have hacked a network of the surveillance technology company Gamma International and has published 40 gigabytes of internal data. A Twi…
-
http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/ — found via Mwmbl
Shopping For Zero-Days: A Price List For Hackers' Secret Softwar…
A clever hacker today has to make tough choices. Find a previously unknown method for dismantling the defenses of a device like an iPhone or iPad, for ins…
-
http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/ — found via Mwmbl
Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And …
At a Google-run competition in Vancouver last month, the search giant’s famously secure Chrome Web browser fell to hackers twice. Both of the new methods…
New results
-
http://seclists.org/ — found via Mwmbl
SecLists.Org Security Mailing List Archive
Any hacker will tell you that the latest news and exploits are not found on any web site—not even Insecure.Org . No, the cutting edge in security research…
-
https://www.wired.com/2014/11/what-is-a-zero-day/ — found via Mwmbl
Hacker Lexicon: What Is a Zero Day? | WIRED
Zero-day vulnerability refers to a security hole in software---such as browser software or operating system software---that is yet unknown to the software…
-
http://www.paulgraham.com/hackernews.html — found via Mwmbl
What I've Learned from Hacker News
Hacker News was two years old last week. Initially it was supposed to be a side project—an application to sharpen Arc on, and a place for current and futu…
-
https://cyberscoop.com/dc-health-data-posted-online/ — found via Mwmbl
Hacker posts more D.C. Health Link data online, exposing lawmake…
The initial breach was first reported last week after a House official warned lawmakers that they could have been exposed. But over the weekend, the scope…
-
http://mashable.com/2014/12/08/hackers-emailed-sony-execs/ — found via Mwmbl
Hackers sent extortion email to Sony executives 3 days before at…
The hackers behind the massive Sony Pictures breach warned of a damaging cyberattack in a jumbled email sent to company executives three days before the h…
-
https://hackernoon.com/why-is-python-so-slow-e5074b6fe55b — found via Mwmbl
Why is Python so slow? | HackerNoon
LEARN MORE ABOUT @ANTHONY.P.SHAW 'S EXPERTISE AND PLACE ON THE INTERNET. Python is booming in popularity. It is used in DevOps, Data Science, Web Developm…
-
http://blog.wired.com/27bstroke6/2008/04/hacker-in-murdo.html — found via Mwmbl
Hacker in Murdoch Trial Acknowledges Receiving Money from Murdoc…
An American hacker who is at the core of a piracy trial against a Rupert Murdoch subsidiary, testified this week that he created pirating software for the…
-
https://www.intigriti.com/ — found via Mwmbl
Intigriti - Bug Bounty & Agile Pentesting Platform
Malicious hackers don’t always follow a predefined security methodology like penetration testers, and automated tools only scratch the surface. Connect wi…
-
https://techcrunch.com/2020/04/01/zoom-doom/ — found via Mwmbl
Ex-NSA hacker drops new zero-day doom for Zoom
Now that a large portion of the world is working from home to ride out the coronavirus pandemic , Zoom’s popularity has rocketed, but also has led to an i…
-
https://www.wired.com/2016/06/hacker-lexicon-password-hashing/ — found via Mwmbl
Hacker Lexicon: What Is Password Hashing? | WIRED
Digital megabreaches have lately become so commonplace as to be almost indistinguishable on the alarm scale---a hundred million passwords stolen from one …
-
http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ — found via Mwmbl
Hackers Remotely Kill a Jeep on the Highway—With Me in It | WIRED
I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold. Though I hadn't touched the dashboard, the vents in the Jeep C…
-
https://hackernoon.com/the-decline-of-stack-overflow-7cb69faa575d — found via Mwmbl
The decline of Stack Overflow | HackerNoon
