Title Filter     Display # 
# Article Title
41 ShellShock - Yet Another Code Injection Vulnerability
42 The Canvas Fingerprint - How?
43 Cat Photos - A Potential Security Risk?
44 Hijacking Chromecast Is Easy
45 Bitcoin Isn't As Anonymous As You Might Hope
46 Cryptol Version 2 Released
47 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
48 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
49 Heartbleed - The Programmer's View
50 Facebook ThreatData
51 MozDef - Mozilla's Self Defence Kit
52 Record Payouts At Hacking Contests
53 The True Cost Of Bugs - Bitcoin Errors
54 $2.7 Million On Offer For Pwnium 4
55 Facebook Pays Out Record Reward
56 Optimize Mining Bitcoin
57 Google Extends Patch Reward
58 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
59 Microsoft Extends Bounty
60 Microsoft and Facebook Launch Internet Bug Bounty Scheme
61 GOTCHA - No More Password Hacking
62 Google Offers Cash For Security Patches
63 Bounty Hunter Awarded $100,000
64 Stick Figure Guide To AES Encryption
65 Facebook Refuses Bounty, Internet Raises Over $10K
66 Public Key Cryptography Set To Fail In Five Years
67 Android Security Hole More Stupid Error Than Defect
68 Microsoft Offers $100,000 For Novel Exploits
69 Crypto Made Easy
70 Is Exploiting A Bug Hacking?
71 Open Source Homomorphic Cryptography
72 Another Java 7 Security Flaw
73 Oracle Releases Java Critical Patch Updates
74 Oracle Patches 86 Flaws in Database and Enterprise Products
75 Java Still Insecure Warns Homeland Security
76 25 GPUs Crack Passwords In Minutes
77 Java Is Top Attack Target
78 Hackers Target SQL Injection
79 Smartphone Apps Track Users Even When Off
80 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
81 Oracle Login Weakness
82 Frankenstein - Stitching Code Bodies Together To Hide Malware
83 Google Announces More Cash For Security Bugs
84 ROP Mitigations Bypassed
85 BlueHat Prizes Awarded
86 Cartoon - Digital Rights or Wrongs?
87 Irises Change Over Time - Problem for Biometric Testing
88 Siri a Security Risk for IBM
89 A Short History of Hacking
90 Chrome, IE and Firefox Hacked
91 Inside Stuxnet
92 Chrome Hacked Twice at CanSecWest
93 FSF Opposes Restricted Boot
94 Google Offers $1 million for Chrome Hack
95 Kinect The Ultimate Security Device
96 Facebook's White Hat VISA Card
97 Print Me If You Dare - the Rise of Printer Malware
98 Quick action to patch ASP.NET vulnerability
99 The Computer Science of Insecurity
100 Cyber Attacks and Holidays
101 Planes are Unix hosts waiting to be hacked
102 Security by obscurity - a new theory
103 When cookies leak data
104 Search the world's smartphone photos
105 CIA/NSA want a photo location finder
106 Zodiac Killer code cracked? Cryptography at its worst
107 Microsoft releases source code for low-level WiFi
108 Passcodes prove predictable
109 Bitcoin still standing - but panic takes over
110 Audio CAPTCHA easily cracked
111 Cracking a Skype call using phonemes
112 Disk encryption made secure by amnesia
113 Hiding data in disk fragmentation
114 Cracking Stuxnet - a beginner's guide
115 GPS spoofing the new game in town
116 Chrome Safe In Pwn2Own Contest
117 iPhone passwords hacked in six minutes
118 Set a smartphone to hack a PC
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2016 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.