Security
Security
Title Filter     Display # 
# Article Title
1 Identifying Programmers From Executable Binaries
2 Teenage Programmer Equals Cyber Criminal
3 Let's Encrypt Now In Public Beta
4 State of Software Security
5 Coordinated Cyber Attack on Greek Banks
6 The Smartwatch Spy
7 Firefox, Chrome & Opera Block Access To Routers
8 How The Jeep Was Hacked
9 Microsoft Doubles Bounty Payouts
10 Your Phone's Battery Leaks - Your Id That Is
11 RC4 Stream Cypher - 75 Hours To Crack
12 Million Air Miles Bounty Awarded
13 New Android Bug Bounty Scheme
14 Navy Solicits Vulnerabilities
15 Mozilla Increases Bug Bounty
16 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
17 Software Quality Blamed For Airbus Crash
18 Earn United Airlines Award Miles For Finding Bugs
19 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
20 Microsoft Expands Bounty Programs
21 How Secure Is Android? Very Secure
22 GitHub Under DDoS Attack
23 Largest Payout Ever At Pwn2Own 2015
24 Yahoo's New Disposable Passwords
25 Rowhammer - Changing Memory Without Accessing It
26 All Change For Pwnium V
27 WebRTC Leaks Local IP Addresses
28 NTP The Latest Open Source Security Problem
29 Upgrade Git Client To Avoid Vulnerability
30 What Does The NSA Think Of Cryptographers?
31 Double Rewards For Finding Bugs In Facebook Ads Code
32 Poodle Is A Very Different Sort Of Security Breach
33 Google Increases Maximum Bounty For Chrome Bugs
34 New Online Services Bug Bounty Program
35 ShellShock - Yet Another Code Injection Vulnerability
36 The Canvas Fingerprint - How?
37 Cat Photos - A Potential Security Risk?
38 Hijacking Chromecast Is Easy
39 Bitcoin Isn't As Anonymous As You Might Hope
40 Cryptol Version 2 Released
41 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
42 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
43 Heartbleed - The Programmer's View
44 Facebook ThreatData
45 MozDef - Mozilla's Self Defence Kit
46 Record Payouts At Hacking Contests
47 The True Cost Of Bugs - Bitcoin Errors
48 $2.7 Million On Offer For Pwnium 4
49 Facebook Pays Out Record Reward
50 Optimize Mining Bitcoin
51 Google Extends Patch Reward
52 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
53 Microsoft Extends Bounty
54 Microsoft and Facebook Launch Internet Bug Bounty Scheme
55 GOTCHA - No More Password Hacking
56 Google Offers Cash For Security Patches
57 Bounty Hunter Awarded $100,000
58 Stick Figure Guide To AES Encryption
59 Facebook Refuses Bounty, Internet Raises Over $10K
60 Public Key Cryptography Set To Fail In Five Years
61 Android Security Hole More Stupid Error Than Defect
62 Microsoft Offers $100,000 For Novel Exploits
63 Crypto Made Easy
64 Is Exploiting A Bug Hacking?
65 Open Source Homomorphic Cryptography
66 Another Java 7 Security Flaw
67 Oracle Releases Java Critical Patch Updates
68 Oracle Patches 86 Flaws in Database and Enterprise Products
69 Java Still Insecure Warns Homeland Security
70 25 GPUs Crack Passwords In Minutes
71 Java Is Top Attack Target
72 Hackers Target SQL Injection
73 Smartphone Apps Track Users Even When Off
74 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
75 Oracle Login Weakness
76 Frankenstein - Stitching Code Bodies Together To Hide Malware
77 Google Announces More Cash For Security Bugs
78 ROP Mitigations Bypassed
79 BlueHat Prizes Awarded
80 Cartoon - Digital Rights or Wrongs?
81 Irises Change Over Time - Problem for Biometric Testing
82 Siri a Security Risk for IBM
83 A Short History of Hacking
84 Chrome, IE and Firefox Hacked
85 Inside Stuxnet
86 Chrome Hacked Twice at CanSecWest
87 FSF Opposes Restricted Boot
88 Google Offers $1 million for Chrome Hack
89 Kinect The Ultimate Security Device
90 Facebook's White Hat VISA Card
91 Print Me If You Dare - the Rise of Printer Malware
92 Quick action to patch ASP.NET vulnerability
93 The Computer Science of Insecurity
94 Cyber Attacks and Holidays
95 Planes are Unix hosts waiting to be hacked
96 Security by obscurity - a new theory
97 When cookies leak data
98 Search the world's smartphone photos
99 CIA/NSA want a photo location finder
100 Zodiac Killer code cracked? Cryptography at its worst
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
RSS feed of news items only
I Programmer News
Copyright © 2016 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.