Title Filter     Display # 
# Article Title
1 Wireshark 2.4 Increases Protocol Coverage
2 Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
3 Google Capture the Flag 2017
4 EU Cookie Law Is A Flop
5 Microsoft Edge Falls Victim At Pwn2Own
6 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
7 Get Ready for Expanded Pwn2Own 2017
8 //No Comment - Let's Encrypt, IoT Security & Obfuscation
9 Cure53 XSSMas Hacking Challenge 2016 Underway
10 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
11 Microsoft Launches Cloud Fuzzing Service
12 Microsoft Bug Bounty Extends Scope
13 Your Android Could Leak Data Via USB Charging
14 Airship, a truly secure PHP CMS
15 Can AI Change the Face of Cyber Security?
16 Mayhem Wins DARPA Cyber Grand Challenge
17 Crypto 101 - A Free Ebook
18 SilentKeys A Privacy Aware Keyboard
19 Google Increases Android Bug Rewards
20 XSS Hunter For Pentesting
21 Anonymous Operation Icarus Hits Bank Sites
22 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
23 Hack A Chromebook for $100,000
24 Pwn2Own 2016 - The Results
25 Hacksplaining - Learn Through Hacking
26 Hack The Pentagon
27 Vulnerability Revealed In GNU C Library
28 Identifying Programmers From Executable Binaries
29 Teenage Programmer Equals Cyber Criminal
30 Let's Encrypt Now In Public Beta
31 State of Software Security
32 Coordinated Cyber Attack on Greek Banks
33 The Smartwatch Spy
34 Firefox, Chrome & Opera Block Access To Routers
35 How The Jeep Was Hacked
36 Microsoft Doubles Bounty Payouts
37 Your Phone's Battery Leaks - Your Id That Is
38 RC4 Stream Cypher - 75 Hours To Crack
39 Million Air Miles Bounty Awarded
40 New Android Bug Bounty Scheme
41 Navy Solicits Vulnerabilities
42 Mozilla Increases Bug Bounty
43 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
44 Software Quality Blamed For Airbus Crash
45 Earn United Airlines Award Miles For Finding Bugs
46 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
47 Microsoft Expands Bounty Programs
48 How Secure Is Android? Very Secure
49 GitHub Under DDoS Attack
50 Largest Payout Ever At Pwn2Own 2015
51 Yahoo's New Disposable Passwords
52 Rowhammer - Changing Memory Without Accessing It
53 All Change For Pwnium V
54 WebRTC Leaks Local IP Addresses
55 NTP The Latest Open Source Security Problem
56 Upgrade Git Client To Avoid Vulnerability
57 What Does The NSA Think Of Cryptographers?
58 Double Rewards For Finding Bugs In Facebook Ads Code
59 Poodle Is A Very Different Sort Of Security Breach
60 Google Increases Maximum Bounty For Chrome Bugs
61 New Online Services Bug Bounty Program
62 ShellShock - Yet Another Code Injection Vulnerability
63 The Canvas Fingerprint - How?
64 Cat Photos - A Potential Security Risk?
65 Hijacking Chromecast Is Easy
66 Bitcoin Isn't As Anonymous As You Might Hope
67 Cryptol Version 2 Released
68 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
69 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
70 Heartbleed - The Programmer's View
71 Facebook ThreatData
72 MozDef - Mozilla's Self Defence Kit
73 Record Payouts At Hacking Contests
74 The True Cost Of Bugs - Bitcoin Errors
75 $2.7 Million On Offer For Pwnium 4
76 Facebook Pays Out Record Reward
77 Optimize Mining Bitcoin
78 Google Extends Patch Reward
79 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
80 Microsoft Extends Bounty
81 Microsoft and Facebook Launch Internet Bug Bounty Scheme
82 GOTCHA - No More Password Hacking
83 Google Offers Cash For Security Patches
84 Bounty Hunter Awarded $100,000
85 Stick Figure Guide To AES Encryption
86 Facebook Refuses Bounty, Internet Raises Over $10K
87 Public Key Cryptography Set To Fail In Five Years
88 Android Security Hole More Stupid Error Than Defect
89 Microsoft Offers $100,000 For Novel Exploits
90 Crypto Made Easy
91 Is Exploiting A Bug Hacking?
92 Open Source Homomorphic Cryptography
93 Another Java 7 Security Flaw
94 Oracle Releases Java Critical Patch Updates
95 Oracle Patches 86 Flaws in Database and Enterprise Products
96 Java Still Insecure Warns Homeland Security
97 25 GPUs Crack Passwords In Minutes
98 Java Is Top Attack Target
99 Hackers Target SQL Injection
100 Smartphone Apps Track Users Even When Off
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2017 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.