Title Filter     Display # 
# Article Title
1 Introduction to OAuth 2.0 and OpenID Connect
2 The Halt And Catch Fire Hack
3 Firefox Raises Bug Bounty Payouts
4 Play & Learn With CryptoHack
5 Sophos Open Sources Sandboxie
6 Power Cycle Your Boeing 787 To Keep It Flying
7 GitHub Security Bug Bounty Milestones
8 Tricking The Tesla
9 Over $21 Million In Google Bug Bounty
10 Random Number Weakness Exposes Devices
11 Google Offers Bug Bounty Up to $1.5 Million
12 GitHub Buys Semmle, Becomes CVE Numbering Authority
13 Facebook Awards $100K Prize For Code Isolation Using MPKs
14 Bluetooth KNOB Attack
15 Kubernetes Security Audit Open Sourced
16 Google Releases Open Source Cryptographic Tool
17 Inputting Data Via Blinkenlights - Another Covert Channel
18 Boeing 737 MAX - Software Outsourcing Criticized
19 GitHub Adds New Code Security Features
20 Chrome Cryptocode Generator Revealed
21 OpenSSH Version 8.0 Released
22 Google Open Sources Sandboxing Tool
23 Counting Vulnerabilities In Open Source Projects and Programming Languages
24 Microsoft Partners With HackerOne On Bug Bounty
25 Tesla Model 3 Pwn2Own'd
26 Linux Foundation Launches Red Team Project
27 Mozilla Argues Australia's Encryption Busting Legislation Needs To be Repealed
28 Microsoft SEAL Cryptography .NET Wrapper Released
29 Google Says Spectre And Meltdown Are Too Difficult To Fix
30 GitHub Bounty Program Increases Rewards
31 Memory Safety Bugs Form 70 Percent Of Vulnerabilities
32 RSA Encryption Cracked By Careless Implemenation
33 Pwn2Own Contest To Win A Tesla
34 NSA Will Release Free Reverse Engineering Tool
35 MS Cryptography Library Open Sourced
36 Don't Neglect Mobile App Security
37 Neural Networks Learn to Produce Random Numbers
38 Google Bans Obfuscated Code - Who's To Judge?
39 Tink Library Helps You Develop Secure Code
40 Cybercrime Security Forum Europe
41 Chaff Bugs Make Your Code More Secure
42 Sharpen Your Hacking Skills With CTFLearn
43 ONVIF Challenge Winners
44 Don't Neglect Open Source Security
45 Canada's RAND Immigration Lottery Not Random!
46 PowerHammer - Leaking Data Through The Power Line
47 GitHub Bug Bounty Program Expanded In Scope and Reward
48 Intel Extends Bug Bounty Program
49 Levchin Prize for Real-World Cryptography
50 How Spectre Works
51 How Meltdown Works
52 Bug Bounty Bonanza
53 I Know Who You Are By The Way You Take A Corner
54 Stack Overflow Considered Harmful?
55 Samsung Bug Bounty Program
56 Fluid Passwords - Never The Same Password
57 Hacking Alexa By Whispering In Her Ear
58 More Cash For Internet Bug Bounty
59 Wireshark 2.4 Increases Protocol Coverage
60 Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
61 Google Capture the Flag 2017
62 EU Cookie Law Is A Flop
63 Microsoft Edge Falls Victim At Pwn2Own
64 //No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
65 Get Ready for Expanded Pwn2Own 2017
66 //No Comment - Let's Encrypt, IoT Security & Obfuscation
67 Cure53 XSSMas Hacking Challenge 2016 Underway
68 Project Wycheproof Reveals Bugs In Popular Crypto Libraries
69 Microsoft Launches Cloud Fuzzing Service
70 Microsoft Bug Bounty Extends Scope
71 Your Android Could Leak Data Via USB Charging
72 Airship, a truly secure PHP CMS
73 Can AI Change the Face of Cyber Security?
74 Mayhem Wins DARPA Cyber Grand Challenge
75 Crypto 101 - A Free Ebook
76 SilentKeys A Privacy Aware Keyboard
77 Google Increases Android Bug Rewards
78 XSS Hunter For Pentesting
79 Anonymous Operation Icarus Hits Bank Sites
80 Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
81 Hack A Chromebook for $100,000
82 Pwn2Own 2016 - The Results
83 Hacksplaining - Learn Through Hacking
84 Hack The Pentagon
85 Vulnerability Revealed In GNU C Library
86 Identifying Programmers From Executable Binaries
87 Teenage Programmer Equals Cyber Criminal
88 Let's Encrypt Now In Public Beta
89 State of Software Security
90 Coordinated Cyber Attack on Greek Banks
91 The Smartwatch Spy
92 Firefox, Chrome & Opera Block Access To Routers
93 How The Jeep Was Hacked
94 Microsoft Doubles Bounty Payouts
95 Your Phone's Battery Leaks - Your Id That Is
96 RC4 Stream Cypher - 75 Hours To Crack
97 Million Air Miles Bounty Awarded
98 New Android Bug Bounty Scheme
99 Navy Solicits Vulnerabilities
100 Mozilla Increases Bug Bounty
Page 1 of 2