Date / Time |
Story |
Friday December 17, 2021 @07:43PM |
Ask Slashdot: Changing Passwords For the New Year? |
Tuesday March 08, 2016 @04:10PM |
FTC Demands Info From PCI Auditors On Breached Companies' Compliance |
Thursday September 10, 2015 @04:18PM |
FireEye Tries to Bury Keynote Reporting That It Ran Apache As Root On Security Servers |
Thursday February 12, 2015 @03:17PM |
Empirical Study On How C Devs Use Goto In Practice Says "Not Harmful" |
Sunday December 28, 2014 @02:22PM |
Ask Slashdot: Dealing With Companies With Poor SSL Practices? |
Thursday May 30, 2013 @09:39AM |
Google Advocates 7-Day Deadline For Vulnerability Disclosure |
Tuesday January 08, 2013 @09:35AM |
What Are the Unwritten Rules of Deleting Code? |
Sunday November 04, 2012 @06:26PM |
Apple Pays Only 2% Corporate Tax Outside US |
Friday November 02, 2012 @09:00PM |
More Than 25% of Android Apps Know Too Much About You |
Thursday August 09, 2012 @10:10AM |
Secret Security Questions Are a Joke |
Thursday November 17, 2011 @03:21PM |
The Futility of Developer Productivity Metrics |
Thursday January 13, 2011 @07:34PM |
Is Samsung Blocking Updates To Froyo? |
Friday December 31, 2010 @10:06PM |
Do Sleepy Surgeons Have a Right To Operate? |
Tuesday November 23, 2010 @09:33PM |
Seagate To Pay Former Worker $1.9M For Phantom Job |
Wednesday September 08, 2010 @02:05AM |
The Effect of Snake Oil Security |
Monday August 16, 2010 @07:10PM |
How Do You Organize Your Experimental Data? |
Thursday June 10, 2010 @09:44PM |
Google Researcher Issues How-To On Attacking XP |