Security
Security
Title Filter     Display # 
# Article Title
1 Hack A Chromebook for $100,000
2 Pwn2Own 2016 - The Results
3 Hacksplaining - Learn Through Hacking
4 Hack The Pentagon
5 Vulnerability Revealed In GNU C Library
6 Identifying Programmers From Executable Binaries
7 Teenage Programmer Equals Cyber Criminal
8 Let's Encrypt Now In Public Beta
9 State of Software Security
10 Coordinated Cyber Attack on Greek Banks
11 The Smartwatch Spy
12 Firefox, Chrome & Opera Block Access To Routers
13 How The Jeep Was Hacked
14 Microsoft Doubles Bounty Payouts
15 Your Phone's Battery Leaks - Your Id That Is
16 RC4 Stream Cypher - 75 Hours To Crack
17 Million Air Miles Bounty Awarded
18 New Android Bug Bounty Scheme
19 Navy Solicits Vulnerabilities
20 Mozilla Increases Bug Bounty
21 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
22 Software Quality Blamed For Airbus Crash
23 Earn United Airlines Award Miles For Finding Bugs
24 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
25 Microsoft Expands Bounty Programs
26 How Secure Is Android? Very Secure
27 GitHub Under DDoS Attack
28 Largest Payout Ever At Pwn2Own 2015
29 Yahoo's New Disposable Passwords
30 Rowhammer - Changing Memory Without Accessing It
31 All Change For Pwnium V
32 WebRTC Leaks Local IP Addresses
33 NTP The Latest Open Source Security Problem
34 Upgrade Git Client To Avoid Vulnerability
35 What Does The NSA Think Of Cryptographers?
36 Double Rewards For Finding Bugs In Facebook Ads Code
37 Poodle Is A Very Different Sort Of Security Breach
38 Google Increases Maximum Bounty For Chrome Bugs
39 New Online Services Bug Bounty Program
40 ShellShock - Yet Another Code Injection Vulnerability
41 The Canvas Fingerprint - How?
42 Cat Photos - A Potential Security Risk?
43 Hijacking Chromecast Is Easy
44 Bitcoin Isn't As Anonymous As You Might Hope
45 Cryptol Version 2 Released
46 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
47 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
48 Heartbleed - The Programmer's View
49 Facebook ThreatData
50 MozDef - Mozilla's Self Defence Kit
51 Record Payouts At Hacking Contests
52 The True Cost Of Bugs - Bitcoin Errors
53 $2.7 Million On Offer For Pwnium 4
54 Facebook Pays Out Record Reward
55 Optimize Mining Bitcoin
56 Google Extends Patch Reward
57 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
58 Microsoft Extends Bounty
59 Microsoft and Facebook Launch Internet Bug Bounty Scheme
60 GOTCHA - No More Password Hacking
61 Google Offers Cash For Security Patches
62 Bounty Hunter Awarded $100,000
63 Stick Figure Guide To AES Encryption
64 Facebook Refuses Bounty, Internet Raises Over $10K
65 Public Key Cryptography Set To Fail In Five Years
66 Android Security Hole More Stupid Error Than Defect
67 Microsoft Offers $100,000 For Novel Exploits
68 Crypto Made Easy
69 Is Exploiting A Bug Hacking?
70 Open Source Homomorphic Cryptography
71 Another Java 7 Security Flaw
72 Oracle Releases Java Critical Patch Updates
73 Oracle Patches 86 Flaws in Database and Enterprise Products
74 Java Still Insecure Warns Homeland Security
75 25 GPUs Crack Passwords In Minutes
76 Java Is Top Attack Target
77 Hackers Target SQL Injection
78 Smartphone Apps Track Users Even When Off
79 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
80 Oracle Login Weakness
81 Frankenstein - Stitching Code Bodies Together To Hide Malware
82 Google Announces More Cash For Security Bugs
83 ROP Mitigations Bypassed
84 BlueHat Prizes Awarded
85 Cartoon - Digital Rights or Wrongs?
86 Irises Change Over Time - Problem for Biometric Testing
87 Siri a Security Risk for IBM
88 A Short History of Hacking
89 Chrome, IE and Firefox Hacked
90 Inside Stuxnet
91 Chrome Hacked Twice at CanSecWest
92 FSF Opposes Restricted Boot
93 Google Offers $1 million for Chrome Hack
94 Kinect The Ultimate Security Device
95 Facebook's White Hat VISA Card
96 Print Me If You Dare - the Rise of Printer Malware
97 Quick action to patch ASP.NET vulnerability
98 The Computer Science of Insecurity
99 Cyber Attacks and Holidays
100 Planes are Unix hosts waiting to be hacked
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
RSS feed of news items only
I Programmer News
Copyright © 2016 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.