Title Filter     Display # 
# Article Title
1 Get Ready for Expanded Pwn2Own 2017
2 //No Comment - Let's Encrypt, IoT Security & Obfuscation
3 Cure53 XSSMas Hacking Challenge 2016 Underway
4 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
5 Microsoft Launches Cloud Fuzzing Service
6 Microsoft Bug Bounty Extends Scope
7 Your Android Could Leak Data Via USB Charging
8 Airship, a truly secure PHP CMS
9 Can AI Change the Face of Cyber Security?
10 Mayhem Wins DARPA Cyber Grand Challenge
11 Crypto 101 - A Free Ebook
12 SilentKeys A Privacy Aware Keyboard
13 Google Increases Android Bug Rewards
14 XSS Hunter For Pentesting
15 Anonymous Operation Icarus Hits Bank Sites
16 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
17 Hack A Chromebook for $100,000
18 Pwn2Own 2016 - The Results
19 Hacksplaining - Learn Through Hacking
20 Hack The Pentagon
21 Vulnerability Revealed In GNU C Library
22 Identifying Programmers From Executable Binaries
23 Teenage Programmer Equals Cyber Criminal
24 Let's Encrypt Now In Public Beta
25 State of Software Security
26 Coordinated Cyber Attack on Greek Banks
27 The Smartwatch Spy
28 Firefox, Chrome & Opera Block Access To Routers
29 How The Jeep Was Hacked
30 Microsoft Doubles Bounty Payouts
31 Your Phone's Battery Leaks - Your Id That Is
32 RC4 Stream Cypher - 75 Hours To Crack
33 Million Air Miles Bounty Awarded
34 New Android Bug Bounty Scheme
35 Navy Solicits Vulnerabilities
36 Mozilla Increases Bug Bounty
37 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
38 Software Quality Blamed For Airbus Crash
39 Earn United Airlines Award Miles For Finding Bugs
40 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
41 Microsoft Expands Bounty Programs
42 How Secure Is Android? Very Secure
43 GitHub Under DDoS Attack
44 Largest Payout Ever At Pwn2Own 2015
45 Yahoo's New Disposable Passwords
46 Rowhammer - Changing Memory Without Accessing It
47 All Change For Pwnium V
48 WebRTC Leaks Local IP Addresses
49 NTP The Latest Open Source Security Problem
50 Upgrade Git Client To Avoid Vulnerability
51 What Does The NSA Think Of Cryptographers?
52 Double Rewards For Finding Bugs In Facebook Ads Code
53 Poodle Is A Very Different Sort Of Security Breach
54 Google Increases Maximum Bounty For Chrome Bugs
55 New Online Services Bug Bounty Program
56 ShellShock - Yet Another Code Injection Vulnerability
57 The Canvas Fingerprint - How?
58 Cat Photos - A Potential Security Risk?
59 Hijacking Chromecast Is Easy
60 Bitcoin Isn't As Anonymous As You Might Hope
61 Cryptol Version 2 Released
62 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
63 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
64 Heartbleed - The Programmer's View
65 Facebook ThreatData
66 MozDef - Mozilla's Self Defence Kit
67 Record Payouts At Hacking Contests
68 The True Cost Of Bugs - Bitcoin Errors
69 $2.7 Million On Offer For Pwnium 4
70 Facebook Pays Out Record Reward
71 Optimize Mining Bitcoin
72 Google Extends Patch Reward
73 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
74 Microsoft Extends Bounty
75 Microsoft and Facebook Launch Internet Bug Bounty Scheme
76 GOTCHA - No More Password Hacking
77 Google Offers Cash For Security Patches
78 Bounty Hunter Awarded $100,000
79 Stick Figure Guide To AES Encryption
80 Facebook Refuses Bounty, Internet Raises Over $10K
81 Public Key Cryptography Set To Fail In Five Years
82 Android Security Hole More Stupid Error Than Defect
83 Microsoft Offers $100,000 For Novel Exploits
84 Crypto Made Easy
85 Is Exploiting A Bug Hacking?
86 Open Source Homomorphic Cryptography
87 Another Java 7 Security Flaw
88 Oracle Releases Java Critical Patch Updates
89 Oracle Patches 86 Flaws in Database and Enterprise Products
90 Java Still Insecure Warns Homeland Security
91 25 GPUs Crack Passwords In Minutes
92 Java Is Top Attack Target
93 Hackers Target SQL Injection
94 Smartphone Apps Track Users Even When Off
95 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
96 Oracle Login Weakness
97 Frankenstein - Stitching Code Bodies Together To Hide Malware
98 Google Announces More Cash For Security Bugs
99 ROP Mitigations Bypassed
100 BlueHat Prizes Awarded
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2017 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.