Security
Security
Title Filter     Display # 
# Article Title
1 XSS Hunter For Pentesting
2 Anonymous Operation Icarus Hits Bank Sites
3 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
4 Hack A Chromebook for $100,000
5 Pwn2Own 2016 - The Results
6 Hacksplaining - Learn Through Hacking
7 Hack The Pentagon
8 Vulnerability Revealed In GNU C Library
9 Identifying Programmers From Executable Binaries
10 Teenage Programmer Equals Cyber Criminal
11 Let's Encrypt Now In Public Beta
12 State of Software Security
13 Coordinated Cyber Attack on Greek Banks
14 The Smartwatch Spy
15 Firefox, Chrome & Opera Block Access To Routers
16 How The Jeep Was Hacked
17 Microsoft Doubles Bounty Payouts
18 Your Phone's Battery Leaks - Your Id That Is
19 RC4 Stream Cypher - 75 Hours To Crack
20 Million Air Miles Bounty Awarded
21 New Android Bug Bounty Scheme
22 Navy Solicits Vulnerabilities
23 Mozilla Increases Bug Bounty
24 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
25 Software Quality Blamed For Airbus Crash
26 Earn United Airlines Award Miles For Finding Bugs
27 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
28 Microsoft Expands Bounty Programs
29 How Secure Is Android? Very Secure
30 GitHub Under DDoS Attack
31 Largest Payout Ever At Pwn2Own 2015
32 Yahoo's New Disposable Passwords
33 Rowhammer - Changing Memory Without Accessing It
34 All Change For Pwnium V
35 WebRTC Leaks Local IP Addresses
36 NTP The Latest Open Source Security Problem
37 Upgrade Git Client To Avoid Vulnerability
38 What Does The NSA Think Of Cryptographers?
39 Double Rewards For Finding Bugs In Facebook Ads Code
40 Poodle Is A Very Different Sort Of Security Breach
41 Google Increases Maximum Bounty For Chrome Bugs
42 New Online Services Bug Bounty Program
43 ShellShock - Yet Another Code Injection Vulnerability
44 The Canvas Fingerprint - How?
45 Cat Photos - A Potential Security Risk?
46 Hijacking Chromecast Is Easy
47 Bitcoin Isn't As Anonymous As You Might Hope
48 Cryptol Version 2 Released
49 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
50 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
51 Heartbleed - The Programmer's View
52 Facebook ThreatData
53 MozDef - Mozilla's Self Defence Kit
54 Record Payouts At Hacking Contests
55 The True Cost Of Bugs - Bitcoin Errors
56 $2.7 Million On Offer For Pwnium 4
57 Facebook Pays Out Record Reward
58 Optimize Mining Bitcoin
59 Google Extends Patch Reward
60 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
61 Microsoft Extends Bounty
62 Microsoft and Facebook Launch Internet Bug Bounty Scheme
63 GOTCHA - No More Password Hacking
64 Google Offers Cash For Security Patches
65 Bounty Hunter Awarded $100,000
66 Stick Figure Guide To AES Encryption
67 Facebook Refuses Bounty, Internet Raises Over $10K
68 Public Key Cryptography Set To Fail In Five Years
69 Android Security Hole More Stupid Error Than Defect
70 Microsoft Offers $100,000 For Novel Exploits
71 Crypto Made Easy
72 Is Exploiting A Bug Hacking?
73 Open Source Homomorphic Cryptography
74 Another Java 7 Security Flaw
75 Oracle Releases Java Critical Patch Updates
76 Oracle Patches 86 Flaws in Database and Enterprise Products
77 Java Still Insecure Warns Homeland Security
78 25 GPUs Crack Passwords In Minutes
79 Java Is Top Attack Target
80 Hackers Target SQL Injection
81 Smartphone Apps Track Users Even When Off
82 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
83 Oracle Login Weakness
84 Frankenstein - Stitching Code Bodies Together To Hide Malware
85 Google Announces More Cash For Security Bugs
86 ROP Mitigations Bypassed
87 BlueHat Prizes Awarded
88 Cartoon - Digital Rights or Wrongs?
89 Irises Change Over Time - Problem for Biometric Testing
90 Siri a Security Risk for IBM
91 A Short History of Hacking
92 Chrome, IE and Firefox Hacked
93 Inside Stuxnet
94 Chrome Hacked Twice at CanSecWest
95 FSF Opposes Restricted Boot
96 Google Offers $1 million for Chrome Hack
97 Kinect The Ultimate Security Device
98 Facebook's White Hat VISA Card
99 Print Me If You Dare - the Rise of Printer Malware
100 Quick action to patch ASP.NET vulnerability
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
RSS feed of news items only
I Programmer News
Copyright © 2016 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.