search
cog
I Programmer HOME
Toggle Navigation
Books
Book Reviews
Book Watch
Programmer's Bookshelf
Bargain Computer Books
Articles
The Core
Python
Javascript
WPF Workings
Joomla
PHP
Theory
Silverlight
C#
Artifical Intelligence
Other Languages
Visual Basic
C/C++
Mobile
Database
ASP .NET
Hardware/IoT
Graphics/Imaging
UI/UX
Perl
WinRT
HTML/CSS
jQuery
Ruby
Android
Security
Methodology & Testing
Cloud
Babbage's Bag
Projects
Programmer Puzzles
C#
C++
Java
JavaScript
Python
PHP
Sharpen Your Coding Skills
History
Machines
People
Software & computer languages
Swift's Spreadsheets
Finance
Personal
General
Professional Programmer
Accreditation & Training
I Programmer
Resources and Tools
I Programmer Weekly
eBooks
Stone Tapes
CodeBin
News
Register
Change Region
About Us
Security
Title Filter
Display #
5
10
15
20
25
30
50
100
All
#
Article Title
1
Veracode Reveals Security Flaws
2
Introduction to OAuth 2.0 and OpenID Connect
3
The Halt And Catch Fire Hack
4
Firefox Raises Bug Bounty Payouts
5
Play & Learn With CryptoHack
6
Sophos Open Sources Sandboxie
7
Power Cycle Your Boeing 787 To Keep It Flying
8
GitHub Security Bug Bounty Milestones
9
Tricking The Tesla
10
Over $21 Million In Google Bug Bounty
11
Random Number Weakness Exposes Devices
12
Google Offers Bug Bounty Up to $1.5 Million
13
GitHub Buys Semmle, Becomes CVE Numbering Authority
14
Facebook Awards $100K Prize For Code Isolation Using MPKs
15
Bluetooth KNOB Attack
16
Kubernetes Security Audit Open Sourced
17
Google Releases Open Source Cryptographic Tool
18
Inputting Data Via Blinkenlights - Another Covert Channel
19
Boeing 737 MAX - Software Outsourcing Criticized
20
GitHub Adds New Code Security Features
21
Chrome Cryptocode Generator Revealed
22
OpenSSH Version 8.0 Released
23
Google Open Sources Sandboxing Tool
24
Counting Vulnerabilities In Open Source Projects and Programming Languages
25
Microsoft Partners With HackerOne On Bug Bounty
26
Tesla Model 3 Pwn2Own'd
27
Linux Foundation Launches Red Team Project
28
Mozilla Argues Australia's Encryption Busting Legislation Needs To be Repealed
29
Microsoft SEAL Cryptography .NET Wrapper Released
30
Google Says Spectre And Meltdown Are Too Difficult To Fix
31
GitHub Bounty Program Increases Rewards
32
Memory Safety Bugs Form 70 Percent Of Vulnerabilities
33
RSA Encryption Cracked By Careless Implemenation
34
Pwn2Own Contest To Win A Tesla
35
NSA Will Release Free Reverse Engineering Tool
36
MS Cryptography Library Open Sourced
37
Don't Neglect Mobile App Security
38
Neural Networks Learn to Produce Random Numbers
39
Google Bans Obfuscated Code - Who's To Judge?
40
Tink Library Helps You Develop Secure Code
41
Cybercrime Security Forum Europe
42
Chaff Bugs Make Your Code More Secure
43
Sharpen Your Hacking Skills With CTFLearn
44
ONVIF Challenge Winners
45
Don't Neglect Open Source Security
46
Canada's RAND Immigration Lottery Not Random!
47
PowerHammer - Leaking Data Through The Power Line
48
GitHub Bug Bounty Program Expanded In Scope and Reward
49
Intel Extends Bug Bounty Program
50
Levchin Prize for Real-World Cryptography
51
How Spectre Works
52
How Meltdown Works
53
Bug Bounty Bonanza
54
I Know Who You Are By The Way You Take A Corner
55
Stack Overflow Considered Harmful?
56
Samsung Bug Bounty Program
57
Fluid Passwords - Never The Same Password
58
Hacking Alexa By Whispering In Her Ear
59
More Cash For Internet Bug Bounty
60
Wireshark 2.4 Increases Protocol Coverage
61
Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
62
Google Capture the Flag 2017
63
EU Cookie Law Is A Flop
64
Microsoft Edge Falls Victim At Pwn2Own
65
//No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
66
Get Ready for Expanded Pwn2Own 2017
67
//No Comment - Let's Encrypt, IoT Security & Obfuscation
68
Cure53 XSSMas Hacking Challenge 2016 Underway
69
Project Wycheproof Reveals Bugs In Popular Crypto Libraries
70
Microsoft Launches Cloud Fuzzing Service
71
Microsoft Bug Bounty Extends Scope
72
Your Android Could Leak Data Via USB Charging
73
Airship, a truly secure PHP CMS
74
Can AI Change the Face of Cyber Security?
75
Mayhem Wins DARPA Cyber Grand Challenge
76
Crypto 101 - A Free Ebook
77
SilentKeys A Privacy Aware Keyboard
78
Google Increases Android Bug Rewards
79
XSS Hunter For Pentesting
80
Anonymous Operation Icarus Hits Bank Sites
81
Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
82
Hack A Chromebook for $100,000
83
Pwn2Own 2016 - The Results
84
Hacksplaining - Learn Through Hacking
85
Hack The Pentagon
86
Vulnerability Revealed In GNU C Library
87
Identifying Programmers From Executable Binaries
88
Teenage Programmer Equals Cyber Criminal
89
Let's Encrypt Now In Public Beta
90
State of Software Security
91
Coordinated Cyber Attack on Greek Banks
92
The Smartwatch Spy
93
Firefox, Chrome & Opera Block Access To Routers
94
How The Jeep Was Hacked
95
Microsoft Doubles Bounty Payouts
96
Your Phone's Battery Leaks - Your Id That Is
97
RC4 Stream Cypher - 75 Hours To Crack
98
Million Air Miles Bounty Awarded
99
New Android Bug Bounty Scheme
100
Navy Solicits Vulnerabilities
«
Start
Prev
1
2
Next
End
»
Page 1 of 2