>
search
cog
I Programmer HOME
Toggle Navigation
Books
Book Reviews
Book Watch
Programmer's Bookshelf
Articles
The Core
Android
Artifical Intelligence
Python
Javascript
WPF Workings
Joomla
PHP
Theory
Silverlight
C#
Other Languages
Visual Basic
C/C++
Mobile
Database
ASP .NET
Hardware/IoT
Graphics/Imaging
UI/UX
Perl
WinRT
HTML/CSS
jQuery
Ruby
Security
Methodology & Testing
Cloud
DevOps
Java
Babbage's Bag
Projects
Programmer Puzzles
C#
C++
Java
JavaScript
Python
PHP
Sharpen Your Coding Skills
History
Machines
People
Software & computer languages
Swift's Spreadsheets
Finance
Personal
General
Professional Programmer
Accreditation & Training
I Programmer
Resources and Tools
I Programmer Weekly
eBooks
Stone Tapes
CodeBin
News
Register
About Us
Security
Title Filter
Display #
5
10
15
20
25
30
50
100
All
#
Article Title
1
DryRun Announces Natural Language Code Policies
2
Edera Releases Open Source Container Benchmark And Scanner
3
NIST Password Guidelines - The Nine Commandments
4
Rust Foundation Report On Recent Initiatives
5
NIST Announces Post-Quantum Cryptographic Algorithms
6
APISEC Conference Sessions Now Available Online
7
CDN Serves Malware - 100,000 Polyfill Users At Risk
8
OpenSSF's Siren To Warn About OSS Vulnerabilities
9
RoboForm Hacked To Retrieve $3 Million BitCoin Wallet
10
Edgeless Systems Announces Continuum AI
11
White House Urges Memory Safe Software
12
CSS Test of Time Award 2023
13
Microsoft Launches Secure Future Initiative
14
Insights Into Software Supply Chain Security
15
OpenSSF Releases Malicious Packages Repository
16
Chepy - The Hacker's Toolbox
17
Appdome Launches Bot Detector
18
BitLocker Defeated Using Logic Analyser
19
Chainguard Announces AI Images Bundle
20
GitHub Bug Bounty Program Now With Swag
21
Chainguard's Enforce Platform Boosted With New Capabilities
22
Amazon Releases Verified Permissions
23
Appdome Adds GitLab Integration
24
Surveying Software Supply Chain Security
25
Security Flaws The Effects of Time and Language
26
NIST Selects Lightweight Crypto For The IoT
27
VS Code Extensions As Malware
28
Google Open Sources Image Blurring
29
Google Launches Free Vulnerability Scanner
30
GitHub Extends Secret Scanning For Free
31
Largest Ever Pwn2Own Contest
32
Traffic Light Security For IoT
33
Sigstore Reaches General Availability
34
Meta Identifies 400 Apps That Steal Logins
35
Rust Foundation Establishes Security Team
36
Constellation - The First Confidential Kubernetes
37
Learn To Protect Your APIs By Hacking Them
38
Code On Coin Cracked By 14 Year Old!
39
Protect The Software Supply Chain With Gitsign
40
FIDO Provides Security Without Passwords
41
GitHub Dependabot Now Warns Of Vulnerabilities
42
GitHub Advanced Security Adds Secret Scanning
43
JavaScript Prototype Vulnerabilities
44
Census II Lists Critical Application Libraries
45
Project Zero Reports Faster Bug Patching
46
GitHub Code Scanning Now Uses Machine Learning
47
New Initiative For Taking Open Source Software Security Seriously
48
European Union Will Pay For Finding Bugs In Open Source Software
49
ExpressVPN Offers $100K Bug Bounty
50
ARM Ships Morello Board - The Secure Hardware Of The Future
51
Latest Vulnerability Suggests Compilers Should Learn Unicode
52
The Ultimate Guide to Password Safety
53
TPM Security Easy To Defeat
54
Python3 Course For InfoSec Pros
55
Bug Busting With AWS
56
Google Open Sources Fully Homomorphic Encryption Transpiler
57
Open Source Insights Into The Software Supply Chain
58
New Spectre-Like Vulnerability - Is The Era Of Fast Clever Computers Over?
59
Microsoft Launches Apps Bug Bounty Program
60
DARPA Launches Plans For Fast FHE
61
Track Open Source Vulnerabilities With Google's OSV Database
62
Learn To Protect Against XS-Leaks
63
Veracode Reveals Security Flaws
64
Introduction to OAuth 2.0 and OpenID Connect
65
The Halt And Catch Fire Hack
66
Firefox Raises Bug Bounty Payouts
67
Play & Learn With CryptoHack
68
Sophos Open Sources Sandboxie
69
Power Cycle Your Boeing 787 To Keep It Flying
70
GitHub Security Bug Bounty Milestones
71
Tricking The Tesla
72
Over $21 Million In Google Bug Bounty
73
Random Number Weakness Exposes Devices
74
Google Offers Bug Bounty Up to $1.5 Million
75
GitHub Buys Semmle, Becomes CVE Numbering Authority
76
Facebook Awards $100K Prize For Code Isolation Using MPKs
77
Bluetooth KNOB Attack
78
Kubernetes Security Audit Open Sourced
79
Google Releases Open Source Cryptographic Tool
80
Inputting Data Via Blinkenlights - Another Covert Channel
81
Boeing 737 MAX - Software Outsourcing Criticized
82
GitHub Adds New Code Security Features
83
Chrome Cryptocode Generator Revealed
84
OpenSSH Version 8.0 Released
85
Google Open Sources Sandboxing Tool
86
Counting Vulnerabilities In Open Source Projects and Programming Languages
87
Microsoft Partners With HackerOne On Bug Bounty
88
Tesla Model 3 Pwn2Own'd
89
Linux Foundation Launches Red Team Project
90
Mozilla Argues Australia's Encryption Busting Legislation Needs To be Repealed
91
Microsoft SEAL Cryptography .NET Wrapper Released
92
Google Says Spectre And Meltdown Are Too Difficult To Fix
93
GitHub Bounty Program Increases Rewards
94
Memory Safety Bugs Form 70 Percent Of Vulnerabilities
95
RSA Encryption Cracked By Careless Implementation
96
Pwn2Own Contest To Win A Tesla
97
NSA Will Release Free Reverse Engineering Tool
98
MS Cryptography Library Open Sourced
99
Don't Neglect Mobile App Security
100
Neural Networks Learn to Produce Random Numbers
«
Start
Prev
1
2
3
Next
End
»
Page 1 of 3