Security
Security
Title Filter     Display # 
# Article Title
1 Microsoft Edge Falls Victim At Pwn2Own
2 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
3 Get Ready for Expanded Pwn2Own 2017
4 //No Comment - Let's Encrypt, IoT Security & Obfuscation
5 Cure53 XSSMas Hacking Challenge 2016 Underway
6 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
7 Microsoft Launches Cloud Fuzzing Service
8 Microsoft Bug Bounty Extends Scope
9 Your Android Could Leak Data Via USB Charging
10 Airship, a truly secure PHP CMS
11 Can AI Change the Face of Cyber Security?
12 Mayhem Wins DARPA Cyber Grand Challenge
13 Crypto 101 - A Free Ebook
14 SilentKeys A Privacy Aware Keyboard
15 Google Increases Android Bug Rewards
16 XSS Hunter For Pentesting
17 Anonymous Operation Icarus Hits Bank Sites
18 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
19 Hack A Chromebook for $100,000
20 Pwn2Own 2016 - The Results
21 Hacksplaining - Learn Through Hacking
22 Hack The Pentagon
23 Vulnerability Revealed In GNU C Library
24 Identifying Programmers From Executable Binaries
25 Teenage Programmer Equals Cyber Criminal
26 Let's Encrypt Now In Public Beta
27 State of Software Security
28 Coordinated Cyber Attack on Greek Banks
29 The Smartwatch Spy
30 Firefox, Chrome & Opera Block Access To Routers
31 How The Jeep Was Hacked
32 Microsoft Doubles Bounty Payouts
33 Your Phone's Battery Leaks - Your Id That Is
34 RC4 Stream Cypher - 75 Hours To Crack
35 Million Air Miles Bounty Awarded
36 New Android Bug Bounty Scheme
37 Navy Solicits Vulnerabilities
38 Mozilla Increases Bug Bounty
39 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
40 Software Quality Blamed For Airbus Crash
41 Earn United Airlines Award Miles For Finding Bugs
42 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
43 Microsoft Expands Bounty Programs
44 How Secure Is Android? Very Secure
45 GitHub Under DDoS Attack
46 Largest Payout Ever At Pwn2Own 2015
47 Yahoo's New Disposable Passwords
48 Rowhammer - Changing Memory Without Accessing It
49 All Change For Pwnium V
50 WebRTC Leaks Local IP Addresses
51 NTP The Latest Open Source Security Problem
52 Upgrade Git Client To Avoid Vulnerability
53 What Does The NSA Think Of Cryptographers?
54 Double Rewards For Finding Bugs In Facebook Ads Code
55 Poodle Is A Very Different Sort Of Security Breach
56 Google Increases Maximum Bounty For Chrome Bugs
57 New Online Services Bug Bounty Program
58 ShellShock - Yet Another Code Injection Vulnerability
59 The Canvas Fingerprint - How?
60 Cat Photos - A Potential Security Risk?
61 Hijacking Chromecast Is Easy
62 Bitcoin Isn't As Anonymous As You Might Hope
63 Cryptol Version 2 Released
64 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
65 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
66 Heartbleed - The Programmer's View
67 Facebook ThreatData
68 MozDef - Mozilla's Self Defence Kit
69 Record Payouts At Hacking Contests
70 The True Cost Of Bugs - Bitcoin Errors
71 $2.7 Million On Offer For Pwnium 4
72 Facebook Pays Out Record Reward
73 Optimize Mining Bitcoin
74 Google Extends Patch Reward
75 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
76 Microsoft Extends Bounty
77 Microsoft and Facebook Launch Internet Bug Bounty Scheme
78 GOTCHA - No More Password Hacking
79 Google Offers Cash For Security Patches
80 Bounty Hunter Awarded $100,000
81 Stick Figure Guide To AES Encryption
82 Facebook Refuses Bounty, Internet Raises Over $10K
83 Public Key Cryptography Set To Fail In Five Years
84 Android Security Hole More Stupid Error Than Defect
85 Microsoft Offers $100,000 For Novel Exploits
86 Crypto Made Easy
87 Is Exploiting A Bug Hacking?
88 Open Source Homomorphic Cryptography
89 Another Java 7 Security Flaw
90 Oracle Releases Java Critical Patch Updates
91 Oracle Patches 86 Flaws in Database and Enterprise Products
92 Java Still Insecure Warns Homeland Security
93 25 GPUs Crack Passwords In Minutes
94 Java Is Top Attack Target
95 Hackers Target SQL Injection
96 Smartphone Apps Track Users Even When Off
97 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
98 Oracle Login Weakness
99 Frankenstein - Stitching Code Bodies Together To Hide Malware
100 Google Announces More Cash For Security Bugs
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
Banner
RSS feed of news items only
I Programmer News
Copyright © 2017 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.