Title Filter     Display # 
# Article Title
1 Google Capture the Flag 2017
2 EU Cookie Law Is A Flop
3 Microsoft Edge Falls Victim At Pwn2Own
4 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
5 Get Ready for Expanded Pwn2Own 2017
6 //No Comment - Let's Encrypt, IoT Security & Obfuscation
7 Cure53 XSSMas Hacking Challenge 2016 Underway
8 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
9 Microsoft Launches Cloud Fuzzing Service
10 Microsoft Bug Bounty Extends Scope
11 Your Android Could Leak Data Via USB Charging
12 Airship, a truly secure PHP CMS
13 Can AI Change the Face of Cyber Security?
14 Mayhem Wins DARPA Cyber Grand Challenge
15 Crypto 101 - A Free Ebook
16 SilentKeys A Privacy Aware Keyboard
17 Google Increases Android Bug Rewards
18 XSS Hunter For Pentesting
19 Anonymous Operation Icarus Hits Bank Sites
20 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
21 Hack A Chromebook for $100,000
22 Pwn2Own 2016 - The Results
23 Hacksplaining - Learn Through Hacking
24 Hack The Pentagon
25 Vulnerability Revealed In GNU C Library
26 Identifying Programmers From Executable Binaries
27 Teenage Programmer Equals Cyber Criminal
28 Let's Encrypt Now In Public Beta
29 State of Software Security
30 Coordinated Cyber Attack on Greek Banks
31 The Smartwatch Spy
32 Firefox, Chrome & Opera Block Access To Routers
33 How The Jeep Was Hacked
34 Microsoft Doubles Bounty Payouts
35 Your Phone's Battery Leaks - Your Id That Is
36 RC4 Stream Cypher - 75 Hours To Crack
37 Million Air Miles Bounty Awarded
38 New Android Bug Bounty Scheme
39 Navy Solicits Vulnerabilities
40 Mozilla Increases Bug Bounty
41 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
42 Software Quality Blamed For Airbus Crash
43 Earn United Airlines Award Miles For Finding Bugs
44 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
45 Microsoft Expands Bounty Programs
46 How Secure Is Android? Very Secure
47 GitHub Under DDoS Attack
48 Largest Payout Ever At Pwn2Own 2015
49 Yahoo's New Disposable Passwords
50 Rowhammer - Changing Memory Without Accessing It
51 All Change For Pwnium V
52 WebRTC Leaks Local IP Addresses
53 NTP The Latest Open Source Security Problem
54 Upgrade Git Client To Avoid Vulnerability
55 What Does The NSA Think Of Cryptographers?
56 Double Rewards For Finding Bugs In Facebook Ads Code
57 Poodle Is A Very Different Sort Of Security Breach
58 Google Increases Maximum Bounty For Chrome Bugs
59 New Online Services Bug Bounty Program
60 ShellShock - Yet Another Code Injection Vulnerability
61 The Canvas Fingerprint - How?
62 Cat Photos - A Potential Security Risk?
63 Hijacking Chromecast Is Easy
64 Bitcoin Isn't As Anonymous As You Might Hope
65 Cryptol Version 2 Released
66 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
67 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
68 Heartbleed - The Programmer's View
69 Facebook ThreatData
70 MozDef - Mozilla's Self Defence Kit
71 Record Payouts At Hacking Contests
72 The True Cost Of Bugs - Bitcoin Errors
73 $2.7 Million On Offer For Pwnium 4
74 Facebook Pays Out Record Reward
75 Optimize Mining Bitcoin
76 Google Extends Patch Reward
77 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
78 Microsoft Extends Bounty
79 Microsoft and Facebook Launch Internet Bug Bounty Scheme
80 GOTCHA - No More Password Hacking
81 Google Offers Cash For Security Patches
82 Bounty Hunter Awarded $100,000
83 Stick Figure Guide To AES Encryption
84 Facebook Refuses Bounty, Internet Raises Over $10K
85 Public Key Cryptography Set To Fail In Five Years
86 Android Security Hole More Stupid Error Than Defect
87 Microsoft Offers $100,000 For Novel Exploits
88 Crypto Made Easy
89 Is Exploiting A Bug Hacking?
90 Open Source Homomorphic Cryptography
91 Another Java 7 Security Flaw
92 Oracle Releases Java Critical Patch Updates
93 Oracle Patches 86 Flaws in Database and Enterprise Products
94 Java Still Insecure Warns Homeland Security
95 25 GPUs Crack Passwords In Minutes
96 Java Is Top Attack Target
97 Hackers Target SQL Injection
98 Smartphone Apps Track Users Even When Off
99 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
100 Oracle Login Weakness
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2017 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.