Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎪 Social Engineering
Human Psychology, Phishing, Pretexting, Security Awareness
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3641
posts in
14.8
ms
Study: AI models that consider user's
feeling
are more likely to make
errors
🧬
Cognitive Science
arstechnica.com
·
11h
·
Hacker News
Beware the
Hats
: A Warning from the Streets of
Majorca
🔒
Hardware Security
fshot.org
·
5h
·
Hacker News
Book Review: "The
Infosec
Survival
Guides
"
🛡️
Network Security
lockboxx.blogspot.com
·
1d
·
Blogger
AI
chatbots
need ‘
deception
mode’
🎯
Game Theory
computerworld.com
·
18h
·
Hacker News
Well, I got
hacked
💻
Hacking
blog.vasi.li
·
10h
·
Hacker News
Social Media Is Now
Parasocial
Media
🌐
Complex Systems
journals.sagepub.com
·
1d
·
Hacker News
When it comes to cybersecurity, AI is our best hope in a
profession
that
generally
lacks hope
🛡️
Network Security
manchester.inklink.news
·
3d
·
Hacker News
Police Have Used License Plate Readers at Least 14x to
Stalk
Romantic
Interests
🔢
Homomorphic Encryption
ij.org
·
17h
·
Hacker News
,
r/privacy
Nothing
Is
Broken
. So Why Does Everything Feel Wrong?
🌐
Complex Systems
therealitydrift.substack.com
·
1d
·
Substack
Agentic
Manifesto
🎯
Game Theory
apaydin.bearblog.dev
·
22h
·
Hacker News
State Of
Affiliate
Fraud 2026: What 1B+ Tracked
Clicks
Reveal Across 500+ Programs
🔬
Digital Forensics
scaleo.ai
·
2d
·
Hacker News
The People And The Machine (
Roman
Sterlingov
)
🔢
Homomorphic Encryption
therage.co
·
3d
·
Hacker News
Report Links
Piracy
to Drugs, Weapons, and the
Mafia
; Calls for U.S. Site-Blocking
🔬
Digital Forensics
torrentfreak.com
·
22h
·
Hacker News
,
r/Piracy
The
elephant
in the room • Josh W.
Comeau
🤖
Machine Learning
joshwcomeau.com
·
2d
·
Hacker News
Musk in court: "
standard
practice
in the field"
🧬
Cognitive Science
haebom.dev
·
19h
·
Hacker News
Nccdc
2026: Same Game, New
Dimensions
🛡️
Network Security
alexlevinson.wordpress.com
·
1d
·
Hacker News
The Making of Digital
Identity
- 06 - The Mobile Revolution and the
Surveillance
Machine
🕶️
Privacy Tech
syntheticauth.ai
·
3d
·
Hacker News
,
r/programming
Credit Cards Are
Vulnerable
to
Brute
Force Kind Attacks
🔒
Hardware Security
metin.nextc.org
·
13h
·
Hacker News
The
Alice
and
Bob
After Dinner Speech
🔢
Homomorphic Encryption
hex.ooo
·
1d
·
Hacker News
We
stopped
hiring engineers for coding
ability
🔍
Reverse Engineering
eliseai.com
·
16h
·
Hacker News
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help