For many years, Stack Overflow has been one of the most popular resources for programmers trying to solve a common problem. As questions on Stack Overflow…
-
https://www.wired.com/story/matt-walsh-twitter-hack-doomed/ — found via Mwmbl
The Hacker Who Hijacked Matt Walsh’s Twitter Was Just ‘Bored’ | …
The hacker who claims to have compromised the Twitter account of right-wing commentator Matt Walsh last night says he meant no harm—though he was clearly…
-
https://news.ycombinator.com/item?id=35598281 — found via Mwmbl
MiniGPT-4 | Hacker News
On a technical level, they're doing something really simple -- take BLIP2's ViT-L+Q-former, connect it to Vicuna-13B with a linear layer, and train just t…
-
http://en.wikipedia.org/wiki/Hackers_Conference?ref=longnow.org — found via Mwmbl
The Hackers Conference - Wikipedia
The Hackers Conference is an annual invitation-only gathering of designers , engineers and programmers to discuss the latest developments and innovations …
-
https://hackernoon.com/garbled-circuits-basic-scheme-and-applications — found via Mwmbl
Garbled Circuits: Basic Scheme and Applications | HackerNoon
Garbled Circuits: Basic Scheme and Applications Too Long; Didn't Read Garbled circuits are the simplest form of general-purpose "multi-party computation"…
-
http://www.thesmokinggun.com/documents/sidney-blumenthal-email-hack-687341 — found via Mwmbl
Hacker Targets Clinton Confidant In New Attack | The Smoking Gun
Hacker Targets Clinton Confidant In New Attack MARCH 15--The hacker who has spent the past several months breaking into the e-mail accounts of family, fri…
-
https://www.crowdstrike.com/blog/who-is-fancy-bear/ — found via Mwmbl
Fancy Bear Hackers (APT28): Targets & Methods | CrowdStrike
The nation-state adversary group known as FANCY BEAR (also known as APT28 or Sofacy) has been operating since at least 2008 and represents a constant thre…
-
https://hackernoon.com/top-5-free-linux-courses-for-programmers-4a433b4edade — found via Mwmbl
Top 5 Free Linux Courses for Programmers | HackerNoon
A curated list of some of the best free online courses to learn Linux in 2019 There is no doubt that Linux is one of the most popular operating systems to…
-
http://www.thesmokinggun.com/archive/years/2008/1008081palin1.html — found via Mwmbl
Palin Hacker Indicted | The Smoking Gun
Palin Hacker Indicted Palin Hacker Indicted OCTOBER 8--A Tennessee man has been indicted for hacking into the e-mail account of Republican vice president…
-
https://hackernoon.com/the-great-bitcoin-scaling-debate-a-timeline-6108081dbada — found via Mwmbl
The Great Bitcoin Scaling Debate — A Timeline | HackerNoon
This timeline chronicles the repeated attempts to scale Bitcoin’s blockchain, and details how each attempt has — so far — been unsuccessful. It covers all…
-
http://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ — found via Mwmbl
Hackers Finally Post Stolen Ashley Madison Data | WIRED
The other shoe just dropped. The hackers who breached the cheating site AshleyMadison.com appeared to make good on their threat to expose customer data on…
-
https://hackernoon.com/10-websites-to-learn-javascript-for-beginners-31e13bbdbb5c — found via Mwmbl
10 Websites to Learn JavaScript for Beginners | HackerNoon
Hello All, We are fortunate to live in a world of technology where you have access to a lot of resources to learn whatever we want, all thanks to the Inte…
-
https://hackernoon.com/the-big-fat-compendium-of-russiagate-debunkery-4278a753a3af — found via Mwmbl
The Big Fat Compendium Of Russiagate Debunkery | HackerNoon
Russiagate is like a mirage: from a distance it looks like something, but once you move in for a closer look, there’s nothing there. Nothing. Nothing soli…
-
https://hackernoon.com/top-5-tensorflow-and-ml-courses-for-programmers-8b30111cad2c — found via Mwmbl
Top 5 TensorFlow and ML Courses for Programmers | HackerNoon
If you are curious about Artificial Intelligence, Data Science, and Machine Learning, then I am sure you have heard about TensorFlow, Google’s Machine Lea…
-
https://electrek.co/2023/08/03/hackers-manage-unlock-tesla-software-locked-features/ — found via Mwmbl
Hackers manage to unlock Tesla software-locked features worth up…
It creates a market for people trying to get around the software lock. A group of security researchers (aka hackers) at TU Berlin announced that they mana…
-
https://hackernoon.com/top-5-free-c-courses-to-learn-programming-in-2019-d27352277da0 — found via Mwmbl
Top 5 Free C++ Courses to Learn Programming | HackerNoon
C++ is one of the most popular and powerful object-oriented programming languages and if you want to do low-level stuff then it’s the best language to sta…
-
https://hackernoon.com/top-5-courses-to-learn-python-in-2018-best-of-lot-26644a99e7ec — found via Mwmbl
Top 5 Courses to Learn Python in 2018 — Best of Lot | HackerNoon
If you have just started learning to code a Computer Science graduate and thinking to learn Python in 2018 then you have come to the right place. In this …
-
http://www.thesmokinggun.com/buster/sidney-blumenthal/hacker-distributes-memos-784091 — found via Mwmbl
Hacker Begins Distributing Confidential Memos Sent To Hillary Cl…
Armed with confidential memos to Hillary Clinton that were stolen from the e-mail account of a former White House aide, a hacker has distributed some of t…
-
http://www.thedailybeast.com/hackers-vow-to-release-apparent-trove-of-uae-ambassadors-emails — found via Mwmbl
Hackers Vow to Release Apparent Trove of U.A.E. Ambassador’s Ema…
A hacker group calling itself “GlobalLeaks” has begun distributing hacked emails stolen from the inbox of Yousef Al Otaiba, the United Arab Emirates ’ amb…
-
http://www.nytimes.com/2016/12/09/us/obama-russia-election-hack.html — found via Mwmbl
Russian Hackers Acted to Aid Trump in Election, U.S. Says - The …
They based that conclusion, in part, on another finding — which they say was also reached with high confidence — that the Russians hacked the Republican N…
-
http://www.esquire.com/news-politics/a49791/russian-dnc-emails-hacked/ — found via Mwmbl
Russia Hackers to Blame for Wikileaks Emails - Proof Vladmir Put…
Putin, Wikileaks, the NSA and the DNC email fiasco that gave Trump and Clinton another reason to be at odds. By Thomas Rid Published: Oct 20, 2016 On an A…
-
https://hackernoon.com/openais-new-model-is-amazing-dalle-2-explained-simply?source=rss — found via Mwmbl
OpenAI's New Model is Amazing! DALL·E 2 Explained Simply | Hacke…
Last year I shared DALL·E, an amazing model by OpenAI capable of generating images from a text input with incredible results. Now is time for his big brot…
-
https://www.axios.com/local/twin-cities/2023/03/23/hackers-post-minneapolis-schools-data — found via Mwmbl
Hackers asking for a $1M ransom have posted Minneapolis Public S…
What they're saying: MPS said last Friday it was working with cybersecurity specialists to download the data and review it to "determine the full scope of…
-
https://hackernoon.com/how-to-measure-what-an-instagram-influencer-is-worth-cb488f605ffe — found via Mwmbl
How To Measure What an Instagram Influencer is Worth. | HackerNo…
How to pay Instagram influencers to promote your product or service on Instagram is still a mystery. There is no “standard” value for social media influen…
-
https://hackernoon.com/when-burning-man-gets-boring-silicon-valley-should-worry-z412f36f3 — found via Mwmbl
When Burning Man Gets Boring, Silicon Valley Should Worry | Hack…
When Burning Man Gets Boring, Silicon Valley Should Worry about it, says Frida Ghitis. Ghitis: The decline of Burning Man’s principle of radical self-expr…
-
https://www.vice.com/en_us/article/gyz489/hackers-dissect-mr-robot-season-4-episode-9-conflict — found via Mwmbl
