Title Filter     Display # 
# Article Title
21 How Secure Is Android? Very Secure
22 GitHub Under DDoS Attack
23 Largest Payout Ever At Pwn2Own 2015
24 Yahoo's New Disposable Passwords
25 Rowhammer - Changing Memory Without Accessing It
26 All Change For Pwnium V
27 WebRTC Leaks Local IP Addresses
28 NTP The Latest Open Source Security Problem
29 Upgrade Git Client To Avoid Vulnerability
30 What Does The NSA Think Of Cryptographers?
31 Double Rewards For Finding Bugs In Facebook Ads Code
32 Poodle Is A Very Different Sort Of Security Breach
33 Google Increases Maximum Bounty For Chrome Bugs
34 New Online Services Bug Bounty Program
35 ShellShock - Yet Another Code Injection Vulnerability
36 The Canvas Fingerprint - How?
37 Cat Photos - A Potential Security Risk?
38 Hijacking Chromecast Is Easy
39 Bitcoin Isn't As Anonymous As You Might Hope
40 Cryptol Version 2 Released
41 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
42 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
43 Heartbleed - The Programmer's View
44 Facebook ThreatData
45 MozDef - Mozilla's Self Defence Kit
46 Record Payouts At Hacking Contests
47 The True Cost Of Bugs - Bitcoin Errors
48 $2.7 Million On Offer For Pwnium 4
49 Facebook Pays Out Record Reward
50 Optimize Mining Bitcoin
51 Google Extends Patch Reward
52 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
53 Microsoft Extends Bounty
54 Microsoft and Facebook Launch Internet Bug Bounty Scheme
55 GOTCHA - No More Password Hacking
56 Google Offers Cash For Security Patches
57 Bounty Hunter Awarded $100,000
58 Stick Figure Guide To AES Encryption
59 Facebook Refuses Bounty, Internet Raises Over $10K
60 Public Key Cryptography Set To Fail In Five Years
61 Android Security Hole More Stupid Error Than Defect
62 Microsoft Offers $100,000 For Novel Exploits
63 Crypto Made Easy
64 Is Exploiting A Bug Hacking?
65 Open Source Homomorphic Cryptography
66 Another Java 7 Security Flaw
67 Oracle Releases Java Critical Patch Updates
68 Oracle Patches 86 Flaws in Database and Enterprise Products
69 Java Still Insecure Warns Homeland Security
70 25 GPUs Crack Passwords In Minutes
71 Java Is Top Attack Target
72 Hackers Target SQL Injection
73 Smartphone Apps Track Users Even When Off
74 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
75 Oracle Login Weakness
76 Frankenstein - Stitching Code Bodies Together To Hide Malware
77 Google Announces More Cash For Security Bugs
78 ROP Mitigations Bypassed
79 BlueHat Prizes Awarded
80 Cartoon - Digital Rights or Wrongs?
81 Irises Change Over Time - Problem for Biometric Testing
82 Siri a Security Risk for IBM
83 A Short History of Hacking
84 Chrome, IE and Firefox Hacked
85 Inside Stuxnet
86 Chrome Hacked Twice at CanSecWest
87 FSF Opposes Restricted Boot
88 Google Offers $1 million for Chrome Hack
89 Kinect The Ultimate Security Device
90 Facebook's White Hat VISA Card
91 Print Me If You Dare - the Rise of Printer Malware
92 Quick action to patch ASP.NET vulnerability
93 The Computer Science of Insecurity
94 Cyber Attacks and Holidays
95 Planes are Unix hosts waiting to be hacked
96 Security by obscurity - a new theory
97 When cookies leak data
98 Search the world's smartphone photos
99 CIA/NSA want a photo location finder
100 Zodiac Killer code cracked? Cryptography at its worst
101 Microsoft releases source code for low-level WiFi
102 Passcodes prove predictable
103 Bitcoin still standing - but panic takes over
104 Audio CAPTCHA easily cracked
105 Cracking a Skype call using phonemes
106 Disk encryption made secure by amnesia
107 Hiding data in disk fragmentation
108 Cracking Stuxnet - a beginner's guide
109 GPS spoofing the new game in town
110 iPhone passwords hacked in six minutes
111 Set a smartphone to hack a PC
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2016 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.