Security
Security
Title Filter     Display # 
# Article Title
21 How The Jeep Was Hacked
22 Microsoft Doubles Bounty Payouts
23 Your Phone's Battery Leaks - Your Id That Is
24 RC4 Stream Cypher - 75 Hours To Crack
25 Million Air Miles Bounty Awarded
26 New Android Bug Bounty Scheme
27 Navy Solicits Vulnerabilities
28 Mozilla Increases Bug Bounty
29 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
30 Software Quality Blamed For Airbus Crash
31 Earn United Airlines Award Miles For Finding Bugs
32 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
33 Microsoft Expands Bounty Programs
34 How Secure Is Android? Very Secure
35 GitHub Under DDoS Attack
36 Largest Payout Ever At Pwn2Own 2015
37 Yahoo's New Disposable Passwords
38 Rowhammer - Changing Memory Without Accessing It
39 All Change For Pwnium V
40 WebRTC Leaks Local IP Addresses
41 NTP The Latest Open Source Security Problem
42 Upgrade Git Client To Avoid Vulnerability
43 What Does The NSA Think Of Cryptographers?
44 Double Rewards For Finding Bugs In Facebook Ads Code
45 Poodle Is A Very Different Sort Of Security Breach
46 Google Increases Maximum Bounty For Chrome Bugs
47 New Online Services Bug Bounty Program
48 ShellShock - Yet Another Code Injection Vulnerability
49 The Canvas Fingerprint - How?
50 Cat Photos - A Potential Security Risk?
51 Hijacking Chromecast Is Easy
52 Bitcoin Isn't As Anonymous As You Might Hope
53 Cryptol Version 2 Released
54 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
55 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
56 Heartbleed - The Programmer's View
57 Facebook ThreatData
58 MozDef - Mozilla's Self Defence Kit
59 Record Payouts At Hacking Contests
60 The True Cost Of Bugs - Bitcoin Errors
61 $2.7 Million On Offer For Pwnium 4
62 Facebook Pays Out Record Reward
63 Optimize Mining Bitcoin
64 Google Extends Patch Reward
65 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
66 Microsoft Extends Bounty
67 Microsoft and Facebook Launch Internet Bug Bounty Scheme
68 GOTCHA - No More Password Hacking
69 Google Offers Cash For Security Patches
70 Bounty Hunter Awarded $100,000
71 Stick Figure Guide To AES Encryption
72 Facebook Refuses Bounty, Internet Raises Over $10K
73 Public Key Cryptography Set To Fail In Five Years
74 Android Security Hole More Stupid Error Than Defect
75 Microsoft Offers $100,000 For Novel Exploits
76 Crypto Made Easy
77 Is Exploiting A Bug Hacking?
78 Open Source Homomorphic Cryptography
79 Another Java 7 Security Flaw
80 Oracle Releases Java Critical Patch Updates
81 Oracle Patches 86 Flaws in Database and Enterprise Products
82 Java Still Insecure Warns Homeland Security
83 25 GPUs Crack Passwords In Minutes
84 Java Is Top Attack Target
85 Hackers Target SQL Injection
86 Smartphone Apps Track Users Even When Off
87 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
88 Oracle Login Weakness
89 Frankenstein - Stitching Code Bodies Together To Hide Malware
90 Google Announces More Cash For Security Bugs
91 ROP Mitigations Bypassed
92 BlueHat Prizes Awarded
93 Cartoon - Digital Rights or Wrongs?
94 Irises Change Over Time - Problem for Biometric Testing
95 Siri a Security Risk for IBM
96 A Short History of Hacking
97 Chrome, IE and Firefox Hacked
98 Inside Stuxnet
99 Chrome Hacked Twice at CanSecWest
100 FSF Opposes Restricted Boot
101 Google Offers $1 million for Chrome Hack
102 Kinect The Ultimate Security Device
103 Facebook's White Hat VISA Card
104 Print Me If You Dare - the Rise of Printer Malware
105 Quick action to patch ASP.NET vulnerability
106 The Computer Science of Insecurity
107 Cyber Attacks and Holidays
108 Planes are Unix hosts waiting to be hacked
109 Security by obscurity - a new theory
110 When cookies leak data
111 Search the world's smartphone photos
112 CIA/NSA want a photo location finder
113 Zodiac Killer code cracked? Cryptography at its worst
114 Microsoft releases source code for low-level WiFi
115 Passcodes prove predictable
116 Bitcoin still standing - but panic takes over
117 Audio CAPTCHA easily cracked
118 Cracking a Skype call using phonemes
119 Disk encryption made secure by amnesia
120 Hiding data in disk fragmentation
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
Banner
RSS feed of news items only
I Programmer News
Copyright © 2016 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.