Security
Security
Title Filter     Display # 
# Article Title
1 Can AI Change the Face of Cyber Security?
2 Mayhem Wins DARPA Cyber Grand Challenge
3 Crypto 101 - A Free Ebook
4 SilentKeys A Privacy Aware Keyboard
5 Google Increases Android Bug Rewards
6 XSS Hunter For Pentesting
7 Anonymous Operation Icarus Hits Bank Sites
8 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
9 Hack A Chromebook for $100,000
10 Pwn2Own 2016 - The Results
11 Hacksplaining - Learn Through Hacking
12 Hack The Pentagon
13 Vulnerability Revealed In GNU C Library
14 Identifying Programmers From Executable Binaries
15 Teenage Programmer Equals Cyber Criminal
16 Let's Encrypt Now In Public Beta
17 State of Software Security
18 Coordinated Cyber Attack on Greek Banks
19 The Smartwatch Spy
20 Firefox, Chrome & Opera Block Access To Routers
21 How The Jeep Was Hacked
22 Microsoft Doubles Bounty Payouts
23 Your Phone's Battery Leaks - Your Id That Is
24 RC4 Stream Cypher - 75 Hours To Crack
25 Million Air Miles Bounty Awarded
26 New Android Bug Bounty Scheme
27 Navy Solicits Vulnerabilities
28 Mozilla Increases Bug Bounty
29 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
30 Software Quality Blamed For Airbus Crash
31 Earn United Airlines Award Miles For Finding Bugs
32 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
33 Microsoft Expands Bounty Programs
34 How Secure Is Android? Very Secure
35 GitHub Under DDoS Attack
36 Largest Payout Ever At Pwn2Own 2015
37 Yahoo's New Disposable Passwords
38 Rowhammer - Changing Memory Without Accessing It
39 All Change For Pwnium V
40 WebRTC Leaks Local IP Addresses
41 NTP The Latest Open Source Security Problem
42 Upgrade Git Client To Avoid Vulnerability
43 What Does The NSA Think Of Cryptographers?
44 Double Rewards For Finding Bugs In Facebook Ads Code
45 Poodle Is A Very Different Sort Of Security Breach
46 Google Increases Maximum Bounty For Chrome Bugs
47 New Online Services Bug Bounty Program
48 ShellShock - Yet Another Code Injection Vulnerability
49 The Canvas Fingerprint - How?
50 Cat Photos - A Potential Security Risk?
51 Hijacking Chromecast Is Easy
52 Bitcoin Isn't As Anonymous As You Might Hope
53 Cryptol Version 2 Released
54 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
55 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
56 Heartbleed - The Programmer's View
57 Facebook ThreatData
58 MozDef - Mozilla's Self Defence Kit
59 Record Payouts At Hacking Contests
60 The True Cost Of Bugs - Bitcoin Errors
61 $2.7 Million On Offer For Pwnium 4
62 Facebook Pays Out Record Reward
63 Optimize Mining Bitcoin
64 Google Extends Patch Reward
65 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
66 Microsoft Extends Bounty
67 Microsoft and Facebook Launch Internet Bug Bounty Scheme
68 GOTCHA - No More Password Hacking
69 Google Offers Cash For Security Patches
70 Bounty Hunter Awarded $100,000
71 Stick Figure Guide To AES Encryption
72 Facebook Refuses Bounty, Internet Raises Over $10K
73 Public Key Cryptography Set To Fail In Five Years
74 Android Security Hole More Stupid Error Than Defect
75 Microsoft Offers $100,000 For Novel Exploits
76 Crypto Made Easy
77 Is Exploiting A Bug Hacking?
78 Open Source Homomorphic Cryptography
79 Another Java 7 Security Flaw
80 Oracle Releases Java Critical Patch Updates
81 Oracle Patches 86 Flaws in Database and Enterprise Products
82 Java Still Insecure Warns Homeland Security
83 25 GPUs Crack Passwords In Minutes
84 Java Is Top Attack Target
85 Hackers Target SQL Injection
86 Smartphone Apps Track Users Even When Off
87 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
88 Oracle Login Weakness
89 Frankenstein - Stitching Code Bodies Together To Hide Malware
90 Google Announces More Cash For Security Bugs
91 ROP Mitigations Bypassed
92 BlueHat Prizes Awarded
93 Cartoon - Digital Rights or Wrongs?
94 Irises Change Over Time - Problem for Biometric Testing
95 Siri a Security Risk for IBM
96 A Short History of Hacking
97 Chrome, IE and Firefox Hacked
98 Inside Stuxnet
99 Chrome Hacked Twice at CanSecWest
100 FSF Opposes Restricted Boot
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
RSS feed of news items only
I Programmer News
Copyright © 2016 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.