Title Filter     Display # 
# Article Title
21 New Android Bug Bounty Scheme
22 Navy Solicits Vulnerabilities
23 Mozilla Increases Bug Bounty
24 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
25 Software Quality Blamed For Airbus Crash
26 Earn United Airlines Award Miles For Finding Bugs
27 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
28 Microsoft Expands Bounty Programs
29 How Secure Is Android? Very Secure
30 GitHub Under DDoS Attack
31 Largest Payout Ever At Pwn2Own 2015
32 Yahoo's New Disposable Passwords
33 Rowhammer - Changing Memory Without Accessing It
34 All Change For Pwnium V
35 WebRTC Leaks Local IP Addresses
36 NTP The Latest Open Source Security Problem
37 Upgrade Git Client To Avoid Vulnerability
38 What Does The NSA Think Of Cryptographers?
39 Double Rewards For Finding Bugs In Facebook Ads Code
40 Poodle Is A Very Different Sort Of Security Breach
41 Google Increases Maximum Bounty For Chrome Bugs
42 New Online Services Bug Bounty Program
43 ShellShock - Yet Another Code Injection Vulnerability
44 The Canvas Fingerprint - How?
45 Cat Photos - A Potential Security Risk?
46 Hijacking Chromecast Is Easy
47 Bitcoin Isn't As Anonymous As You Might Hope
48 Cryptol Version 2 Released
49 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
50 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
51 Heartbleed - The Programmer's View
52 Facebook ThreatData
53 MozDef - Mozilla's Self Defence Kit
54 Record Payouts At Hacking Contests
55 The True Cost Of Bugs - Bitcoin Errors
56 $2.7 Million On Offer For Pwnium 4
57 Facebook Pays Out Record Reward
58 Optimize Mining Bitcoin
59 Google Extends Patch Reward
60 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
61 Microsoft Extends Bounty
62 Microsoft and Facebook Launch Internet Bug Bounty Scheme
63 GOTCHA - No More Password Hacking
64 Google Offers Cash For Security Patches
65 Bounty Hunter Awarded $100,000
66 Stick Figure Guide To AES Encryption
67 Facebook Refuses Bounty, Internet Raises Over $10K
68 Public Key Cryptography Set To Fail In Five Years
69 Android Security Hole More Stupid Error Than Defect
70 Microsoft Offers $100,000 For Novel Exploits
71 Crypto Made Easy
72 Is Exploiting A Bug Hacking?
73 Open Source Homomorphic Cryptography
74 Another Java 7 Security Flaw
75 Oracle Releases Java Critical Patch Updates
76 Oracle Patches 86 Flaws in Database and Enterprise Products
77 Java Still Insecure Warns Homeland Security
78 25 GPUs Crack Passwords In Minutes
79 Java Is Top Attack Target
80 Hackers Target SQL Injection
81 Smartphone Apps Track Users Even When Off
82 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
83 Oracle Login Weakness
84 Frankenstein - Stitching Code Bodies Together To Hide Malware
85 Google Announces More Cash For Security Bugs
86 ROP Mitigations Bypassed
87 BlueHat Prizes Awarded
88 Cartoon - Digital Rights or Wrongs?
89 Irises Change Over Time - Problem for Biometric Testing
90 Siri a Security Risk for IBM
91 A Short History of Hacking
92 Chrome, IE and Firefox Hacked
93 Inside Stuxnet
94 Chrome Hacked Twice at CanSecWest
95 FSF Opposes Restricted Boot
96 Google Offers $1 million for Chrome Hack
97 Kinect The Ultimate Security Device
98 Facebook's White Hat VISA Card
99 Print Me If You Dare - the Rise of Printer Malware
100 Quick action to patch ASP.NET vulnerability
101 The Computer Science of Insecurity
102 Cyber Attacks and Holidays
103 Planes are Unix hosts waiting to be hacked
104 Security by obscurity - a new theory
105 When cookies leak data
106 Search the world's smartphone photos
107 CIA/NSA want a photo location finder
108 Zodiac Killer code cracked? Cryptography at its worst
109 Microsoft releases source code for low-level WiFi
110 Passcodes prove predictable
111 Bitcoin still standing - but panic takes over
112 Audio CAPTCHA easily cracked
113 Cracking a Skype call using phonemes
114 Disk encryption made secure by amnesia
115 Hiding data in disk fragmentation
116 Cracking Stuxnet - a beginner's guide
117 GPS spoofing the new game in town
118 Chrome Safe In Pwn2Own Contest
119 iPhone passwords hacked in six minutes
120 Set a smartphone to hack a PC
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2016 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.