>
search
cog
I Programmer HOME
Toggle Navigation
Books
Book Reviews
Book Watch
Programmer's Bookshelf
Articles
The Core
Android
Artifical Intelligence
Python
Javascript
WPF Workings
Joomla
PHP
Theory
Silverlight
C#
Other Languages
Visual Basic
C/C++
Mobile
Database
ASP .NET
Hardware/IoT
Graphics/Imaging
UI/UX
Perl
WinRT
HTML/CSS
jQuery
Ruby
Security
Methodology & Testing
Cloud
DevOps
Java
Babbage's Bag
Projects
Programmer Puzzles
C#
C++
Java
JavaScript
Python
PHP
Sharpen Your Coding Skills
History
Machines
People
Software & computer languages
Swift's Spreadsheets
Finance
Personal
General
Professional Programmer
Accreditation & Training
I Programmer
Resources and Tools
I Programmer Weekly
eBooks
Stone Tapes
CodeBin
News
Register
About Us
Security
Title Filter
Display #
5
10
15
20
25
30
50
100
All
#
Article Title
1
Mongobleed Being Actively Exploited
2
Apple Extends Bug Bounty Program
3
Google's New AI Bug Bounty Rewards
4
Astra API Security Platform
5
NIST Finalizes ‘Lightweight Cryptography’ Standard to Protect Small Devices
6
Edera Announces Hardened Runtime Security
7
A New Threat - Package Hallucination
8
GitHub Launches Secret Protection
9
Edera Protect Expands Security Model
10
GitHub Splits Advanced Security Into Separate Products
11
Software Security Report Finds Third Party Code Most Problematic
12
Apache Releases WSS4J 4.0
13
Patch Android Vulnerabilities With Google's Vanir
14
DryRun Announces Natural Language Code Policies
15
Edera Releases Open Source Container Benchmark And Scanner
16
NIST Password Guidelines - The Nine Commandments
17
Rust Foundation Report On Recent Initiatives
18
NIST Announces Post-Quantum Cryptographic Algorithms
19
APISEC Conference Sessions Now Available Online
20
CDN Serves Malware - 100,000 Polyfill Users At Risk
21
OpenSSF's Siren To Warn About OSS Vulnerabilities
22
RoboForm Hacked To Retrieve $3 Million BitCoin Wallet
23
Edgeless Systems Announces Continuum AI
24
White House Urges Memory Safe Software
25
CSS Test of Time Award 2023
26
Microsoft Launches Secure Future Initiative
27
Insights Into Software Supply Chain Security
28
OpenSSF Releases Malicious Packages Repository
29
Chepy - The Hacker's Toolbox
30
Appdome Launches Bot Detector
31
BitLocker Defeated Using Logic Analyser
32
Chainguard Announces AI Images Bundle
33
GitHub Bug Bounty Program Now With Swag
34
Chainguard's Enforce Platform Boosted With New Capabilities
35
Amazon Releases Verified Permissions
36
Appdome Adds GitLab Integration
37
Surveying Software Supply Chain Security
38
Security Flaws The Effects of Time and Language
39
NIST Selects Lightweight Crypto For The IoT
40
VS Code Extensions As Malware
41
Google Open Sources Image Blurring
42
Google Launches Free Vulnerability Scanner
43
GitHub Extends Secret Scanning For Free
44
Largest Ever Pwn2Own Contest
45
Traffic Light Security For IoT
46
Sigstore Reaches General Availability
47
Meta Identifies 400 Apps That Steal Logins
48
Rust Foundation Establishes Security Team
49
Constellation - The First Confidential Kubernetes
50
Learn To Protect Your APIs By Hacking Them
51
Code On Coin Cracked By 14 Year Old!
52
Protect The Software Supply Chain With Gitsign
53
FIDO Provides Security Without Passwords
54
GitHub Dependabot Now Warns Of Vulnerabilities
55
GitHub Advanced Security Adds Secret Scanning
56
JavaScript Prototype Vulnerabilities
57
Census II Lists Critical Application Libraries
58
Project Zero Reports Faster Bug Patching
59
GitHub Code Scanning Now Uses Machine Learning
60
New Initiative For Taking Open Source Software Security Seriously
61
European Union Will Pay For Finding Bugs In Open Source Software
62
ExpressVPN Offers $100K Bug Bounty
63
ARM Ships Morello Board - The Secure Hardware Of The Future
64
Latest Vulnerability Suggests Compilers Should Learn Unicode
65
The Ultimate Guide to Password Safety
66
TPM Security Easy To Defeat
67
Python3 Course For InfoSec Pros
68
Bug Busting With AWS
69
Google Open Sources Fully Homomorphic Encryption Transpiler
70
Open Source Insights Into The Software Supply Chain
71
New Spectre-Like Vulnerability - Is The Era Of Fast Clever Computers Over?
72
Microsoft Launches Apps Bug Bounty Program
73
DARPA Launches Plans For Fast FHE
74
Track Open Source Vulnerabilities With Google's OSV Database
75
Learn To Protect Against XS-Leaks
76
Veracode Reveals Security Flaws
77
Introduction to OAuth 2.0 and OpenID Connect
78
The Halt And Catch Fire Hack
79
Firefox Raises Bug Bounty Payouts
80
Play & Learn With CryptoHack
81
Sophos Open Sources Sandboxie
82
Power Cycle Your Boeing 787 To Keep It Flying
83
GitHub Security Bug Bounty Milestones
84
Tricking The Tesla
85
Over $21 Million In Google Bug Bounty
86
Random Number Weakness Exposes Devices
87
Google Offers Bug Bounty Up to $1.5 Million
88
GitHub Buys Semmle, Becomes CVE Numbering Authority
89
Facebook Awards $100K Prize For Code Isolation Using MPKs
90
Bluetooth KNOB Attack
91
Kubernetes Security Audit Open Sourced
92
Google Releases Open Source Cryptographic Tool
93
Inputting Data Via Blinkenlights - Another Covert Channel
94
Boeing 737 MAX - Software Outsourcing Criticized
95
GitHub Adds New Code Security Features
96
Chrome Cryptocode Generator Revealed
97
OpenSSH Version 8.0 Released
98
Google Open Sources Sandboxing Tool
99
Counting Vulnerabilities In Open Source Projects and Programming Languages
100
Microsoft Partners With HackerOne On Bug Bounty
«
Start
Prev
1
2
3
Next
End
»
Page 1 of 3