๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Swedish Cryptography

Regional Security Research, Nordic Standards, Cultural Encryption, Scandinavian Innovation

Phishing training is pretty pointless, researchers find
scworld.comยท12hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Ask HN: Has there been an increase in online censorship due to AI search's rise?
news.ycombinator.comยท1hยท
Discuss: Hacker News
๐Ÿ”—Online Curation
GulliVR: A Walking-Oriented Technique for Navigation in Virtual Reality Games Based on Virtual Body Resizing
arxiv.orgยท23h
๐Ÿ“ŸTerminal Physics
Can LangExtract Turn Messy Clinical Notes into Structured Data?
towardsdatascience.comยท3h
๐Ÿค–Archive Automation
Protect Yourself From Data Breaches: Why You Should Use a Password Manager
hackernoon.comยท3d
๐Ÿ”“Hacking
DigiPaws: An app designed to help users reduce screen addiction
github.comยท9hยท
Discuss: Hacker News
๐ŸงFOSS
Noodlophile Stealer Hides Behind Bogus Copyright Complaints
darkreading.comยท7h
๐ŸŽซKerberos Attacks
Beyond the binary: Nuanced categories of good, neutral and bad support lasting human cooperation
phys.orgยท11h
๐ŸคConsensus Networks
Securityโ€™s blind spot: the problem with taking CVE scores at face value
techradar.comยท19h
๐Ÿ”“Hacking
Grab-n-Go: On-the-Go Microgesture Recognition with Objects in Hand
arxiv.orgยท23h
โœ‹Tactile Computing
The Constraint Satisfaction Problem Over Multisorted Cores
arxiv.orgยท23h
๐ŸŽจGraph Coloring
Automating the Derivation of Unification Algorithms: A Case Study in Deductive Program Synthesis
arxiv.orgยท23h
๐Ÿ”ฎProof Search
How Tenable Moved From Siloed Security to Exposure Management
tenable.comยท14h
๐ŸŽฏThreat Hunting
Von Neumann's minimax theorem through Fourier-Motzkin elimination
arxiv.orgยท23h
๐ŸŽฏPerformance Proofs
Millions of dollars in cryptocurrency has been confiscated as the DoJ cracks down on an infamous ransomware operator
techradar.comยท7h
๐ŸŽซKerberos Attacks
Malicious URLs and phishing scams remain a constant threat for businesses - here's what can be done
techradar.comยท13h
๐Ÿ“กFeed Security
Enhancing Interactive Voting-Based Map Matching: Improving Efficiency and Robustness for Heterogeneous GPS Trajectories
arxiv.orgยท23h
๐Ÿ”ถVoronoi Diagrams
Dynamic Synchronization and Resonance as a Universal Origin of 1/f Fluctuations -- Amplitude Modulation Across Music and Nature
arxiv.orgยท3d
๐Ÿ“กFrequency Archaeology
VeriPHY: Physical Layer Signal Authentication for Wireless Communication in 5G Environments
arxiv.orgยท4d
๐ŸŒŠStream Ciphers
Kube-coder: spin up multi-dev isolated environments in kubernetes accessible through custom domains.
github.comยท5h
๐Ÿ“ฆContainer Security
Loading...Loading more...
AboutBlogChangelogRoadmap