Security
Security
Title Filter     Display # 
# Article Title
1 Levchin Prize for Real-World Cryptography
2 How Spectre Works
3 How Meltdown Works
4 Bug Bounty Bonanza
5 I Know Who You Are By The Way You Take A Corner
6 Stack Overflow Considered Harmful?
7 Samsung Bug Bounty Program
8 Fluid Passwords - Never The Same Password
9 Hacking Alexa By Whispering In Her Ear
10 More Cash For Internet Bug Bounty
11 Wireshark 2.4 Increases Protocol Coverage
12 Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
13 Google Capture the Flag 2017
14 EU Cookie Law Is A Flop
15 Microsoft Edge Falls Victim At Pwn2Own
16 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
17 Get Ready for Expanded Pwn2Own 2017
18 //No Comment - Let's Encrypt, IoT Security & Obfuscation
19 Cure53 XSSMas Hacking Challenge 2016 Underway
20 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
21 Microsoft Launches Cloud Fuzzing Service
22 Microsoft Bug Bounty Extends Scope
23 Your Android Could Leak Data Via USB Charging
24 Airship, a truly secure PHP CMS
25 Can AI Change the Face of Cyber Security?
26 Mayhem Wins DARPA Cyber Grand Challenge
27 Crypto 101 - A Free Ebook
28 SilentKeys A Privacy Aware Keyboard
29 Google Increases Android Bug Rewards
30 XSS Hunter For Pentesting
31 Anonymous Operation Icarus Hits Bank Sites
32 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
33 Hack A Chromebook for $100,000
34 Pwn2Own 2016 - The Results
35 Hacksplaining - Learn Through Hacking
36 Hack The Pentagon
37 Vulnerability Revealed In GNU C Library
38 Identifying Programmers From Executable Binaries
39 Teenage Programmer Equals Cyber Criminal
40 Let's Encrypt Now In Public Beta
41 State of Software Security
42 Coordinated Cyber Attack on Greek Banks
43 The Smartwatch Spy
44 Firefox, Chrome & Opera Block Access To Routers
45 How The Jeep Was Hacked
46 Microsoft Doubles Bounty Payouts
47 Your Phone's Battery Leaks - Your Id That Is
48 RC4 Stream Cypher - 75 Hours To Crack
49 Million Air Miles Bounty Awarded
50 New Android Bug Bounty Scheme
51 Navy Solicits Vulnerabilities
52 Mozilla Increases Bug Bounty
53 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
54 Software Quality Blamed For Airbus Crash
55 Earn United Airlines Award Miles For Finding Bugs
56 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
57 Microsoft Expands Bounty Programs
58 How Secure Is Android? Very Secure
59 GitHub Under DDoS Attack
60 Largest Payout Ever At Pwn2Own 2015
61 Yahoo's New Disposable Passwords
62 Rowhammer - Changing Memory Without Accessing It
63 All Change For Pwnium V
64 WebRTC Leaks Local IP Addresses
65 NTP The Latest Open Source Security Problem
66 Upgrade Git Client To Avoid Vulnerability
67 What Does The NSA Think Of Cryptographers?
68 Double Rewards For Finding Bugs In Facebook Ads Code
69 Poodle Is A Very Different Sort Of Security Breach
70 Google Increases Maximum Bounty For Chrome Bugs
71 New Online Services Bug Bounty Program
72 ShellShock - Yet Another Code Injection Vulnerability
73 The Canvas Fingerprint - How?
74 Cat Photos - A Potential Security Risk?
75 Hijacking Chromecast Is Easy
76 Bitcoin Isn't As Anonymous As You Might Hope
77 Cryptol Version 2 Released
78 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
79 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
80 Heartbleed - The Programmer's View
81 Facebook ThreatData
82 MozDef - Mozilla's Self Defence Kit
83 Record Payouts At Hacking Contests
84 The True Cost Of Bugs - Bitcoin Errors
85 $2.7 Million On Offer For Pwnium 4
86 Facebook Pays Out Record Reward
87 Optimize Mining Bitcoin
88 Google Extends Patch Reward
89 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
90 Microsoft Extends Bounty
91 Microsoft and Facebook Launch Internet Bug Bounty Scheme
92 GOTCHA - No More Password Hacking
93 Google Offers Cash For Security Patches
94 Bounty Hunter Awarded $100,000
95 Stick Figure Guide To AES Encryption
96 Facebook Refuses Bounty, Internet Raises Over $10K
97 Public Key Cryptography Set To Fail In Five Years
98 Android Security Hole More Stupid Error Than Defect
99 Microsoft Offers $100,000 For Novel Exploits
100 Crypto Made Easy
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
Banner
RSS feed of news items only
I Programmer News
Copyright © 2018 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.