Title Filter     Display # 
# Article Title
1 Microsoft Launches Cloud Fuzzing Service
2 Microsoft Bug Bounty Extends Scope
3 Your Android Could Leak Data Via USB Charging
4 Airship, a truly secure PHP CMS
5 Can AI Change the Face of Cyber Security?
6 Mayhem Wins DARPA Cyber Grand Challenge
7 Crypto 101 - A Free Ebook
8 SilentKeys A Privacy Aware Keyboard
9 Google Increases Android Bug Rewards
10 XSS Hunter For Pentesting
11 Anonymous Operation Icarus Hits Bank Sites
12 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
13 Hack A Chromebook for $100,000
14 Pwn2Own 2016 - The Results
15 Hacksplaining - Learn Through Hacking
16 Hack The Pentagon
17 Vulnerability Revealed In GNU C Library
18 Identifying Programmers From Executable Binaries
19 Teenage Programmer Equals Cyber Criminal
20 Let's Encrypt Now In Public Beta
21 State of Software Security
22 Coordinated Cyber Attack on Greek Banks
23 The Smartwatch Spy
24 Firefox, Chrome & Opera Block Access To Routers
25 How The Jeep Was Hacked
26 Microsoft Doubles Bounty Payouts
27 Your Phone's Battery Leaks - Your Id That Is
28 RC4 Stream Cypher - 75 Hours To Crack
29 Million Air Miles Bounty Awarded
30 New Android Bug Bounty Scheme
31 Navy Solicits Vulnerabilities
32 Mozilla Increases Bug Bounty
33 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
34 Software Quality Blamed For Airbus Crash
35 Earn United Airlines Award Miles For Finding Bugs
36 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
37 Microsoft Expands Bounty Programs
38 How Secure Is Android? Very Secure
39 GitHub Under DDoS Attack
40 Largest Payout Ever At Pwn2Own 2015
41 Yahoo's New Disposable Passwords
42 Rowhammer - Changing Memory Without Accessing It
43 All Change For Pwnium V
44 WebRTC Leaks Local IP Addresses
45 NTP The Latest Open Source Security Problem
46 Upgrade Git Client To Avoid Vulnerability
47 What Does The NSA Think Of Cryptographers?
48 Double Rewards For Finding Bugs In Facebook Ads Code
49 Poodle Is A Very Different Sort Of Security Breach
50 Google Increases Maximum Bounty For Chrome Bugs
51 New Online Services Bug Bounty Program
52 ShellShock - Yet Another Code Injection Vulnerability
53 The Canvas Fingerprint - How?
54 Cat Photos - A Potential Security Risk?
55 Hijacking Chromecast Is Easy
56 Bitcoin Isn't As Anonymous As You Might Hope
57 Cryptol Version 2 Released
58 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
59 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
60 Heartbleed - The Programmer's View
61 Facebook ThreatData
62 MozDef - Mozilla's Self Defence Kit
63 Record Payouts At Hacking Contests
64 The True Cost Of Bugs - Bitcoin Errors
65 $2.7 Million On Offer For Pwnium 4
66 Facebook Pays Out Record Reward
67 Optimize Mining Bitcoin
68 Google Extends Patch Reward
69 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
70 Microsoft Extends Bounty
71 Microsoft and Facebook Launch Internet Bug Bounty Scheme
72 GOTCHA - No More Password Hacking
73 Google Offers Cash For Security Patches
74 Bounty Hunter Awarded $100,000
75 Stick Figure Guide To AES Encryption
76 Facebook Refuses Bounty, Internet Raises Over $10K
77 Public Key Cryptography Set To Fail In Five Years
78 Android Security Hole More Stupid Error Than Defect
79 Microsoft Offers $100,000 For Novel Exploits
80 Crypto Made Easy
81 Is Exploiting A Bug Hacking?
82 Open Source Homomorphic Cryptography
83 Another Java 7 Security Flaw
84 Oracle Releases Java Critical Patch Updates
85 Oracle Patches 86 Flaws in Database and Enterprise Products
86 Java Still Insecure Warns Homeland Security
87 25 GPUs Crack Passwords In Minutes
88 Java Is Top Attack Target
89 Hackers Target SQL Injection
90 Smartphone Apps Track Users Even When Off
91 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
92 Oracle Login Weakness
93 Frankenstein - Stitching Code Bodies Together To Hide Malware
94 Google Announces More Cash For Security Bugs
95 ROP Mitigations Bypassed
96 BlueHat Prizes Awarded
97 Cartoon - Digital Rights or Wrongs?
98 Irises Change Over Time - Problem for Biometric Testing
99 Siri a Security Risk for IBM
100 A Short History of Hacking
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2016 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.