Title Filter     Display # 
# Article Title
41 Microsoft Expands Bounty Programs
42 How Secure Is Android? Very Secure
43 GitHub Under DDoS Attack
44 Largest Payout Ever At Pwn2Own 2015
45 Yahoo's New Disposable Passwords
46 Rowhammer - Changing Memory Without Accessing It
47 All Change For Pwnium V
48 WebRTC Leaks Local IP Addresses
49 NTP The Latest Open Source Security Problem
50 Upgrade Git Client To Avoid Vulnerability
51 What Does The NSA Think Of Cryptographers?
52 Double Rewards For Finding Bugs In Facebook Ads Code
53 Poodle Is A Very Different Sort Of Security Breach
54 Google Increases Maximum Bounty For Chrome Bugs
55 New Online Services Bug Bounty Program
56 ShellShock - Yet Another Code Injection Vulnerability
57 The Canvas Fingerprint - How?
58 Cat Photos - A Potential Security Risk?
59 Hijacking Chromecast Is Easy
60 Bitcoin Isn't As Anonymous As You Might Hope
61 Cryptol Version 2 Released
62 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
63 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
64 Heartbleed - The Programmer's View
65 Facebook ThreatData
66 MozDef - Mozilla's Self Defence Kit
67 Record Payouts At Hacking Contests
68 The True Cost Of Bugs - Bitcoin Errors
69 $2.7 Million On Offer For Pwnium 4
70 Facebook Pays Out Record Reward
71 Optimize Mining Bitcoin
72 Google Extends Patch Reward
73 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
74 Microsoft Extends Bounty
75 Microsoft and Facebook Launch Internet Bug Bounty Scheme
76 GOTCHA - No More Password Hacking
77 Google Offers Cash For Security Patches
78 Bounty Hunter Awarded $100,000
79 Stick Figure Guide To AES Encryption
80 Facebook Refuses Bounty, Internet Raises Over $10K
81 Public Key Cryptography Set To Fail In Five Years
82 Android Security Hole More Stupid Error Than Defect
83 Microsoft Offers $100,000 For Novel Exploits
84 Crypto Made Easy
85 Is Exploiting A Bug Hacking?
86 Open Source Homomorphic Cryptography
87 Another Java 7 Security Flaw
88 Oracle Releases Java Critical Patch Updates
89 Oracle Patches 86 Flaws in Database and Enterprise Products
90 Java Still Insecure Warns Homeland Security
91 25 GPUs Crack Passwords In Minutes
92 Java Is Top Attack Target
93 Hackers Target SQL Injection
94 Smartphone Apps Track Users Even When Off
95 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
96 Oracle Login Weakness
97 Frankenstein - Stitching Code Bodies Together To Hide Malware
98 Google Announces More Cash For Security Bugs
99 ROP Mitigations Bypassed
100 BlueHat Prizes Awarded
101 Cartoon - Digital Rights or Wrongs?
102 Irises Change Over Time - Problem for Biometric Testing
103 Siri a Security Risk for IBM
104 A Short History of Hacking
105 Chrome, IE and Firefox Hacked
106 Inside Stuxnet
107 Chrome Hacked Twice at CanSecWest
108 FSF Opposes Restricted Boot
109 Google Offers $1 million for Chrome Hack
110 Kinect The Ultimate Security Device
111 Facebook's White Hat VISA Card
112 Print Me If You Dare - the Rise of Printer Malware
113 Quick action to patch ASP.NET vulnerability
114 The Computer Science of Insecurity
115 Cyber Attacks and Holidays
116 Planes are Unix hosts waiting to be hacked
117 Security by obscurity - a new theory
118 When cookies leak data
119 Search the world's smartphone photos
120 CIA/NSA want a photo location finder
121 Zodiac Killer code cracked? Cryptography at its worst
122 Microsoft releases source code for low-level WiFi
123 Passcodes prove predictable
124 Bitcoin still standing - but panic takes over
125 Audio CAPTCHA easily cracked
126 Cracking a Skype call using phonemes
127 Disk encryption made secure by amnesia
128 Hiding data in disk fragmentation
129 Cracking Stuxnet - a beginner's guide
130 GPS spoofing the new game in town
131 Chrome Safe In Pwn2Own Contest
132 iPhone passwords hacked in six minutes
133 Set a smartphone to hack a PC
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2017 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.