Title Filter     Display # 
# Article Title
41 Yahoo's New Disposable Passwords
42 Rowhammer - Changing Memory Without Accessing It
43 All Change For Pwnium V
44 WebRTC Leaks Local IP Addresses
45 NTP The Latest Open Source Security Problem
46 Upgrade Git Client To Avoid Vulnerability
47 What Does The NSA Think Of Cryptographers?
48 Double Rewards For Finding Bugs In Facebook Ads Code
49 Poodle Is A Very Different Sort Of Security Breach
50 Google Increases Maximum Bounty For Chrome Bugs
51 New Online Services Bug Bounty Program
52 ShellShock - Yet Another Code Injection Vulnerability
53 The Canvas Fingerprint - How?
54 Cat Photos - A Potential Security Risk?
55 Hijacking Chromecast Is Easy
56 Bitcoin Isn't As Anonymous As You Might Hope
57 Cryptol Version 2 Released
58 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
59 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
60 Heartbleed - The Programmer's View
61 Facebook ThreatData
62 MozDef - Mozilla's Self Defence Kit
63 Record Payouts At Hacking Contests
64 The True Cost Of Bugs - Bitcoin Errors
65 $2.7 Million On Offer For Pwnium 4
66 Facebook Pays Out Record Reward
67 Optimize Mining Bitcoin
68 Google Extends Patch Reward
69 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
70 Microsoft Extends Bounty
71 Microsoft and Facebook Launch Internet Bug Bounty Scheme
72 GOTCHA - No More Password Hacking
73 Google Offers Cash For Security Patches
74 Bounty Hunter Awarded $100,000
75 Stick Figure Guide To AES Encryption
76 Facebook Refuses Bounty, Internet Raises Over $10K
77 Public Key Cryptography Set To Fail In Five Years
78 Android Security Hole More Stupid Error Than Defect
79 Microsoft Offers $100,000 For Novel Exploits
80 Crypto Made Easy
81 Is Exploiting A Bug Hacking?
82 Open Source Homomorphic Cryptography
83 Another Java 7 Security Flaw
84 Oracle Releases Java Critical Patch Updates
85 Oracle Patches 86 Flaws in Database and Enterprise Products
86 Java Still Insecure Warns Homeland Security
87 25 GPUs Crack Passwords In Minutes
88 Java Is Top Attack Target
89 Hackers Target SQL Injection
90 Smartphone Apps Track Users Even When Off
91 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
92 Oracle Login Weakness
93 Frankenstein - Stitching Code Bodies Together To Hide Malware
94 Google Announces More Cash For Security Bugs
95 ROP Mitigations Bypassed
96 BlueHat Prizes Awarded
97 Cartoon - Digital Rights or Wrongs?
98 Irises Change Over Time - Problem for Biometric Testing
99 Siri a Security Risk for IBM
100 A Short History of Hacking
101 Chrome, IE and Firefox Hacked
102 Inside Stuxnet
103 Chrome Hacked Twice at CanSecWest
104 FSF Opposes Restricted Boot
105 Google Offers $1 million for Chrome Hack
106 Kinect The Ultimate Security Device
107 Facebook's White Hat VISA Card
108 Print Me If You Dare - the Rise of Printer Malware
109 Quick action to patch ASP.NET vulnerability
110 The Computer Science of Insecurity
111 Cyber Attacks and Holidays
112 Planes are Unix hosts waiting to be hacked
113 Security by obscurity - a new theory
114 When cookies leak data
115 Search the world's smartphone photos
116 CIA/NSA want a photo location finder
117 Zodiac Killer code cracked? Cryptography at its worst
118 Microsoft releases source code for low-level WiFi
119 Passcodes prove predictable
120 Bitcoin still standing - but panic takes over
121 Audio CAPTCHA easily cracked
122 Cracking a Skype call using phonemes
123 Disk encryption made secure by amnesia
124 Hiding data in disk fragmentation
125 Cracking Stuxnet - a beginner's guide
126 GPS spoofing the new game in town
127 Chrome Safe In Pwn2Own Contest
128 iPhone passwords hacked in six minutes
129 Set a smartphone to hack a PC
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2016 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.