>
search
cog
I Programmer HOME
Toggle Navigation
Books
Book Reviews
Book Watch
Programmer's Bookshelf
Articles
The Core
Android
Artifical Intelligence
Python
Javascript
WPF Workings
Joomla
PHP
Theory
Silverlight
C#
Other Languages
Visual Basic
C/C++
Mobile
Database
ASP .NET
Hardware/IoT
Graphics/Imaging
UI/UX
Perl
WinRT
HTML/CSS
jQuery
Ruby
Security
Methodology & Testing
Cloud
DevOps
Java
Babbage's Bag
Projects
Programmer Puzzles
C#
C++
Java
JavaScript
Python
PHP
Sharpen Your Coding Skills
History
Machines
People
Software & computer languages
Swift's Spreadsheets
Finance
Personal
General
Professional Programmer
Accreditation & Training
I Programmer
Resources and Tools
I Programmer Weekly
eBooks
Stone Tapes
CodeBin
News
Register
About Us
Security
Title Filter
Display #
5
10
15
20
25
30
50
100
All
#
Article Title
101
Memory Safety Bugs Form 70 Percent Of Vulnerabilities
102
RSA Encryption Cracked By Careless Implementation
103
Pwn2Own Contest To Win A Tesla
104
NSA Will Release Free Reverse Engineering Tool
105
MS Cryptography Library Open Sourced
106
Don't Neglect Mobile App Security
107
Neural Networks Learn to Produce Random Numbers
108
Google Bans Obfuscated Code - Who's To Judge?
109
Tink Library Helps You Develop Secure Code
110
Cybercrime Security Forum Europe
111
Chaff Bugs Make Your Code More Secure
112
Sharpen Your Hacking Skills With CTFLearn
113
ONVIF Challenge Winners
114
Don't Neglect Open Source Security
115
Canada's RAND Immigration Lottery Not Random!
116
PowerHammer - Leaking Data Through The Power Line
117
GitHub Bug Bounty Program Expanded In Scope and Reward
118
Intel Extends Bug Bounty Program
119
Levchin Prize for Real-World Cryptography
120
How Spectre Works
121
How Meltdown Works
122
Bug Bounty Bonanza
123
I Know Who You Are By The Way You Take A Corner
124
Stack Overflow Considered Harmful?
125
Samsung Bug Bounty Program
126
Fluid Passwords - Never The Same Password
127
Hacking Alexa By Whispering In Her Ear
128
More Cash For Internet Bug Bounty
129
Wireshark 2.4 Increases Protocol Coverage
130
Breaking Fitness Records Without Even Moving - Spoofing The Fitbit
131
Google Capture the Flag 2017
132
EU Cookie Law Is A Flop
133
Microsoft Edge Falls Victim At Pwn2Own
134
//No Comment - Trojan of Things, Disk LEDs Leak Data & So Do Phone Magnetometers
135
Get Ready for Expanded Pwn2Own 2017
136
//No Comment - Let's Encrypt, IoT Security & Obfuscation
137
Cure53 XSSMas Hacking Challenge 2016 Underway
138
Project Wycheproof Reveals Bugs In Popular Crypto Libraries
139
Microsoft Launches Cloud Fuzzing Service
140
Microsoft Bug Bounty Extends Scope
141
Your Android Could Leak Data Via USB Charging
142
Airship, a truly secure PHP CMS
143
Can AI Change the Face of Cyber Security?
144
Mayhem Wins DARPA Cyber Grand Challenge
145
Crypto 101 - A Free Ebook
146
SilentKeys A Privacy Aware Keyboard
147
Google Increases Android Bug Rewards
148
XSS Hunter For Pentesting
149
Anonymous Operation Icarus Hits Bank Sites
150
Doubt Over Craig Wright's Claim To Be Bitcoin Inventor - Updated
151
Hack A Chromebook for $100,000
152
Pwn2Own 2016 - The Results
153
Hacksplaining - Learn Through Hacking
154
Hack The Pentagon
155
Vulnerability Revealed In GNU C Library
156
Identifying Programmers From Executable Binaries
157
Teenage Programmer Equals Cyber Criminal
158
Let's Encrypt Now In Public Beta
159
State of Software Security
160
Coordinated Cyber Attack on Greek Banks
161
The Smartwatch Spy
162
Firefox, Chrome & Opera Block Access To Routers
163
How The Jeep Was Hacked
164
Microsoft Doubles Bounty Payouts
165
Your Phone's Battery Leaks - Your Id That Is
166
RC4 Stream Cypher - 75 Hours To Crack
167
Million Air Miles Bounty Awarded
168
New Android Bug Bounty Scheme
169
Navy Solicits Vulnerabilities
170
Mozilla Increases Bug Bounty
171
LOGJAM - Can The NSA Break 1024-bit DHM Keys?
172
Software Quality Blamed For Airbus Crash
173
Earn United Airlines Award Miles For Finding Bugs
174
Reboot Your Dreamliner Every 248 Days To Avoid Integer Overflow
175
Microsoft Expands Bounty Programs
176
How Secure Is Android? Very Secure
177
GitHub Under DDoS Attack
178
Largest Payout Ever At Pwn2Own 2015
179
Yahoo's New Disposable Passwords
180
Rowhammer - Changing Memory Without Accessing It
181
All Change For Pwnium V
182
WebRTC Leaks Local IP Addresses
183
NTP The Latest Open Source Security Problem
184
Upgrade Git Client To Avoid Vulnerability
185
What Does The NSA Think Of Cryptographers?
186
Double Rewards For Finding Bugs In Facebook Ads Code
187
Poodle Is A Very Different Sort Of Security Breach
188
Google Increases Maximum Bounty For Chrome Bugs
189
New Online Services Bug Bounty Program
190
ShellShock - Yet Another Code Injection Vulnerability
191
The Canvas Fingerprint - How?
192
Cat Photos - A Potential Security Risk?
193
Hijacking Chromecast Is Easy
194
Bitcoin Isn't As Anonymous As You Might Hope
195
Cryptol Version 2 Released
196
Internet Explorer Vulnerability Poses Threat Of Remote Code Execution
197
Mozilla Offers $10K For Critical Flaws In New Certificate Verification Scheme
198
Heartbleed - The Programmer's View
199
Facebook ThreatData
200
MozDef - Mozilla's Self Defence Kit
«
Start
Prev
1
2
3
Next
End
»
Page 2 of 3