>
search
cog
I Programmer HOME
Toggle Navigation
Books
Book Reviews
Book Watch
Programmer's Bookshelf
Articles
The Core
Android
Artifical Intelligence
Python
Javascript
WPF Workings
Joomla
PHP
Theory
Silverlight
C#
Other Languages
Visual Basic
C/C++
Mobile
Database
ASP .NET
Hardware/IoT
Graphics/Imaging
UI/UX
Perl
WinRT
HTML/CSS
jQuery
Ruby
Security
Methodology & Testing
Cloud
DevOps
Java
Babbage's Bag
Projects
Programmer Puzzles
C#
C++
Java
JavaScript
Python
PHP
Sharpen Your Coding Skills
History
Machines
People
Software & computer languages
Swift's Spreadsheets
Finance
Personal
General
Professional Programmer
Accreditation & Training
I Programmer
Resources and Tools
I Programmer Weekly
eBooks
Stone Tapes
CodeBin
News
Register
About Us
Security
Title Filter
Display #
5
10
15
20
25
30
50
100
All
#
Article Title
201
Stick Figure Guide To AES Encryption
202
Facebook Refuses Bounty, Internet Raises Over $10K
203
Public Key Cryptography Set To Fail In Five Years
204
Android Security Hole More Stupid Error Than Defect
205
Microsoft Offers $100,000 For Novel Exploits
206
Crypto Made Easy
207
Is Exploiting A Bug Hacking?
208
Open Source Homomorphic Cryptography
209
Another Java 7 Security Flaw
210
Oracle Releases Java Critical Patch Updates
211
Oracle Patches 86 Flaws in Database and Enterprise Products
212
Java Still Insecure Warns Homeland Security
213
25 GPUs Crack Passwords In Minutes
214
Java Is Top Attack Target
215
Hackers Target SQL Injection
216
Smartphone Apps Track Users Even When Off
217
PlaceRaider - Your Phone Can Steal A 3D Model Of Your Location
218
Oracle Login Weakness
219
Frankenstein - Stitching Code Bodies Together To Hide Malware
220
Google Announces More Cash For Security Bugs
221
ROP Mitigations Bypassed
222
BlueHat Prizes Awarded
223
Cartoon - Digital Rights or Wrongs?
224
Irises Change Over Time - Problem for Biometric Testing
225
Siri a Security Risk for IBM
226
A Short History of Hacking
227
Chrome, IE and Firefox Hacked
228
Inside Stuxnet
229
Chrome Hacked Twice at CanSecWest
230
FSF Opposes Restricted Boot
231
Google Offers $1 million for Chrome Hack
232
Kinect The Ultimate Security Device
233
Facebook's White Hat VISA Card
234
Print Me If You Dare - the Rise of Printer Malware
235
Quick action to patch ASP.NET vulnerability
236
The Computer Science of Insecurity
237
Cyber Attacks and Holidays
238
Planes are Unix hosts waiting to be hacked
239
Security by obscurity - a new theory
240
When cookies leak data
241
Search the world's smartphone photos
242
CIA/NSA want a photo location finder
243
Zodiac Killer code cracked? Cryptography at its worst
244
Microsoft releases source code for low-level WiFi
245
Passcodes prove predictable
246
Bitcoin still standing - but panic takes over
247
Audio CAPTCHA easily cracked
248
Cracking a Skype call using phonemes
249
Disk encryption made secure by amnesia
250
Hiding data in disk fragmentation
251
Cracking Stuxnet - a beginner's guide
252
GPS spoofing the new game in town
253
Chrome Safe In Pwn2Own Contest
254
iPhone passwords hacked in six minutes
255
Set a smartphone to hack a PC
«
Start
Prev
1
2
3
Next
End
»
Page 3 of 3