Hackers Dissect 'Mr. Robot' Season 4 Episode 9: ‘Conflict’
Hackers Dissect 'Mr. Robot' Season 4 Episode 9: ‘Conflict’ Episode 9 of Mr. Robot’s final season was not only amazing plot-wise but also happily filled w…
-
https://hackernoon.com/top-5-free-courses-to-learn-git-and-github-best-of-lot-2f394c6533b0 — found via Mwmbl
Top 5 Free Courses to Learn Git and Github — Best of Lot | Hacke…
One of the important skill for a programmer is to learn and master Git and I have been searching some good tutorials and courses to start with. The Intern…
-
https://hackernoon.com/the-principles-behind-how-the-instagram-algorithm-works-bec902eca17e — found via Mwmbl
The Principles Behind How The Instagram Algorithm Works | Hacker…
LEARN MORE ABOUT @THEEDUARDOMORALES 'S EXPERTISE AND PLACE ON THE INTERNET. If you’re reading this, you’re probably wondering why no one is seeing your In…
-
http://gawker.com/ipad-hacker-and-troll-weev-is-now-a-straight-up-white-1641763761 — found via Mwmbl
iPad Hacker and "Troll" Weev Is Now a Straight-Up White Supremac…
Four years ago , Andrew " Weev " Aurenheimer poked an easy hole in Apple's iPad security, exposed the information of 114,000 users, and embarrassed both t…
-
http://www.thesmokinggun.com/documents/crime/dnc-hacker-leaks-trump-oppo-report-647293 — found via Mwmbl
DNC Hacker Releases Trump Oppo Report | The Smoking Gun
DNC Hacker Releases Trump Oppo Report JUNE 15--An online vandal using the name “Guccifer 2.0” has claimed credit for the recent hacking of the Democratic …
-
https://hackernoon.com/top-10-angular-courses-tutorials-and-books-for-web-developers-e8a8e2c490c2 — found via Mwmbl
Top 10 Angular Courses, Tutorials, and Books for Web Developers …
Hello guys, if you are interested in learning the Angular framework , one of the most popular JavaScript frameworks for developing component-based Web GUI…
-
https://hackernoon.com/meet-spoofy-how-a-single-entity-dominates-the-price-of-bitcoin-39c711d28eb4 — found via Mwmbl
Meet ‘Spoofy’. How a Single entity dominates the price of Bitcoi…
This story is about a trader, or a group of traders, or possibly even Bitfinex themselves manipulates the price of Bitcoin. The past few months I’ve slowl…
-
http://motherboard.vice.com/read/hacker-obtained-childrens-headshots-and-chatlogs-from-toymaker-vtech — found via Mwmbl
Hacker Obtained Children's Headshots and Chatlogs From Toymaker …
If storing the personal data of almost 5 million parents and more than 200,000 kids wasn't bad enough, it turns out that hacked toymaker VTech also left t…
-
http://motherboard.vice.com/read/hacker-plans-to-dump-alleged-details-of-20000-fbi-9000-dhs-employees — found via Mwmbl
Hacker Plans to Dump Alleged Details of 20,000 FBI, 9,000 DHS Em…
On Sunday, Motherboard obtained the supposedly soon-to-be-leaked data and called a large selection of random numbers in both the DHS and FBI databases. Ma…
-
https://motherboard.vice.com/en_us/article/hackers-we-will-remotely-wipe-iphones-unless-apple-pays-ransom — found via Mwmbl
Hackers: We Will Remotely Wipe iPhones Unless Apple Pays Ransom
A hacker or group of hackers is apparently trying to extort Apple over alleged access to a large cache of iCloud and other Apple email accounts. The hacke…
-
https://www.vice.com/en_us/article/jgxd3d/twitter-insider-access-panel-account-hacks-biden-uber-bezos — found via Mwmbl
Hackers Convinced Twitter Employee to Help Them Hijack Accounts
"We used a rep that literally done all the work for us," one of the sources told Motherboard. The second source added they paid the Twitter insider. (Upda…
-
https://hackernoon.com/top-5-free-online-courses-to-learn-html-css-web-development-in-2020-ae8e7466dfa7 — found via Mwmbl
Top 5 (Free) Online Courses to Learn HTML, CSS & Web Development…
Hello guys, I have been sharing a lot of free online courses and books on various technology and programming language like Python , Java , C++ , JavaScrip…
