Title Filter     Display # 
# Article Title
21 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
22 Get Ready for Expanded Pwn2Own 2017
23 //No Comment - Let's Encrypt, IoT Security & Obfuscation
24 Cure53 XSSMas Hacking Challenge 2016 Underway
25 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
26 Microsoft Launches Cloud Fuzzing Service
27 Microsoft Bug Bounty Extends Scope
28 Your Android Could Leak Data Via USB Charging
29 Airship, a truly secure PHP CMS
30 Can AI Change the Face of Cyber Security?
31 Mayhem Wins DARPA Cyber Grand Challenge
32 Crypto 101 - A Free Ebook
33 SilentKeys A Privacy Aware Keyboard
34 Google Increases Android Bug Rewards
35 XSS Hunter For Pentesting
36 Anonymous Operation Icarus Hits Bank Sites
37 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
38 Hack A Chromebook for $100,000
39 Pwn2Own 2016 - The Results
40 Hacksplaining - Learn Through Hacking
41 Hack The Pentagon
42 Vulnerability Revealed In GNU C Library
43 Identifying Programmers From Executable Binaries
44 Teenage Programmer Equals Cyber Criminal
45 Let's Encrypt Now In Public Beta
46 State of Software Security
47 Coordinated Cyber Attack on Greek Banks
48 The Smartwatch Spy
49 Firefox, Chrome & Opera Block Access To Routers
50 How The Jeep Was Hacked
51 Microsoft Doubles Bounty Payouts
52 Your Phone's Battery Leaks - Your Id That Is
53 RC4 Stream Cypher - 75 Hours To Crack
54 Million Air Miles Bounty Awarded
55 New Android Bug Bounty Scheme
56 Navy Solicits Vulnerabilities
57 Mozilla Increases Bug Bounty
58 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
59 Software Quality Blamed For Airbus Crash
60 Earn United Airlines Award Miles For Finding Bugs
61 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
62 Microsoft Expands Bounty Programs
63 How Secure Is Android? Very Secure
64 GitHub Under DDoS Attack
65 Largest Payout Ever At Pwn2Own 2015
66 Yahoo's New Disposable Passwords
67 Rowhammer - Changing Memory Without Accessing It
68 All Change For Pwnium V
69 WebRTC Leaks Local IP Addresses
70 NTP The Latest Open Source Security Problem
71 Upgrade Git Client To Avoid Vulnerability
72 What Does The NSA Think Of Cryptographers?
73 Double Rewards For Finding Bugs In Facebook Ads Code
74 Poodle Is A Very Different Sort Of Security Breach
75 Google Increases Maximum Bounty For Chrome Bugs
76 New Online Services Bug Bounty Program
77 ShellShock - Yet Another Code Injection Vulnerability
78 The Canvas Fingerprint - How?
79 Cat Photos - A Potential Security Risk?
80 Hijacking Chromecast Is Easy
81 Bitcoin Isn't As Anonymous As You Might Hope
82 Cryptol Version 2 Released
83 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
84 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
85 Heartbleed - The Programmer's View
86 Facebook ThreatData
87 MozDef - Mozilla's Self Defence Kit
88 Record Payouts At Hacking Contests
89 The True Cost Of Bugs - Bitcoin Errors
90 $2.7 Million On Offer For Pwnium 4
91 Facebook Pays Out Record Reward
92 Optimize Mining Bitcoin
93 Google Extends Patch Reward
94 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
95 Microsoft Extends Bounty
96 Microsoft and Facebook Launch Internet Bug Bounty Scheme
97 GOTCHA - No More Password Hacking
98 Google Offers Cash For Security Patches
99 Bounty Hunter Awarded $100,000
100 Stick Figure Guide To AES Encryption
101 Facebook Refuses Bounty, Internet Raises Over $10K
102 Public Key Cryptography Set To Fail In Five Years
103 Android Security Hole More Stupid Error Than Defect
104 Microsoft Offers $100,000 For Novel Exploits
105 Crypto Made Easy
106 Is Exploiting A Bug Hacking?
107 Open Source Homomorphic Cryptography
108 Another Java 7 Security Flaw
109 Oracle Releases Java Critical Patch Updates
110 Oracle Patches 86 Flaws in Database and Enterprise Products
111 Java Still Insecure Warns Homeland Security
112 25 GPUs Crack Passwords In Minutes
113 Java Is Top Attack Target
114 Hackers Target SQL Injection
115 Smartphone Apps Track Users Even When Off
116 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
117 Oracle Login Weakness
118 Frankenstein - Stitching Code Bodies Together To Hide Malware
119 Google Announces More Cash For Security Bugs
120 ROP Mitigations Bypassed
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2018 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.