Security
Security
Title Filter     Display # 
# Article Title
1 Intel Extends Bug Bounty Program
2 Levchin Prize for Real-World Cryptography
3 How Spectre Works
4 How Meltdown Works
5 Bug Bounty Bonanza
6 I Know Who You Are By The Way You Take A Corner
7 Stack Overflow Considered Harmful?
8 Samsung Bug Bounty Program
9 Fluid Passwords - Never The Same Password
10 Hacking Alexa By Whispering In Her Ear
11 More Cash For Internet Bug Bounty
12 Wireshark 2.4 Increases Protocol Coverage
13 Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
14 Google Capture the Flag 2017
15 EU Cookie Law Is A Flop
16 Microsoft Edge Falls Victim At Pwn2Own
17 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
18 Get Ready for Expanded Pwn2Own 2017
19 //No Comment - Let's Encrypt, IoT Security & Obfuscation
20 Cure53 XSSMas Hacking Challenge 2016 Underway
21 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
22 Microsoft Launches Cloud Fuzzing Service
23 Microsoft Bug Bounty Extends Scope
24 Your Android Could Leak Data Via USB Charging
25 Airship, a truly secure PHP CMS
26 Can AI Change the Face of Cyber Security?
27 Mayhem Wins DARPA Cyber Grand Challenge
28 Crypto 101 - A Free Ebook
29 SilentKeys A Privacy Aware Keyboard
30 Google Increases Android Bug Rewards
31 XSS Hunter For Pentesting
32 Anonymous Operation Icarus Hits Bank Sites
33 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
34 Hack A Chromebook for $100,000
35 Pwn2Own 2016 - The Results
36 Hacksplaining - Learn Through Hacking
37 Hack The Pentagon
38 Vulnerability Revealed In GNU C Library
39 Identifying Programmers From Executable Binaries
40 Teenage Programmer Equals Cyber Criminal
41 Let's Encrypt Now In Public Beta
42 State of Software Security
43 Coordinated Cyber Attack on Greek Banks
44 The Smartwatch Spy
45 Firefox, Chrome & Opera Block Access To Routers
46 How The Jeep Was Hacked
47 Microsoft Doubles Bounty Payouts
48 Your Phone's Battery Leaks - Your Id That Is
49 RC4 Stream Cypher - 75 Hours To Crack
50 Million Air Miles Bounty Awarded
51 New Android Bug Bounty Scheme
52 Navy Solicits Vulnerabilities
53 Mozilla Increases Bug Bounty
54 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
55 Software Quality Blamed For Airbus Crash
56 Earn United Airlines Award Miles For Finding Bugs
57 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
58 Microsoft Expands Bounty Programs
59 How Secure Is Android? Very Secure
60 GitHub Under DDoS Attack
61 Largest Payout Ever At Pwn2Own 2015
62 Yahoo's New Disposable Passwords
63 Rowhammer - Changing Memory Without Accessing It
64 All Change For Pwnium V
65 WebRTC Leaks Local IP Addresses
66 NTP The Latest Open Source Security Problem
67 Upgrade Git Client To Avoid Vulnerability
68 What Does The NSA Think Of Cryptographers?
69 Double Rewards For Finding Bugs In Facebook Ads Code
70 Poodle Is A Very Different Sort Of Security Breach
71 Google Increases Maximum Bounty For Chrome Bugs
72 New Online Services Bug Bounty Program
73 ShellShock - Yet Another Code Injection Vulnerability
74 The Canvas Fingerprint - How?
75 Cat Photos - A Potential Security Risk?
76 Hijacking Chromecast Is Easy
77 Bitcoin Isn't As Anonymous As You Might Hope
78 Cryptol Version 2 Released
79 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
80 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
81 Heartbleed - The Programmer's View
82 Facebook ThreatData
83 MozDef - Mozilla's Self Defence Kit
84 Record Payouts At Hacking Contests
85 The True Cost Of Bugs - Bitcoin Errors
86 $2.7 Million On Offer For Pwnium 4
87 Facebook Pays Out Record Reward
88 Optimize Mining Bitcoin
89 Google Extends Patch Reward
90 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
91 Microsoft Extends Bounty
92 Microsoft and Facebook Launch Internet Bug Bounty Scheme
93 GOTCHA - No More Password Hacking
94 Google Offers Cash For Security Patches
95 Bounty Hunter Awarded $100,000
96 Stick Figure Guide To AES Encryption
97 Facebook Refuses Bounty, Internet Raises Over $10K
98 Public Key Cryptography Set To Fail In Five Years
99 Android Security Hole More Stupid Error Than Defect
100 Microsoft Offers $100,000 For Novel Exploits
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
Banner
RSS feed of news items only
I Programmer News
Copyright © 2018 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.