Security
Security
Title Filter     Display # 
# Article Title
21 Hack A Chromebook for $100,000
22 Pwn2Own 2016 - The Results
23 Hacksplaining - Learn Through Hacking
24 Hack The Pentagon
25 Vulnerability Revealed In GNU C Library
26 Identifying Programmers From Executable Binaries
27 Teenage Programmer Equals Cyber Criminal
28 Let's Encrypt Now In Public Beta
29 State of Software Security
30 Coordinated Cyber Attack on Greek Banks
31 The Smartwatch Spy
32 Firefox, Chrome & Opera Block Access To Routers
33 How The Jeep Was Hacked
34 Microsoft Doubles Bounty Payouts
35 Your Phone's Battery Leaks - Your Id That Is
36 RC4 Stream Cypher - 75 Hours To Crack
37 Million Air Miles Bounty Awarded
38 New Android Bug Bounty Scheme
39 Navy Solicits Vulnerabilities
40 Mozilla Increases Bug Bounty
41 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
42 Software Quality Blamed For Airbus Crash
43 Earn United Airlines Award Miles For Finding Bugs
44 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
45 Microsoft Expands Bounty Programs
46 How Secure Is Android? Very Secure
47 GitHub Under DDoS Attack
48 Largest Payout Ever At Pwn2Own 2015
49 Yahoo's New Disposable Passwords
50 Rowhammer - Changing Memory Without Accessing It
51 All Change For Pwnium V
52 WebRTC Leaks Local IP Addresses
53 NTP The Latest Open Source Security Problem
54 Upgrade Git Client To Avoid Vulnerability
55 What Does The NSA Think Of Cryptographers?
56 Double Rewards For Finding Bugs In Facebook Ads Code
57 Poodle Is A Very Different Sort Of Security Breach
58 Google Increases Maximum Bounty For Chrome Bugs
59 New Online Services Bug Bounty Program
60 ShellShock - Yet Another Code Injection Vulnerability
61 The Canvas Fingerprint - How?
62 Cat Photos - A Potential Security Risk?
63 Hijacking Chromecast Is Easy
64 Bitcoin Isn't As Anonymous As You Might Hope
65 Cryptol Version 2 Released
66 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
67 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
68 Heartbleed - The Programmer's View
69 Facebook ThreatData
70 MozDef - Mozilla's Self Defence Kit
71 Record Payouts At Hacking Contests
72 The True Cost Of Bugs - Bitcoin Errors
73 $2.7 Million On Offer For Pwnium 4
74 Facebook Pays Out Record Reward
75 Optimize Mining Bitcoin
76 Google Extends Patch Reward
77 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
78 Microsoft Extends Bounty
79 Microsoft and Facebook Launch Internet Bug Bounty Scheme
80 GOTCHA - No More Password Hacking
81 Google Offers Cash For Security Patches
82 Bounty Hunter Awarded $100,000
83 Stick Figure Guide To AES Encryption
84 Facebook Refuses Bounty, Internet Raises Over $10K
85 Public Key Cryptography Set To Fail In Five Years
86 Android Security Hole More Stupid Error Than Defect
87 Microsoft Offers $100,000 For Novel Exploits
88 Crypto Made Easy
89 Is Exploiting A Bug Hacking?
90 Open Source Homomorphic Cryptography
91 Another Java 7 Security Flaw
92 Oracle Releases Java Critical Patch Updates
93 Oracle Patches 86 Flaws in Database and Enterprise Products
94 Java Still Insecure Warns Homeland Security
95 25 GPUs Crack Passwords In Minutes
96 Java Is Top Attack Target
97 Hackers Target SQL Injection
98 Smartphone Apps Track Users Even When Off
99 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
100 Oracle Login Weakness
101 Frankenstein - Stitching Code Bodies Together To Hide Malware
102 Google Announces More Cash For Security Bugs
103 ROP Mitigations Bypassed
104 BlueHat Prizes Awarded
105 Cartoon - Digital Rights or Wrongs?
106 Irises Change Over Time - Problem for Biometric Testing
107 Siri a Security Risk for IBM
108 A Short History of Hacking
109 Chrome, IE and Firefox Hacked
110 Inside Stuxnet
111 Chrome Hacked Twice at CanSecWest
112 FSF Opposes Restricted Boot
113 Google Offers $1 million for Chrome Hack
114 Kinect The Ultimate Security Device
115 Facebook's White Hat VISA Card
116 Print Me If You Dare - the Rise of Printer Malware
117 Quick action to patch ASP.NET vulnerability
118 The Computer Science of Insecurity
119 Cyber Attacks and Holidays
120 Planes are Unix hosts waiting to be hacked
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
RSS feed of news items only
I Programmer News
Copyright © 2017 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.