Title Filter     Display # 
# Article Title
21 //No Comment - Let's Encrypt, IoT Security & Obfuscation
22 Cure53 XSSMas Hacking Challenge 2016 Underway
23 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
24 Microsoft Launches Cloud Fuzzing Service
25 Microsoft Bug Bounty Extends Scope
26 Your Android Could Leak Data Via USB Charging
27 Airship, a truly secure PHP CMS
28 Can AI Change the Face of Cyber Security?
29 Mayhem Wins DARPA Cyber Grand Challenge
30 Crypto 101 - A Free Ebook
31 SilentKeys A Privacy Aware Keyboard
32 Google Increases Android Bug Rewards
33 XSS Hunter For Pentesting
34 Anonymous Operation Icarus Hits Bank Sites
35 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
36 Hack A Chromebook for $100,000
37 Pwn2Own 2016 - The Results
38 Hacksplaining - Learn Through Hacking
39 Hack The Pentagon
40 Vulnerability Revealed In GNU C Library
41 Identifying Programmers From Executable Binaries
42 Teenage Programmer Equals Cyber Criminal
43 Let's Encrypt Now In Public Beta
44 State of Software Security
45 Coordinated Cyber Attack on Greek Banks
46 The Smartwatch Spy
47 Firefox, Chrome & Opera Block Access To Routers
48 How The Jeep Was Hacked
49 Microsoft Doubles Bounty Payouts
50 Your Phone's Battery Leaks - Your Id That Is
51 RC4 Stream Cypher - 75 Hours To Crack
52 Million Air Miles Bounty Awarded
53 New Android Bug Bounty Scheme
54 Navy Solicits Vulnerabilities
55 Mozilla Increases Bug Bounty
56 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
57 Software Quality Blamed For Airbus Crash
58 Earn United Airlines Award Miles For Finding Bugs
59 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
60 Microsoft Expands Bounty Programs
61 How Secure Is Android? Very Secure
62 GitHub Under DDoS Attack
63 Largest Payout Ever At Pwn2Own 2015
64 Yahoo's New Disposable Passwords
65 Rowhammer - Changing Memory Without Accessing It
66 All Change For Pwnium V
67 WebRTC Leaks Local IP Addresses
68 NTP The Latest Open Source Security Problem
69 Upgrade Git Client To Avoid Vulnerability
70 What Does The NSA Think Of Cryptographers?
71 Double Rewards For Finding Bugs In Facebook Ads Code
72 Poodle Is A Very Different Sort Of Security Breach
73 Google Increases Maximum Bounty For Chrome Bugs
74 New Online Services Bug Bounty Program
75 ShellShock - Yet Another Code Injection Vulnerability
76 The Canvas Fingerprint - How?
77 Cat Photos - A Potential Security Risk?
78 Hijacking Chromecast Is Easy
79 Bitcoin Isn't As Anonymous As You Might Hope
80 Cryptol Version 2 Released
81 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
82 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
83 Heartbleed - The Programmer's View
84 Facebook ThreatData
85 MozDef - Mozilla's Self Defence Kit
86 Record Payouts At Hacking Contests
87 The True Cost Of Bugs - Bitcoin Errors
88 $2.7 Million On Offer For Pwnium 4
89 Facebook Pays Out Record Reward
90 Optimize Mining Bitcoin
91 Google Extends Patch Reward
92 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
93 Microsoft Extends Bounty
94 Microsoft and Facebook Launch Internet Bug Bounty Scheme
95 GOTCHA - No More Password Hacking
96 Google Offers Cash For Security Patches
97 Bounty Hunter Awarded $100,000
98 Stick Figure Guide To AES Encryption
99 Facebook Refuses Bounty, Internet Raises Over $10K
100 Public Key Cryptography Set To Fail In Five Years
101 Android Security Hole More Stupid Error Than Defect
102 Microsoft Offers $100,000 For Novel Exploits
103 Crypto Made Easy
104 Is Exploiting A Bug Hacking?
105 Open Source Homomorphic Cryptography
106 Another Java 7 Security Flaw
107 Oracle Releases Java Critical Patch Updates
108 Oracle Patches 86 Flaws in Database and Enterprise Products
109 Java Still Insecure Warns Homeland Security
110 25 GPUs Crack Passwords In Minutes
111 Java Is Top Attack Target
112 Hackers Target SQL Injection
113 Smartphone Apps Track Users Even When Off
114 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
115 Oracle Login Weakness
116 Frankenstein - Stitching Code Bodies Together To Hide Malware
117 Google Announces More Cash For Security Bugs
118 ROP Mitigations Bypassed
119 BlueHat Prizes Awarded
120 Cartoon - Digital Rights or Wrongs?
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2018 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.