Security
Security
Title Filter     Display # 
# Article Title
1 I Know Who You Are By The Way You Take A Corner
2 Stack Overflow Considered Harmful?
3 Samsung Bug Bounty Program
4 Fluid Passwords - Never The Same Password
5 Hacking Alexa By Whispering In Her Ear
6 More Cash For Internet Bug Bounty
7 Wireshark 2.4 Increases Protocol Coverage
8 Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
9 Google Capture the Flag 2017
10 EU Cookie Law Is A Flop
11 Microsoft Edge Falls Victim At Pwn2Own
12 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
13 Get Ready for Expanded Pwn2Own 2017
14 //No Comment - Let's Encrypt, IoT Security & Obfuscation
15 Cure53 XSSMas Hacking Challenge 2016 Underway
16 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
17 Microsoft Launches Cloud Fuzzing Service
18 Microsoft Bug Bounty Extends Scope
19 Your Android Could Leak Data Via USB Charging
20 Airship, a truly secure PHP CMS
21 Can AI Change the Face of Cyber Security?
22 Mayhem Wins DARPA Cyber Grand Challenge
23 Crypto 101 - A Free Ebook
24 SilentKeys A Privacy Aware Keyboard
25 Google Increases Android Bug Rewards
26 XSS Hunter For Pentesting
27 Anonymous Operation Icarus Hits Bank Sites
28 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
29 Hack A Chromebook for $100,000
30 Pwn2Own 2016 - The Results
31 Hacksplaining - Learn Through Hacking
32 Hack The Pentagon
33 Vulnerability Revealed In GNU C Library
34 Identifying Programmers From Executable Binaries
35 Teenage Programmer Equals Cyber Criminal
36 Let's Encrypt Now In Public Beta
37 State of Software Security
38 Coordinated Cyber Attack on Greek Banks
39 The Smartwatch Spy
40 Firefox, Chrome & Opera Block Access To Routers
41 How The Jeep Was Hacked
42 Microsoft Doubles Bounty Payouts
43 Your Phone's Battery Leaks - Your Id That Is
44 RC4 Stream Cypher - 75 Hours To Crack
45 Million Air Miles Bounty Awarded
46 New Android Bug Bounty Scheme
47 Navy Solicits Vulnerabilities
48 Mozilla Increases Bug Bounty
49 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
50 Software Quality Blamed For Airbus Crash
51 Earn United Airlines Award Miles For Finding Bugs
52 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
53 Microsoft Expands Bounty Programs
54 How Secure Is Android? Very Secure
55 GitHub Under DDoS Attack
56 Largest Payout Ever At Pwn2Own 2015
57 Yahoo's New Disposable Passwords
58 Rowhammer - Changing Memory Without Accessing It
59 All Change For Pwnium V
60 WebRTC Leaks Local IP Addresses
61 NTP The Latest Open Source Security Problem
62 Upgrade Git Client To Avoid Vulnerability
63 What Does The NSA Think Of Cryptographers?
64 Double Rewards For Finding Bugs In Facebook Ads Code
65 Poodle Is A Very Different Sort Of Security Breach
66 Google Increases Maximum Bounty For Chrome Bugs
67 New Online Services Bug Bounty Program
68 ShellShock - Yet Another Code Injection Vulnerability
69 The Canvas Fingerprint - How?
70 Cat Photos - A Potential Security Risk?
71 Hijacking Chromecast Is Easy
72 Bitcoin Isn't As Anonymous As You Might Hope
73 Cryptol Version 2 Released
74 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
75 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
76 Heartbleed - The Programmer's View
77 Facebook ThreatData
78 MozDef - Mozilla's Self Defence Kit
79 Record Payouts At Hacking Contests
80 The True Cost Of Bugs - Bitcoin Errors
81 $2.7 Million On Offer For Pwnium 4
82 Facebook Pays Out Record Reward
83 Optimize Mining Bitcoin
84 Google Extends Patch Reward
85 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
86 Microsoft Extends Bounty
87 Microsoft and Facebook Launch Internet Bug Bounty Scheme
88 GOTCHA - No More Password Hacking
89 Google Offers Cash For Security Patches
90 Bounty Hunter Awarded $100,000
91 Stick Figure Guide To AES Encryption
92 Facebook Refuses Bounty, Internet Raises Over $10K
93 Public Key Cryptography Set To Fail In Five Years
94 Android Security Hole More Stupid Error Than Defect
95 Microsoft Offers $100,000 For Novel Exploits
96 Crypto Made Easy
97 Is Exploiting A Bug Hacking?
98 Open Source Homomorphic Cryptography
99 Another Java 7 Security Flaw
100 Oracle Releases Java Critical Patch Updates
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
Banner
Banner
RSS feed of news items only
I Programmer News
Copyright © 2017 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.