>
search
cog
I Programmer HOME
Toggle Navigation
Books
Book Reviews
Book Watch
Programmer's Bookshelf
Articles
The Core
Android
Artifical Intelligence
Python
Javascript
WPF Workings
Joomla
PHP
Theory
Silverlight
C#
Other Languages
Visual Basic
C/C++
Mobile
Database
ASP .NET
Hardware/IoT
Graphics/Imaging
UI/UX
Perl
WinRT
HTML/CSS
jQuery
Ruby
Security
Methodology & Testing
Cloud
DevOps
Java
Babbage's Bag
Projects
Programmer Puzzles
C#
C++
Java
JavaScript
Python
PHP
Sharpen Your Coding Skills
History
Machines
People
Software & computer languages
Swift's Spreadsheets
Finance
Personal
General
Professional Programmer
Accreditation & Training
I Programmer
Resources and Tools
I Programmer Weekly
eBooks
Stone Tapes
CodeBin
News
Register
About Us
Security
Title Filter
Display #
5
10
15
20
25
30
50
100
All
#
Article Title
61
GitHub Security Bug Bounty Milestones
62
Tricking The Tesla
63
Over $21 Million In Google Bug Bounty
64
Random Number Weakness Exposes Devices
65
Google Offers Bug Bounty Up to $1.5 Million
66
GitHub Buys Semmle, Becomes CVE Numbering Authority
67
Facebook Awards $100K Prize For Code Isolation Using MPKs
68
Bluetooth KNOB Attack
69
Kubernetes Security Audit Open Sourced
70
Google Releases Open Source Cryptographic Tool
71
Inputting Data Via Blinkenlights - Another Covert Channel
72
Boeing 737 MAX - Software Outsourcing Criticized
73
GitHub Adds New Code Security Features
74
Chrome Cryptocode Generator Revealed
75
OpenSSH Version 8.0 Released
76
Google Open Sources Sandboxing Tool
77
Counting Vulnerabilities In Open Source Projects and Programming Languages
78
Microsoft Partners With HackerOne On Bug Bounty
79
Tesla Model 3 Pwn2Own'd
80
Linux Foundation Launches Red Team Project
81
Mozilla Argues Australia's Encryption Busting Legislation Needs To be Repealed
82
Microsoft SEAL Cryptography .NET Wrapper Released
83
Google Says Spectre And Meltdown Are Too Difficult To Fix
84
GitHub Bounty Program Increases Rewards
85
Memory Safety Bugs Form 70 Percent Of Vulnerabilities
86
RSA Encryption Cracked By Careless Implementation
87
Pwn2Own Contest To Win A Tesla
88
NSA Will Release Free Reverse Engineering Tool
89
MS Cryptography Library Open Sourced
90
Don't Neglect Mobile App Security
91
Neural Networks Learn to Produce Random Numbers
92
Google Bans Obfuscated Code - Who's To Judge?
93
Tink Library Helps You Develop Secure Code
94
Cybercrime Security Forum Europe
95
Chaff Bugs Make Your Code More Secure
96
Sharpen Your Hacking Skills With CTFLearn
97
ONVIF Challenge Winners
98
Don't Neglect Open Source Security
99
Canada's RAND Immigration Lottery Not Random!
100
PowerHammer - Leaking Data Through The Power Line
101
GitHub Bug Bounty Program Expanded In Scope and Reward
102
Intel Extends Bug Bounty Program
103
Levchin Prize for Real-World Cryptography
104
How Spectre Works
105
How Meltdown Works
106
Bug Bounty Bonanza
107
I Know Who You Are By The Way You Take A Corner
108
Stack Overflow Considered Harmful?
109
Samsung Bug Bounty Program
110
Fluid Passwords - Never The Same Password
111
Hacking Alexa By Whispering In Her Ear
112
More Cash For Internet Bug Bounty
113
Wireshark 2.4 Increases Protocol Coverage
114
Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
115
Google Capture the Flag 2017
116
EU Cookie Law Is A Flop
117
Microsoft Edge Falls Victim At Pwn2Own
118
//No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
119
Get Ready for Expanded Pwn2Own 2017
120
//No Comment - Let's Encrypt, IoT Security & Obfuscation
121
Cure53 XSSMas Hacking Challenge 2016 Underway
122
Project Wycheproof Reveals Bugs In Popular Crypto Libraries
123
Microsoft Launches Cloud Fuzzing Service
124
Microsoft Bug Bounty Extends Scope
125
Your Android Could Leak Data Via USB Charging
126
Airship, a truly secure PHP CMS
127
Can AI Change the Face of Cyber Security?
128
Mayhem Wins DARPA Cyber Grand Challenge
129
Crypto 101 - A Free Ebook
130
SilentKeys A Privacy Aware Keyboard
131
Google Increases Android Bug Rewards
132
XSS Hunter For Pentesting
133
Anonymous Operation Icarus Hits Bank Sites
134
Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
135
Hack A Chromebook for $100,000
136
Pwn2Own 2016 - The Results
137
Hacksplaining - Learn Through Hacking
138
Hack The Pentagon
139
Vulnerability Revealed In GNU C Library
140
Identifying Programmers From Executable Binaries
141
Teenage Programmer Equals Cyber Criminal
142
Let's Encrypt Now In Public Beta
143
State of Software Security
144
Coordinated Cyber Attack on Greek Banks
145
The Smartwatch Spy
146
Firefox, Chrome & Opera Block Access To Routers
147
How The Jeep Was Hacked
148
Microsoft Doubles Bounty Payouts
149
Your Phone's Battery Leaks - Your Id That Is
150
RC4 Stream Cypher - 75 Hours To Crack
151
Million Air Miles Bounty Awarded
152
New Android Bug Bounty Scheme
153
Navy Solicits Vulnerabilities
154
Mozilla Increases Bug Bounty
155
LOGJAM - Can The NSA Break 1024-bit DHM Keys?
156
Software Quality Blamed For Airbus Crash
157
Earn United Airlines Award Miles For Finding Bugs
158
Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
159
Microsoft Expands Bounty Programs
160
How Secure Is Android? Very Secure
«
Start
Prev
1
2
3
Next
End
»
Page 1 of 3