-
https://hackernoon.com/10-free-courses-to-learn-docker-for-programmers-and-devops-engineers-7ff2781fd6e0 — found via Mwmbl
10 Free Courses to Learn Docker for Programmers and DevOps Engin…
As the software development is moving towards automation, a good knowledge and experience about the Docker could be very valuable for your career, especia…
-
https://hackernoon.com/how-to-search-for-and-find-the-most-valuable-influencers-on-instagram-df8ddd5b2243 — found via Mwmbl
How To Search for and Find The Most Valuable Influencers on Inst…
LEARN MORE ABOUT @THEEDUARDOMORALES 'S EXPERTISE AND PLACE ON THE INTERNET. I’ve organized and executed thousands of influencer marketing campaigns for br…
-
https://www.cps.gov.uk/cps/news/computer-hacker-famous-musicians-digital-accounts-jailed — found via Mwmbl
Computer hacker of famous musicians’ digital accounts is jailed …
Kwiatkowski pleaded guilty to three charges of unauthorised access to computer material, 14 charges of making for sale an article infringing copyright, on…
-
https://siliconangle.com/2023/08/15/hackers-target-citrix-netscaler-vulnerabilities-gain-persistent-access/ — found via Mwmbl
Hackers target Citrix NetScaler vulnerabilities to gain persiste…
A new report released today by Fox-IT, part of NCC Group PLC, has detailed how about 2,000 Citrix NetScalers have been exploited by a threat actor to gai…
-
https://www.wsj.com/articles/russian-hackers-stole-nsa-data-on-u-s-cyber-defense-1507222108 — found via Mwmbl
Russian Hackers Stole NSA Data on U.S. Cyber Defense - WSJ
The breach, considered the most serious in years, could enable Russia to evade NSA surveillance and more easily infiltrate U.S. networks The National Secu…
-
https://hackernoon.com/more-than-a-million-pro-repeal-net-neutrality-comments-were-likely-faked-e9f0e3ed36a6 — found via Mwmbl
More than a Million Pro-Repeal Net Neutrality Comments were Like…
I used natural language processing techniques to analyze net neutrality comments submitted to the FCC from April-October 2017, and the results were distur…
-
http://motherboard.vice.com/read/how-hackers-broke-into-john-podesta-and-colin-powells-gmail-accounts — found via Mwmbl
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Acc…
On March 19 of this year, Hillary Clinton's campaign chairman John Podesta received an alarming email that appeared to come from Google. The email, howeve…
-
https://medium.com/hackernoon/12-signs-youre-working-in-a-feature-factory-44a5b938d6a2 — found via Mwmbl
12 Signs You’re Working in a Feature Factory | by John Cutler | …
12 Signs You’re Working in a Feature Factory I’ve used the term Feature Factory at a couple conference talks over the past two years. I started using the…
-
https://hackernoon.com/top-5-amazon-web-services-or-aws-courses-to-learn-online-free-and-best-of-lot-d94e192054b7 — found via Mwmbl
Top 5 Amazon Web Services or AWS Courses to Learn Online — FREE …
A list of some free AWS courses to learn Amazon Web Services online at your own pace Hello guys, if you want to learn Amazon Web Services, popularly known…
-
https://motherboard.vice.com/read/yahoo-supposed-data-breach-200-million-credentials-dark-web — found via Mwmbl
Yahoo 'Aware' Hacker Is Advertising 200 Million Supposed Account…
A notorious cybercriminal is advertising 200 million of alleged Yahoo user credentials on the dark web, and the company has said it is "aware" of the hack…
-
https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin — found via Mwmbl
The Hackers Who Can Hijack Your SIM Card Using Only Your Phone N…
It seemed like any other warm September night in the suburbs of Salt Lake City. Rachel Ostlund had just put her kids to bed and was getting ready to go to…
-
https://hackernoon.com/10-data-structure-algorithms-and-programming-courses-to-crack-any-coding-interview-e1c50b30b927 — found via Mwmbl
10 Data Structure, Algorithms, and Programming Courses to Crack …
Many junior developers dream of making it at one of the larger tech companies, but, to be honest with you, getting your first job is never easy. It is, in…
-
https://www.darkreading.com/vulnerabilities-threats/3-ways-hackers-use-chatgpt-to-cause-security-headaches — found via Mwmbl
3 Ways Hackers Use ChatGPT to Cause Security Headaches
3 Ways Hackers Use ChatGPT to Cause Security Headaches With ChatGPT making headlines everywhere, it feels like the world has entered a Black Mirror episo…
-
http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/ — found via Mwmbl
Hackers Reveal Nasty New Car Attacks--With Me Behind The Wheel (…
Stomping on the brakes of a 3,500-pound Ford Escape that refuses to stop--or even slow down--produces a unique feeling of anxiety. In this case it also pr…
-
https://www.bloomberg.com/news/articles/2017-11-21/uber-concealed-cyberattack-that-exposed-57-million-people-s-data — found via Mwmbl
Uber Paid Hackers to Delete Stolen Data on 57 Million People - B…
Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc. , a massive breach that the company concealed for more tha…
-
https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html — found via Mwmbl
Cyberattack on Saudi Oil Firm Disquiets U.S. - The New York Times
The hackers picked the one day of the year they knew they could inflict the most damage on the world’s most valuable company, Saudi Aramco. On Aug. 15, mo…
-
https://medium.com/hackernoon/godaddy-revoked-and-then-un-revoked-a-certificate-without-request-11f86074bbf8 — found via Mwmbl
GoDaddy Revoked and then Un-Revoked a certificate without reques…
GoDaddy Revoked and then Un-Revoked a certificate without request Update: GoDaddy have confirmed that they re-verified all the initially revoked certific…
-
http://www.theverge.com/2014/11/25/7281097/sony-pictures-hackers-say-they-want-equality-worked-with-staff-to-break-in — found via Mwmbl
Sony Pictures hackers say they want 'equality,' worked with staf…
The hackers who took down Sony Pictures' computer systems yesterday say that they are working for "equality" and suggest that their attack was assisted or…
-
http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ — found via Mwmbl
How “omnipotent” hackers tied to NSA hid for 14 years—and were f…
CANCUN, Mexico — In 2009, one or more prestigious researchers received a CD by mail that contained pictures and other materials from a recent scientific c…
-
http://thecaucus.blogs.nytimes.com/2013/04/23/hacked-a-p-twitter-feed-sends-erroneous-message-about-explosions-at-white-house/ — found via Mwmbl
In Hacking, A.P. Twitter Feed Sends False Report of Explosions -…
Hackers hijacked the Twitter account for The Associated Press on Tuesday and sent out an erroneous message reporting explosions at the White House that in…
-
https://netzpolitik.org/2014/gamma-finfisher-hacked-40-gb-of-internal-documents-and-source-code-of-government-malware-published/ — found via Mwmbl
Gamma FinFisher hacked: 40 GB of internal documents and source c…
A hacker claims to have hacked a network of the surveillance technology company Gamma International and has published 40 gigabytes of internal data. A Twi…
-
http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/ — found via Mwmbl
Shopping For Zero-Days: A Price List For Hackers' Secret Softwar…
A clever hacker today has to make tough choices. Find a previously unknown method for dismantling the defenses of a device like an iPhone or iPad, for ins…
-
http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/ — found via Mwmbl
Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And …
At a Google-run competition in Vancouver last month, the search giant’s famously secure Chrome Web browser fell to hackers twice. Both of the new methods…