Title Filter     Display # 
# Article Title
41 Teenage Programmer Equals Cyber Criminal
42 Let's Encrypt Now In Public Beta
43 State of Software Security
44 Coordinated Cyber Attack on Greek Banks
45 The Smartwatch Spy
46 Firefox, Chrome & Opera Block Access To Routers
47 How The Jeep Was Hacked
48 Microsoft Doubles Bounty Payouts
49 Your Phone's Battery Leaks - Your Id That Is
50 RC4 Stream Cypher - 75 Hours To Crack
51 Million Air Miles Bounty Awarded
52 New Android Bug Bounty Scheme
53 Navy Solicits Vulnerabilities
54 Mozilla Increases Bug Bounty
55 LOGJAM - Can The NSA Break 1024-bit DHM Keys?
56 Software Quality Blamed For Airbus Crash
57 Earn United Airlines Award Miles For Finding Bugs
58 Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
59 Microsoft Expands Bounty Programs
60 How Secure Is Android? Very Secure
61 GitHub Under DDoS Attack
62 Largest Payout Ever At Pwn2Own 2015
63 Yahoo's New Disposable Passwords
64 Rowhammer - Changing Memory Without Accessing It
65 All Change For Pwnium V
66 WebRTC Leaks Local IP Addresses
67 NTP The Latest Open Source Security Problem
68 Upgrade Git Client To Avoid Vulnerability
69 What Does The NSA Think Of Cryptographers?
70 Double Rewards For Finding Bugs In Facebook Ads Code
71 Poodle Is A Very Different Sort Of Security Breach
72 Google Increases Maximum Bounty For Chrome Bugs
73 New Online Services Bug Bounty Program
74 ShellShock - Yet Another Code Injection Vulnerability
75 The Canvas Fingerprint - How?
76 Cat Photos - A Potential Security Risk?
77 Hijacking Chromecast Is Easy
78 Bitcoin Isn't As Anonymous As You Might Hope
79 Cryptol Version 2 Released
80 Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
81 Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
82 Heartbleed - The Programmer's View
83 Facebook ThreatData
84 MozDef - Mozilla's Self Defence Kit
85 Record Payouts At Hacking Contests
86 The True Cost Of Bugs - Bitcoin Errors
87 $2.7 Million On Offer For Pwnium 4
88 Facebook Pays Out Record Reward
89 Optimize Mining Bitcoin
90 Google Extends Patch Reward
91 UPDATE 2: Is Bitcoin Broken - A Response And A Conference
92 Microsoft Extends Bounty
93 Microsoft and Facebook Launch Internet Bug Bounty Scheme
94 GOTCHA - No More Password Hacking
95 Google Offers Cash For Security Patches
96 Bounty Hunter Awarded $100,000
97 Stick Figure Guide To AES Encryption
98 Facebook Refuses Bounty, Internet Raises Over $10K
99 Public Key Cryptography Set To Fail In Five Years
100 Android Security Hole More Stupid Error Than Defect
101 Microsoft Offers $100,000 For Novel Exploits
102 Crypto Made Easy
103 Is Exploiting A Bug Hacking?
104 Open Source Homomorphic Cryptography
105 Another Java 7 Security Flaw
106 Oracle Releases Java Critical Patch Updates
107 Oracle Patches 86 Flaws in Database and Enterprise Products
108 Java Still Insecure Warns Homeland Security
109 25 GPUs Crack Passwords In Minutes
110 Java Is Top Attack Target
111 Hackers Target SQL Injection
112 Smartphone Apps Track Users Even When Off
113 PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
114 Oracle Login Weakness
115 Frankenstein - Stitching Code Bodies Together To Hide Malware
116 Google Announces More Cash For Security Bugs
117 ROP Mitigations Bypassed
118 BlueHat Prizes Awarded
119 Cartoon - Digital Rights or Wrongs?
120 Irises Change Over Time - Problem for Biometric Testing
121 Siri a Security Risk for IBM
122 A Short History of Hacking
123 Chrome, IE and Firefox Hacked
124 Inside Stuxnet
125 Chrome Hacked Twice at CanSecWest
126 FSF Opposes Restricted Boot
127 Google Offers $1 million for Chrome Hack
128 Kinect The Ultimate Security Device
129 Facebook's White Hat VISA Card
130 Print Me If You Dare - the Rise of Printer Malware
131 Quick action to patch ASP.NET vulnerability
132 The Computer Science of Insecurity
133 Cyber Attacks and Holidays
134 Planes are Unix hosts waiting to be hacked
135 Security by obscurity - a new theory
136 When cookies leak data
137 Search the world's smartphone photos
138 CIA/NSA want a photo location finder
139 Zodiac Killer code cracked? Cryptography at its worst
140 Microsoft releases source code for low-level WiFi
Page 1 of 2

RSS feed of news items only
I Programmer News
Copyright © 2018 All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.