Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
File Type Spoofing Enabling Remote Code Execution in WhatsApp for Windows
(
nist.gov
)
2 points
by
SpaghettiCthulu
6 hours ago
|
past
|
discuss
NIST's Curved Neutron Beams Could Deliver Benefits Straight to Industry
(
nist.gov
)
11 points
by
rbanffy
3 days ago
|
past
|
discuss
NIST Updates Privacy Framework, Tying It to Recent Cybersecurity Guidelines
(
nist.gov
)
3 points
by
gnabgib
4 days ago
|
past
|
discuss
Unauthenticated Remote Code Execution in Erlang/OTP SSH
(
nist.gov
)
197 points
by
kimi
4 days ago
|
past
|
51 comments
React Router Hack
(
nist.gov
)
4 points
by
eye_sun
19 days ago
|
past
|
2 comments
Guidelines for Evaluating Differential Privacy Guarantees [pdf]
(
nist.gov
)
2 points
by
todsacerdoti
21 days ago
|
past
NIST/U.S. Department of Commerce: Role-Based Access Controls (1992) [pdf]
(
nist.gov
)
1 point
by
Brysonbw
22 days ago
|
past
Interoperable Randomness Beacons
(
nist.gov
)
1 point
by
uticus
24 days ago
|
past
Adversarial Machine Learning: Terminology of Attacks and Mitigations [pdf]
(
nist.gov
)
3 points
by
sohkamyung
25 days ago
|
past
NIST AI Risk Management Framework 1.0 [pdf]
(
nist.gov
)
2 points
by
alexfromapex
28 days ago
|
past
Adversarial ML: A Taxonomy and Terminology of Attacks / Mitigations
(
nist.gov
)
2 points
by
tomrod
28 days ago
|
past
ANSI C89 [pdf]
(
nist.gov
)
1 point
by
fanf2
30 days ago
|
past
NIST Atomic Spectra Database Lines Form
(
nist.gov
)
1 point
by
sgt
30 days ago
|
past
Phil Rogaway on Computer Science
(
nist.gov
)
2 points
by
fanf2
31 days ago
|
past
Strengthening AI Agent Hijacking Evaluations
(
nist.gov
)
43 points
by
StatsAreFun
39 days ago
|
past
|
15 comments
Major leap for nuclear clock paves way for ultraprecise timekeeping
(
nist.gov
)
2 points
by
fanf2
40 days ago
|
past
|
1 comment
NIST selects HQC as fifth algorithm for post-quantum encryption
(
nist.gov
)
164 points
by
gnabgib
41 days ago
|
past
|
116 comments
Guidelines for Evaluating 'Differential Privacy' Guarantees to De-Identify Data
(
nist.gov
)
2 points
by
gnabgib
44 days ago
|
past
NIST Shows How to Make a Compact Frequency Comb in Minutes (2013)
(
nist.gov
)
1 point
by
zerealshadowban
45 days ago
|
past
Webinar: Protecting Your Small Business from Phishing Risks
(
nist.gov
)
1 point
by
gnabgib
46 days ago
|
past
Vulnerability in partner.microsoft.com allows unauthenticated access
(
nist.gov
)
18 points
by
speckx
47 days ago
|
past
A Second's Past
(
nist.gov
)
1 point
by
leetbulb
61 days ago
|
past
Implementing a Zero Trust Architecture [pdf]
(
nist.gov
)
4 points
by
teleforce
64 days ago
|
past
|
1 comment
Requesting Public Comment: NIST Guidance on Implementing Zero Trust Architecture
(
nist.gov
)
2 points
by
teleforce
65 days ago
|
past
High-Flying Science: How and Why We Sent a Refrigerator Halfway to Space – NIST
(
nist.gov
)
2 points
by
rbanffy
67 days ago
|
past
ANSI X3.64-1979 (FIPS PUB 86) [pdf]
(
nist.gov
)
2 points
by
susam
76 days ago
|
past
Optical Frequency Combs
(
nist.gov
)
126 points
by
zafka
80 days ago
|
past
|
40 comments
New Atom-Based Thermometer Measures Temperature More Accurately
(
nist.gov
)
4 points
by
geox
81 days ago
|
past
Butt Emissions
(
nist.gov
)
1 point
by
throwaway519
83 days ago
|
past
Atomic Clocks Have Changed Our World (2024)
(
nist.gov
)
2 points
by
throw0101c
84 days ago
|
past
More
Join us for
AI Startup School
this June 16-17 in San Francisco!
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: