Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Transition to Post-Quantum Cryptography Standards [pdf]
(
nist.gov
)
2 points
by
mooreds
12 days ago
|
past
|
discuss
NIST Revises Security & Privacy Control Catalog for Software Updates & Patches
(
nist.gov
)
3 points
by
StatsAreFun
14 days ago
|
past
CVE-2025-43300: "an sophisticated attack against specific individuals"
(
nist.gov
)
5 points
by
qrush
22 days ago
|
past
|
1 comment
CVE-2025-8901: OOB write in Chrome
(
nist.gov
)
3 points
by
larkinrichards
31 days ago
|
past
NIST Guidelines Can Help Orgs Detect Face Photo Morphs, Deter Identity Fraud
(
nist.gov
)
1 point
by
rbanffy
35 days ago
|
past
CVE-2025-54313: ESLint-config-prettier has embedded malicious code
(
nist.gov
)
4 points
by
motorest
37 days ago
|
past
NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices
(
nist.gov
)
173 points
by
gnabgib
42 days ago
|
past
|
121 comments
Updated Digital Identity Guidelines are Here (NIST 800-63 Revision 4)
(
nist.gov
)
4 points
by
DASD
54 days ago
|
past
Reducing the Cybersecurity Risks of Portable Storage Media in OT Environments [pdf]
(
nist.gov
)
1 point
by
gnabgib
68 days ago
|
past
NIST ion clock sets new record for most accurate clock
(
nist.gov
)
352 points
by
voxadam
71 days ago
|
past
|
120 comments
Phil Rogaway on Computer Science
(
nist.gov
)
2 points
by
fanf2
72 days ago
|
past
Legal Metrology Meets the Digital Age
(
nist.gov
)
3 points
by
gnabgib
78 days ago
|
past
Google Chrome: Critical Security Allowed Attackers Access Using Crafter HTML
(
nist.gov
)
2 points
by
nitinreddy88
81 days ago
|
past
Practical Combinatorial Testing
(
nist.gov
)
2 points
by
TheHideout
85 days ago
|
past
PBKDF2 JS Lib: Improper Input Validation Vulnerability
(
nist.gov
)
5 points
by
wslh
3 months ago
|
past
|
1 comment
Role-Based Access Controls (1992) [pdf]
(
nist.gov
)
2 points
by
mooreds
3 months ago
|
past
Potential RCE via V8 Heap Corruption in Chrome (CVE-2025-5419)
(
nist.gov
)
2 points
by
ghgr
3 months ago
|
past
CVE-2025-4143
(
nist.gov
)
4 points
by
terabytest
3 months ago
|
past
|
1 comment
Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation
(
nist.gov
)
1 point
by
furkansahin
4 months ago
|
past
|
1 comment
NIST Special Publication 800-63: Digital Identity Guidelines Public Comments
(
nist.gov
)
2 points
by
mooreds
4 months ago
|
past
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (2024/Aug)
(
nist.gov
)
5 points
by
ColinWright
4 months ago
|
past
NIST on Cloning of Authentication Keys
(
nist.gov
)
4 points
by
mooreds
4 months ago
|
past
|
3 comments
New atomic fountain clock joins group that keeps the world on time
(
nist.gov
)
118 points
by
austinallegro
4 months ago
|
past
|
33 comments
NIST Privacy Framework 1.1: Initial Public Draft [pdf]
(
nist.gov
)
4 points
by
CharlesW
4 months ago
|
past
Interoperable Randomness Beacons
(
nist.gov
)
2 points
by
wslh
5 months ago
|
past
NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices (2023)
(
nist.gov
)
3 points
by
teleforce
5 months ago
|
past
Reference Measurements of Error Vector Magnitude (EVM)
(
nist.gov
)
1 point
by
teleforce
5 months ago
|
past
NIST Uncertainty Machine
(
nist.gov
)
3 points
by
fanf2
5 months ago
|
past
File Type Spoofing Enabling Remote Code Execution in WhatsApp for Windows
(
nist.gov
)
2 points
by
SpaghettiCthulu
5 months ago
|
past
NIST's Curved Neutron Beams Could Deliver Benefits Straight to Industry
(
nist.gov
)
11 points
by
rbanffy
5 months ago
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: