Title Filter     Display # 
# Article Title
21 Your Phone's Battery Leaks - Your Id That Is
22 RC4 Stream Cypher - 75 Hours To Crack
23 Million Air Miles Bounty Awarded
24 New Android Bug Bounty Scheme
25 Navy Solicits Vulnerabilities
26 Mozilla Increases Bug Bounty
27 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
28 Software Quality Blamed For Airbus Crash
29 Earn United Airlines Award Miles For Finding Bugs
30 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
31 Microsoft Expands Bounty Programs
32 How Secure Is Android? Very Secure
33 GitHub Under DDoS Attack
34 Largest Payout Ever At Pwn2Own 2015
35 Yahoo's New Disposable Passwords
36 Rowhammer - Changing Memory Without Accessing It
37 All Change For Pwnium V
38 WebRTC Leaks Local IP Addresses
39 NTP The Latest Open Source Security Problem
40 Upgrade Git Client To Avoid Vulnerability
41 What Does The NSA Think Of Cryptographers?
42 Double Rewards For Finding Bugs In Facebook Ads Code
43 Poodle Is A Very Different Sort Of Security Breach
44 Google Increases Maximum Bounty For Chrome Bugs
45 New Online Services Bug Bounty Program
46 ShellShock - Yet Another Code Injection Vulnerability
47 The Canvas Fingerprint - How?
48 Cat Photos - A Potential Security Risk?
49 Hijacking Chromecast Is Easy
50 Bitcoin Isn't As Anonymous As You Might Hope
51 Cryptol Version 2 Released
52 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
53 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
54 Heartbleed - The Programmer's View
55 Facebook ThreatData
56 MozDef - Mozilla's Self Defence Kit
57 Record Payouts At Hacking Contests
58 The True Cost Of Bugs - Bitcoin Errors
59 $2.7 Million On Offer For Pwnium 4
60 Facebook Pays Out Record Reward
61 Optimize Mining Bitcoin
62 Google Extends Patch Reward
63 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
64 Microsoft Extends Bounty
65 Microsoft and Facebook Launch Internet Bug Bounty Scheme
66 GOTCHA - No More Password Hacking
67 Google Offers Cash For Security Patches
68 Bounty Hunter Awarded $100,000
69 Stick Figure Guide To AES Encryption
70 Facebook Refuses Bounty, Internet Raises Over $10K
71 Public Key Cryptography Set To Fail In Five Years
72 Android Security Hole More Stupid Error Than Defect
73 Microsoft Offers $100,000 For Novel Exploits
74 Crypto Made Easy
75 Is Exploiting A Bug Hacking?
76 Open Source Homomorphic Cryptography
77 Another Java 7 Security Flaw
78 Oracle Releases Java Critical Patch Updates
79 Oracle Patches 86 Flaws in Database and Enterprise Products
80 Java Still Insecure Warns Homeland Security
81 25 GPUs Crack Passwords In Minutes
82 Java Is Top Attack Target
83 Hackers Target SQL Injection
84 Smartphone Apps Track Users Even When Off
85 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
86 Oracle Login Weakness
87 Frankenstein - Stitching Code Bodies Together To Hide Malware
88 Google Announces More Cash For Security Bugs
89 ROP Mitigations Bypassed
90 BlueHat Prizes Awarded
91 Cartoon - Digital Rights or Wrongs?
92 Irises Change Over Time - Problem for Biometric Testing
93 Siri a Security Risk for IBM
94 A Short History of Hacking
95 Chrome, IE and Firefox Hacked
96 Inside Stuxnet
97 Chrome Hacked Twice at CanSecWest
98 FSF Opposes Restricted Boot
99 Google Offers $1 million for Chrome Hack
100 Kinect The Ultimate Security Device
101 Facebook's White Hat VISA Card
102 Print Me If You Dare - the Rise of Printer Malware
103 Quick action to patch ASP.NET vulnerability
104 The Computer Science of Insecurity
105 Cyber Attacks and Holidays
106 Planes are Unix hosts waiting to be hacked
107 Security by obscurity - a new theory
108 When cookies leak data
109 Search the world's smartphone photos
110 CIA/NSA want a photo location finder
111 Zodiac Killer code cracked? Cryptography at its worst
112 Microsoft releases source code for low-level WiFi
113 Passcodes prove predictable
114 Bitcoin still standing - but panic takes over
115 Audio CAPTCHA easily cracked
116 Cracking a Skype call using phonemes
117 Disk encryption made secure by amnesia
118 Hiding data in disk fragmentation
119 Cracking Stuxnet - a beginner's guide
120 GPS spoofing the new game in town
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2016 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.