Title Filter     Display # 
# Article Title
41 Identifying Programmers From Executable Binaries
42 Teenage Programmer Equals Cyber Criminal
43 Let's Encrypt Now In Public Beta
44 State of Software Security
45 Coordinated Cyber Attack on Greek Banks
46 The Smartwatch Spy
47 Firefox, Chrome & Opera Block Access To Routers
48 How The Jeep Was Hacked
49 Microsoft Doubles Bounty Payouts
50 Your Phone's Battery Leaks - Your Id That Is
51 RC4 Stream Cypher - 75 Hours To Crack
52 Million Air Miles Bounty Awarded
53 New Android Bug Bounty Scheme
54 Navy Solicits Vulnerabilities
55 Mozilla Increases Bug Bounty
56 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
57 Software Quality Blamed For Airbus Crash
58 Earn United Airlines Award Miles For Finding Bugs
59 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
60 Microsoft Expands Bounty Programs
61 How Secure Is Android? Very Secure
62 GitHub Under DDoS Attack
63 Largest Payout Ever At Pwn2Own 2015
64 Yahoo's New Disposable Passwords
65 Rowhammer - Changing Memory Without Accessing It
66 All Change For Pwnium V
67 WebRTC Leaks Local IP Addresses
68 NTP The Latest Open Source Security Problem
69 Upgrade Git Client To Avoid Vulnerability
70 What Does The NSA Think Of Cryptographers?
71 Double Rewards For Finding Bugs In Facebook Ads Code
72 Poodle Is A Very Different Sort Of Security Breach
73 Google Increases Maximum Bounty For Chrome Bugs
74 New Online Services Bug Bounty Program
75 ShellShock - Yet Another Code Injection Vulnerability
76 The Canvas Fingerprint - How?
77 Cat Photos - A Potential Security Risk?
78 Hijacking Chromecast Is Easy
79 Bitcoin Isn't As Anonymous As You Might Hope
80 Cryptol Version 2 Released
81 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
82 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
83 Heartbleed - The Programmer's View
84 Facebook ThreatData
85 MozDef - Mozilla's Self Defence Kit
86 Record Payouts At Hacking Contests
87 The True Cost Of Bugs - Bitcoin Errors
88 $2.7 Million On Offer For Pwnium 4
89 Facebook Pays Out Record Reward
90 Optimize Mining Bitcoin
91 Google Extends Patch Reward
92 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
93 Microsoft Extends Bounty
94 Microsoft and Facebook Launch Internet Bug Bounty Scheme
95 GOTCHA - No More Password Hacking
96 Google Offers Cash For Security Patches
97 Bounty Hunter Awarded $100,000
98 Stick Figure Guide To AES Encryption
99 Facebook Refuses Bounty, Internet Raises Over $10K
100 Public Key Cryptography Set To Fail In Five Years
101 Android Security Hole More Stupid Error Than Defect
102 Microsoft Offers $100,000 For Novel Exploits
103 Crypto Made Easy
104 Is Exploiting A Bug Hacking?
105 Open Source Homomorphic Cryptography
106 Another Java 7 Security Flaw
107 Oracle Releases Java Critical Patch Updates
108 Oracle Patches 86 Flaws in Database and Enterprise Products
109 Java Still Insecure Warns Homeland Security
110 25 GPUs Crack Passwords In Minutes
111 Java Is Top Attack Target
112 Hackers Target SQL Injection
113 Smartphone Apps Track Users Even When Off
114 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
115 Oracle Login Weakness
116 Frankenstein - Stitching Code Bodies Together To Hide Malware
117 Google Announces More Cash For Security Bugs
118 ROP Mitigations Bypassed
119 BlueHat Prizes Awarded
120 Cartoon - Digital Rights or Wrongs?
121 Irises Change Over Time - Problem for Biometric Testing
122 Siri a Security Risk for IBM
123 A Short History of Hacking
124 Chrome, IE and Firefox Hacked
125 Inside Stuxnet
126 Chrome Hacked Twice at CanSecWest
127 FSF Opposes Restricted Boot
128 Google Offers $1 million for Chrome Hack
129 Kinect The Ultimate Security Device
130 Facebook's White Hat VISA Card
131 Print Me If You Dare - the Rise of Printer Malware
132 Quick action to patch ASP.NET vulnerability
133 The Computer Science of Insecurity
134 Cyber Attacks and Holidays
135 Planes are Unix hosts waiting to be hacked
136 Security by obscurity - a new theory
137 When cookies leak data
138 Search the world's smartphone photos
139 CIA/NSA want a photo location finder
140 Zodiac Killer code cracked? Cryptography at its worst
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2018 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.