Security
Security
Title Filter     Display # 
# Article Title
21 Identifying Programmers From Executable Binaries
22 Teenage Programmer Equals Cyber Criminal
23 Let's Encrypt Now In Public Beta
24 State of Software Security
25 Coordinated Cyber Attack on Greek Banks
26 The Smartwatch Spy
27 Firefox, Chrome & Opera Block Access To Routers
28 How The Jeep Was Hacked
29 Microsoft Doubles Bounty Payouts
30 Your Phone's Battery Leaks - Your Id That Is
31 RC4 Stream Cypher - 75 Hours To Crack
32 Million Air Miles Bounty Awarded
33 New Android Bug Bounty Scheme
34 Navy Solicits Vulnerabilities
35 Mozilla Increases Bug Bounty
36 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
37 Software Quality Blamed For Airbus Crash
38 Earn United Airlines Award Miles For Finding Bugs
39 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
40 Microsoft Expands Bounty Programs
41 How Secure Is Android? Very Secure
42 GitHub Under DDoS Attack
43 Largest Payout Ever At Pwn2Own 2015
44 Yahoo's New Disposable Passwords
45 Rowhammer - Changing Memory Without Accessing It
46 All Change For Pwnium V
47 WebRTC Leaks Local IP Addresses
48 NTP The Latest Open Source Security Problem
49 Upgrade Git Client To Avoid Vulnerability
50 What Does The NSA Think Of Cryptographers?
51 Double Rewards For Finding Bugs In Facebook Ads Code
52 Poodle Is A Very Different Sort Of Security Breach
53 Google Increases Maximum Bounty For Chrome Bugs
54 New Online Services Bug Bounty Program
55 ShellShock - Yet Another Code Injection Vulnerability
56 The Canvas Fingerprint - How?
57 Cat Photos - A Potential Security Risk?
58 Hijacking Chromecast Is Easy
59 Bitcoin Isn't As Anonymous As You Might Hope
60 Cryptol Version 2 Released
61 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
62 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
63 Heartbleed - The Programmer's View
64 Facebook ThreatData
65 MozDef - Mozilla's Self Defence Kit
66 Record Payouts At Hacking Contests
67 The True Cost Of Bugs - Bitcoin Errors
68 $2.7 Million On Offer For Pwnium 4
69 Facebook Pays Out Record Reward
70 Optimize Mining Bitcoin
71 Google Extends Patch Reward
72 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
73 Microsoft Extends Bounty
74 Microsoft and Facebook Launch Internet Bug Bounty Scheme
75 GOTCHA - No More Password Hacking
76 Google Offers Cash For Security Patches
77 Bounty Hunter Awarded $100,000
78 Stick Figure Guide To AES Encryption
79 Facebook Refuses Bounty, Internet Raises Over $10K
80 Public Key Cryptography Set To Fail In Five Years
81 Android Security Hole More Stupid Error Than Defect
82 Microsoft Offers $100,000 For Novel Exploits
83 Crypto Made Easy
84 Is Exploiting A Bug Hacking?
85 Open Source Homomorphic Cryptography
86 Another Java 7 Security Flaw
87 Oracle Releases Java Critical Patch Updates
88 Oracle Patches 86 Flaws in Database and Enterprise Products
89 Java Still Insecure Warns Homeland Security
90 25 GPUs Crack Passwords In Minutes
91 Java Is Top Attack Target
92 Hackers Target SQL Injection
93 Smartphone Apps Track Users Even When Off
94 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
95 Oracle Login Weakness
96 Frankenstein - Stitching Code Bodies Together To Hide Malware
97 Google Announces More Cash For Security Bugs
98 ROP Mitigations Bypassed
99 BlueHat Prizes Awarded
100 Cartoon - Digital Rights or Wrongs?
101 Irises Change Over Time - Problem for Biometric Testing
102 Siri a Security Risk for IBM
103 A Short History of Hacking
104 Chrome, IE and Firefox Hacked
105 Inside Stuxnet
106 Chrome Hacked Twice at CanSecWest
107 FSF Opposes Restricted Boot
108 Google Offers $1 million for Chrome Hack
109 Kinect The Ultimate Security Device
110 Facebook's White Hat VISA Card
111 Print Me If You Dare - the Rise of Printer Malware
112 Quick action to patch ASP.NET vulnerability
113 The Computer Science of Insecurity
114 Cyber Attacks and Holidays
115 Planes are Unix hosts waiting to be hacked
116 Security by obscurity - a new theory
117 When cookies leak data
118 Search the world's smartphone photos
119 CIA/NSA want a photo location finder
120 Zodiac Killer code cracked? Cryptography at its worst
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
Banner
Banner
RSS feed of news items only
I Programmer News
Copyright © 2017 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.
Banner