Title Filter     Display # 
# Article Title
41 State of Software Security
42 Coordinated Cyber Attack on Greek Banks
43 The Smartwatch Spy
44 Firefox, Chrome & Opera Block Access To Routers
45 How The Jeep Was Hacked
46 Microsoft Doubles Bounty Payouts
47 Your Phone's Battery Leaks - Your Id That Is
48 RC4 Stream Cypher - 75 Hours To Crack
49 Million Air Miles Bounty Awarded
50 New Android Bug Bounty Scheme
51 Navy Solicits Vulnerabilities
52 Mozilla Increases Bug Bounty
53 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
54 Software Quality Blamed For Airbus Crash
55 Earn United Airlines Award Miles For Finding Bugs
56 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
57 Microsoft Expands Bounty Programs
58 How Secure Is Android? Very Secure
59 GitHub Under DDoS Attack
60 Largest Payout Ever At Pwn2Own 2015
61 Yahoo's New Disposable Passwords
62 Rowhammer - Changing Memory Without Accessing It
63 All Change For Pwnium V
64 WebRTC Leaks Local IP Addresses
65 NTP The Latest Open Source Security Problem
66 Upgrade Git Client To Avoid Vulnerability
67 What Does The NSA Think Of Cryptographers?
68 Double Rewards For Finding Bugs In Facebook Ads Code
69 Poodle Is A Very Different Sort Of Security Breach
70 Google Increases Maximum Bounty For Chrome Bugs
71 New Online Services Bug Bounty Program
72 ShellShock - Yet Another Code Injection Vulnerability
73 The Canvas Fingerprint - How?
74 Cat Photos - A Potential Security Risk?
75 Hijacking Chromecast Is Easy
76 Bitcoin Isn't As Anonymous As You Might Hope
77 Cryptol Version 2 Released
78 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
79 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
80 Heartbleed - The Programmer's View
81 Facebook ThreatData
82 MozDef - Mozilla's Self Defence Kit
83 Record Payouts At Hacking Contests
84 The True Cost Of Bugs - Bitcoin Errors
85 $2.7 Million On Offer For Pwnium 4
86 Facebook Pays Out Record Reward
87 Optimize Mining Bitcoin
88 Google Extends Patch Reward
89 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
90 Microsoft Extends Bounty
91 Microsoft and Facebook Launch Internet Bug Bounty Scheme
92 GOTCHA - No More Password Hacking
93 Google Offers Cash For Security Patches
94 Bounty Hunter Awarded $100,000
95 Stick Figure Guide To AES Encryption
96 Facebook Refuses Bounty, Internet Raises Over $10K
97 Public Key Cryptography Set To Fail In Five Years
98 Android Security Hole More Stupid Error Than Defect
99 Microsoft Offers $100,000 For Novel Exploits
100 Crypto Made Easy
101 Is Exploiting A Bug Hacking?
102 Open Source Homomorphic Cryptography
103 Another Java 7 Security Flaw
104 Oracle Releases Java Critical Patch Updates
105 Oracle Patches 86 Flaws in Database and Enterprise Products
106 Java Still Insecure Warns Homeland Security
107 25 GPUs Crack Passwords In Minutes
108 Java Is Top Attack Target
109 Hackers Target SQL Injection
110 Smartphone Apps Track Users Even When Off
111 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
112 Oracle Login Weakness
113 Frankenstein - Stitching Code Bodies Together To Hide Malware
114 Google Announces More Cash For Security Bugs
115 ROP Mitigations Bypassed
116 BlueHat Prizes Awarded
117 Cartoon - Digital Rights or Wrongs?
118 Irises Change Over Time - Problem for Biometric Testing
119 Siri a Security Risk for IBM
120 A Short History of Hacking
121 Chrome, IE and Firefox Hacked
122 Inside Stuxnet
123 Chrome Hacked Twice at CanSecWest
124 FSF Opposes Restricted Boot
125 Google Offers $1 million for Chrome Hack
126 Kinect The Ultimate Security Device
127 Facebook's White Hat VISA Card
128 Print Me If You Dare - the Rise of Printer Malware
129 Quick action to patch ASP.NET vulnerability
130 The Computer Science of Insecurity
131 Cyber Attacks and Holidays
132 Planes are Unix hosts waiting to be hacked
133 Security by obscurity - a new theory
134 When cookies leak data
135 Search the world's smartphone photos
136 CIA/NSA want a photo location finder
137 Zodiac Killer code cracked? Cryptography at its worst
138 Microsoft releases source code for low-level WiFi
139 Passcodes prove predictable
140 Bitcoin still standing - but panic takes over
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2018 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.