Title Filter     Display # 
# Article Title
1 PowerHammer - Leaking Data Through The Power Line
2 GitHub Bug Bounty Program Expanded In Scope and Reward
3 Intel Extends Bug Bounty Program
4 Levchin Prize for Real-World Cryptography
5 How Spectre Works
6 How Meltdown Works
7 Bug Bounty Bonanza
8 I Know Who You Are By The Way You Take A Corner
9 Stack Overflow Considered Harmful?
10 Samsung Bug Bounty Program
11 Fluid Passwords - Never The Same Password
12 Hacking Alexa By Whispering In Her Ear
13 More Cash For Internet Bug Bounty
14 Wireshark 2.4 Increases Protocol Coverage
15 Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
16 Google Capture the Flag 2017
17 EU Cookie Law Is A Flop
18 Microsoft Edge Falls Victim At Pwn2Own
19 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
20 Get Ready for Expanded Pwn2Own 2017
21 //No Comment - Let's Encrypt, IoT Security & Obfuscation
22 Cure53 XSSMas Hacking Challenge 2016 Underway
23 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
24 Microsoft Launches Cloud Fuzzing Service
25 Microsoft Bug Bounty Extends Scope
26 Your Android Could Leak Data Via USB Charging
27 Airship, a truly secure PHP CMS
28 Can AI Change the Face of Cyber Security?
29 Mayhem Wins DARPA Cyber Grand Challenge
30 Crypto 101 - A Free Ebook
31 SilentKeys A Privacy Aware Keyboard
32 Google Increases Android Bug Rewards
33 XSS Hunter For Pentesting
34 Anonymous Operation Icarus Hits Bank Sites
35 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
36 Hack A Chromebook for $100,000
37 Pwn2Own 2016 - The Results
38 Hacksplaining - Learn Through Hacking
39 Hack The Pentagon
40 Vulnerability Revealed In GNU C Library
41 Identifying Programmers From Executable Binaries
42 Teenage Programmer Equals Cyber Criminal
43 Let's Encrypt Now In Public Beta
44 State of Software Security
45 Coordinated Cyber Attack on Greek Banks
46 The Smartwatch Spy
47 Firefox, Chrome & Opera Block Access To Routers
48 How The Jeep Was Hacked
49 Microsoft Doubles Bounty Payouts
50 Your Phone's Battery Leaks - Your Id That Is
51 RC4 Stream Cypher - 75 Hours To Crack
52 Million Air Miles Bounty Awarded
53 New Android Bug Bounty Scheme
54 Navy Solicits Vulnerabilities
55 Mozilla Increases Bug Bounty
56 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
57 Software Quality Blamed For Airbus Crash
58 Earn United Airlines Award Miles For Finding Bugs
59 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
60 Microsoft Expands Bounty Programs
61 How Secure Is Android? Very Secure
62 GitHub Under DDoS Attack
63 Largest Payout Ever At Pwn2Own 2015
64 Yahoo's New Disposable Passwords
65 Rowhammer - Changing Memory Without Accessing It
66 All Change For Pwnium V
67 WebRTC Leaks Local IP Addresses
68 NTP The Latest Open Source Security Problem
69 Upgrade Git Client To Avoid Vulnerability
70 What Does The NSA Think Of Cryptographers?
71 Double Rewards For Finding Bugs In Facebook Ads Code
72 Poodle Is A Very Different Sort Of Security Breach
73 Google Increases Maximum Bounty For Chrome Bugs
74 New Online Services Bug Bounty Program
75 ShellShock - Yet Another Code Injection Vulnerability
76 The Canvas Fingerprint - How?
77 Cat Photos - A Potential Security Risk?
78 Hijacking Chromecast Is Easy
79 Bitcoin Isn't As Anonymous As You Might Hope
80 Cryptol Version 2 Released
81 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
82 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
83 Heartbleed - The Programmer's View
84 Facebook ThreatData
85 MozDef - Mozilla's Self Defence Kit
86 Record Payouts At Hacking Contests
87 The True Cost Of Bugs - Bitcoin Errors
88 $2.7 Million On Offer For Pwnium 4
89 Facebook Pays Out Record Reward
90 Optimize Mining Bitcoin
91 Google Extends Patch Reward
92 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
93 Microsoft Extends Bounty
94 Microsoft and Facebook Launch Internet Bug Bounty Scheme
95 GOTCHA - No More Password Hacking
96 Google Offers Cash For Security Patches
97 Bounty Hunter Awarded $100,000
98 Stick Figure Guide To AES Encryption
99 Facebook Refuses Bounty, Internet Raises Over $10K
100 Public Key Cryptography Set To Fail In Five Years
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2018 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.