Hacker News

View All News

Hacker Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Hacker Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Hacker

Learn to apply best practices and optimize your operations.

  • Securing VoIP: Keeping Your VoIP Networks Safe

    In this excerpt of Securing VoIP: Keeping your VoIP Network Safe, author Regis (Bud) Bates outlines different approaches to VoIP security and offers best practices to ensure infrastructure security is intact. Continue Reading

  • IoT applications pose new problems for developers

    As the Internet of Things takes over the consciousness of consumers and business executives, developers must address the needs of IoT-enabled devices. Standards in the industry are lacking, so it's important to identify and cater to the many characteristics of IoT applications that separate them from traditional software.

    This handbook covers how to meet the security, analytics and testing requirements for IoT applications. First, technology journalist George Lawton goes over steps that can be taken to mitigate security risks unique to the IoT. Next, software developer Swathija Raman addresses why analytics must be a part of IoT applications. To close, Cameron McKenzie, editor in chief of TheServerSide, discusses the distinctive challenges of testing IoT devices.

     Continue Reading

  • Bug bounty programs narrow the crowd

    Data shows that more companies are moving away from crowdsourcing and adopting invitation-only awards programs. Do higher-quality submissions result? Continue Reading

View All Manage

Problem Solve Hacker Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve