Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Transition to Post-Quantum Cryptography Standards [pdf] (nist.gov)
2 points by mooreds 12 days ago | past | discuss
NIST Revises Security & Privacy Control Catalog for Software Updates & Patches (nist.gov)
3 points by StatsAreFun 14 days ago | past
CVE-2025-43300: "an sophisticated attack against specific individuals" (nist.gov)
5 points by qrush 22 days ago | past | 1 comment
CVE-2025-8901: OOB write in Chrome (nist.gov)
3 points by larkinrichards 31 days ago | past
NIST Guidelines Can Help Orgs Detect Face Photo Morphs, Deter Identity Fraud (nist.gov)
1 point by rbanffy 35 days ago | past
CVE-2025-54313: ESLint-config-prettier has embedded malicious code (nist.gov)
4 points by motorest 37 days ago | past
NIST Finalizes 'Lightweight Cryptography' Standard to Protect Small Devices (nist.gov)
173 points by gnabgib 42 days ago | past | 121 comments
Updated Digital Identity Guidelines are Here (NIST 800-63 Revision 4) (nist.gov)
4 points by DASD 54 days ago | past
Reducing the Cybersecurity Risks of Portable Storage Media in OT Environments [pdf] (nist.gov)
1 point by gnabgib 68 days ago | past
NIST ion clock sets new record for most accurate clock (nist.gov)
352 points by voxadam 71 days ago | past | 120 comments
Phil Rogaway on Computer Science (nist.gov)
2 points by fanf2 72 days ago | past
Legal Metrology Meets the Digital Age (nist.gov)
3 points by gnabgib 78 days ago | past
Google Chrome: Critical Security Allowed Attackers Access Using Crafter HTML (nist.gov)
2 points by nitinreddy88 81 days ago | past
Practical Combinatorial Testing (nist.gov)
2 points by TheHideout 85 days ago | past
PBKDF2 JS Lib: Improper Input Validation Vulnerability (nist.gov)
5 points by wslh 3 months ago | past | 1 comment
Role-Based Access Controls (1992) [pdf] (nist.gov)
2 points by mooreds 3 months ago | past
Potential RCE via V8 Heap Corruption in Chrome (CVE-2025-5419) (nist.gov)
2 points by ghgr 3 months ago | past
CVE-2025-4143 (nist.gov)
4 points by terabytest 3 months ago | past | 1 comment
Exploited Vulnerabilities: A Proposed Metric for Vulnerability Exploitation (nist.gov)
1 point by furkansahin 4 months ago | past | 1 comment
NIST Special Publication 800-63: Digital Identity Guidelines Public Comments (nist.gov)
2 points by mooreds 4 months ago | past
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (2024/Aug) (nist.gov)
5 points by ColinWright 4 months ago | past
NIST on Cloning of Authentication Keys (nist.gov)
4 points by mooreds 4 months ago | past | 3 comments
New atomic fountain clock joins group that keeps the world on time (nist.gov)
118 points by austinallegro 4 months ago | past | 33 comments
NIST Privacy Framework 1.1: Initial Public Draft [pdf] (nist.gov)
4 points by CharlesW 4 months ago | past
Interoperable Randomness Beacons (nist.gov)
2 points by wslh 5 months ago | past
NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices (2023) (nist.gov)
3 points by teleforce 5 months ago | past
Reference Measurements of Error Vector Magnitude (EVM) (nist.gov)
1 point by teleforce 5 months ago | past
NIST Uncertainty Machine (nist.gov)
3 points by fanf2 5 months ago | past
File Type Spoofing Enabling Remote Code Execution in WhatsApp for Windows (nist.gov)
2 points by SpaghettiCthulu 5 months ago | past
NIST's Curved Neutron Beams Could Deliver Benefits Straight to Industry (nist.gov)
11 points by rbanffy 5 months ago | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: