Security
Security
Title Filter     Display # 
# Article Title
21 State of Software Security
22 Coordinated Cyber Attack on Greek Banks
23 The Smartwatch Spy
24 Firefox, Chrome & Opera Block Access To Routers
25 How The Jeep Was Hacked
26 Microsoft Doubles Bounty Payouts
27 Your Phone's Battery Leaks - Your Id That Is
28 RC4 Stream Cypher - 75 Hours To Crack
29 Million Air Miles Bounty Awarded
30 New Android Bug Bounty Scheme
31 Navy Solicits Vulnerabilities
32 Mozilla Increases Bug Bounty
33 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
34 Software Quality Blamed For Airbus Crash
35 Earn United Airlines Award Miles For Finding Bugs
36 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
37 Microsoft Expands Bounty Programs
38 How Secure Is Android? Very Secure
39 GitHub Under DDoS Attack
40 Largest Payout Ever At Pwn2Own 2015
41 Yahoo's New Disposable Passwords
42 Rowhammer - Changing Memory Without Accessing It
43 All Change For Pwnium V
44 WebRTC Leaks Local IP Addresses
45 NTP The Latest Open Source Security Problem
46 Upgrade Git Client To Avoid Vulnerability
47 What Does The NSA Think Of Cryptographers?
48 Double Rewards For Finding Bugs In Facebook Ads Code
49 Poodle Is A Very Different Sort Of Security Breach
50 Google Increases Maximum Bounty For Chrome Bugs
51 New Online Services Bug Bounty Program
52 ShellShock - Yet Another Code Injection Vulnerability
53 The Canvas Fingerprint - How?
54 Cat Photos - A Potential Security Risk?
55 Hijacking Chromecast Is Easy
56 Bitcoin Isn't As Anonymous As You Might Hope
57 Cryptol Version 2 Released
58 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
59 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
60 Heartbleed - The Programmer's View
61 Facebook ThreatData
62 MozDef - Mozilla's Self Defence Kit
63 Record Payouts At Hacking Contests
64 The True Cost Of Bugs - Bitcoin Errors
65 $2.7 Million On Offer For Pwnium 4
66 Facebook Pays Out Record Reward
67 Optimize Mining Bitcoin
68 Google Extends Patch Reward
69 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
70 Microsoft Extends Bounty
71 Microsoft and Facebook Launch Internet Bug Bounty Scheme
72 GOTCHA - No More Password Hacking
73 Google Offers Cash For Security Patches
74 Bounty Hunter Awarded $100,000
75 Stick Figure Guide To AES Encryption
76 Facebook Refuses Bounty, Internet Raises Over $10K
77 Public Key Cryptography Set To Fail In Five Years
78 Android Security Hole More Stupid Error Than Defect
79 Microsoft Offers $100,000 For Novel Exploits
80 Crypto Made Easy
81 Is Exploiting A Bug Hacking?
82 Open Source Homomorphic Cryptography
83 Another Java 7 Security Flaw
84 Oracle Releases Java Critical Patch Updates
85 Oracle Patches 86 Flaws in Database and Enterprise Products
86 Java Still Insecure Warns Homeland Security
87 25 GPUs Crack Passwords In Minutes
88 Java Is Top Attack Target
89 Hackers Target SQL Injection
90 Smartphone Apps Track Users Even When Off
91 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
92 Oracle Login Weakness
93 Frankenstein - Stitching Code Bodies Together To Hide Malware
94 Google Announces More Cash For Security Bugs
95 ROP Mitigations Bypassed
96 BlueHat Prizes Awarded
97 Cartoon - Digital Rights or Wrongs?
98 Irises Change Over Time - Problem for Biometric Testing
99 Siri a Security Risk for IBM
100 A Short History of Hacking
101 Chrome, IE and Firefox Hacked
102 Inside Stuxnet
103 Chrome Hacked Twice at CanSecWest
104 FSF Opposes Restricted Boot
105 Google Offers $1 million for Chrome Hack
106 Kinect The Ultimate Security Device
107 Facebook's White Hat VISA Card
108 Print Me If You Dare - the Rise of Printer Malware
109 Quick action to patch ASP.NET vulnerability
110 The Computer Science of Insecurity
111 Cyber Attacks and Holidays
112 Planes are Unix hosts waiting to be hacked
113 Security by obscurity - a new theory
114 When cookies leak data
115 Search the world's smartphone photos
116 CIA/NSA want a photo location finder
117 Zodiac Killer code cracked? Cryptography at its worst
118 Microsoft releases source code for low-level WiFi
119 Passcodes prove predictable
120 Bitcoin still standing - but panic takes over
 
«StartPrev12NextEnd»
Page 1 of 2
 

   
Banner
RSS feed of news items only
I Programmer News
Copyright © 2016 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.