Security
Security
Title Filter     Display # 
# Article Title
41 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
42 Software Quality Blamed For Airbus Crash
43 Earn United Airlines Award Miles For Finding Bugs
44 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
45 Microsoft Expands Bounty Programs
46 How Secure Is Android? Very Secure
47 GitHub Under DDoS Attack
48 Largest Payout Ever At Pwn2Own 2015
49 Yahoo's New Disposable Passwords
50 Rowhammer - Changing Memory Without Accessing It
51 All Change For Pwnium V
52 WebRTC Leaks Local IP Addresses
53 NTP The Latest Open Source Security Problem
54 Upgrade Git Client To Avoid Vulnerability
55 What Does The NSA Think Of Cryptographers?
56 Double Rewards For Finding Bugs In Facebook Ads Code
57 Poodle Is A Very Different Sort Of Security Breach
58 Google Increases Maximum Bounty For Chrome Bugs
59 New Online Services Bug Bounty Program
60 ShellShock - Yet Another Code Injection Vulnerability
61 The Canvas Fingerprint - How?
62 Cat Photos - A Potential Security Risk?
63 Hijacking Chromecast Is Easy
64 Bitcoin Isn't As Anonymous As You Might Hope
65 Cryptol Version 2 Released
66 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
67 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
68 Heartbleed - The Programmer's View
69 Facebook ThreatData
70 MozDef - Mozilla's Self Defence Kit
71 Record Payouts At Hacking Contests
72 The True Cost Of Bugs - Bitcoin Errors
73 $2.7 Million On Offer For Pwnium 4
74 Facebook Pays Out Record Reward
75 Optimize Mining Bitcoin
76 Google Extends Patch Reward
77 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
78 Microsoft Extends Bounty
79 Microsoft and Facebook Launch Internet Bug Bounty Scheme
80 GOTCHA - No More Password Hacking
81 Google Offers Cash For Security Patches
82 Bounty Hunter Awarded $100,000
83 Stick Figure Guide To AES Encryption
84 Facebook Refuses Bounty, Internet Raises Over $10K
85 Public Key Cryptography Set To Fail In Five Years
86 Android Security Hole More Stupid Error Than Defect
87 Microsoft Offers $100,000 For Novel Exploits
88 Crypto Made Easy
89 Is Exploiting A Bug Hacking?
90 Open Source Homomorphic Cryptography
91 Another Java 7 Security Flaw
92 Oracle Releases Java Critical Patch Updates
93 Oracle Patches 86 Flaws in Database and Enterprise Products
94 Java Still Insecure Warns Homeland Security
95 25 GPUs Crack Passwords In Minutes
96 Java Is Top Attack Target
97 Hackers Target SQL Injection
98 Smartphone Apps Track Users Even When Off
99 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
100 Oracle Login Weakness
101 Frankenstein - Stitching Code Bodies Together To Hide Malware
102 Google Announces More Cash For Security Bugs
103 ROP Mitigations Bypassed
104 BlueHat Prizes Awarded
105 Cartoon - Digital Rights or Wrongs?
106 Irises Change Over Time - Problem for Biometric Testing
107 Siri a Security Risk for IBM
108 A Short History of Hacking
109 Chrome, IE and Firefox Hacked
110 Inside Stuxnet
111 Chrome Hacked Twice at CanSecWest
112 FSF Opposes Restricted Boot
113 Google Offers $1 million for Chrome Hack
114 Kinect The Ultimate Security Device
115 Facebook's White Hat VISA Card
116 Print Me If You Dare - the Rise of Printer Malware
117 Quick action to patch ASP.NET vulnerability
118 The Computer Science of Insecurity
119 Cyber Attacks and Holidays
120 Planes are Unix hosts waiting to be hacked
121 Security by obscurity - a new theory
122 When cookies leak data
123 Search the world's smartphone photos
124 CIA/NSA want a photo location finder
125 Zodiac Killer code cracked? Cryptography at its worst
126 Microsoft releases source code for low-level WiFi
127 Passcodes prove predictable
128 Bitcoin still standing - but panic takes over
129 Audio CAPTCHA easily cracked
130 Cracking a Skype call using phonemes
131 Disk encryption made secure by amnesia
132 Hiding data in disk fragmentation
133 Cracking Stuxnet - a beginner's guide
134 GPS spoofing the new game in town
135 Chrome Safe In Pwn2Own Contest
136 iPhone passwords hacked in six minutes
137 Set a smartphone to hack a PC
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
Banner
Banner
RSS feed of news items only
I Programmer News
Copyright © 2017 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.