Printers gone wild!March 6, 2015 How NOT to Store Passwords!February 28, 2015 Asymmetric Digital WarfareOctober 7, 2014 29C3 GSM: Cell phone network reviewOctober 7, 2014 Secure code reviews magic or art? A simplified approach to secure code reviewsOctober 7, 2014 DEF CON 13: Google hacking for penetration testersOctober 7, 2014 OWASP AppSecUSA 2011:How NOT to implement cryptography for the OWASP Top 10 (Reloaded)October 7, 2014 DeepSec 2007: Browser hijackingOctober 7, 2014 OWASP AppSecUSA 2011: Ghosts of XSS past, present and futureOctober 7, 2014 22C3: Attacking the IPv6 protocol suiteOctober 7, 2014 DEF CON 17: Hijacking web 2.0 sites with SSLstripOctober 6, 2014 29C3: We are all lawmakers!October 2, 2014 DEF CON 17: MetaPhishOctober 2, 2014 24C3: Cybercrime 2.0October 2, 2014 DEF CON 17: Abusing Firefox AddonsOctober 2, 2014 DeepSec 2010: Android reverse engineering and forensicsOctober 2, 2014 DEF CON 19: Defeating wired 802.1x with a transparent bridge using LinuxOctober 1, 2014 BruCON 2010: Embedded system hacking and my plot to take over the world 1/4October 1, 2014 OHM2013: SIM card exploitationOctober 1, 2014 Embed trojan into a JPG FormatSeptember 18, 2014 Pyrit demonstration (GPU cracking)September 18, 2014 Black Hat USA 2010: Jackpotting automated teller machines redux 1/5September 18, 2014 Toying with barcodesMarch 4, 2015 Rootkits: What they are, and how to find themMarch 2, 2015 Building the DEF CON NetworkOctober 7, 2014 28C3: Towards a single secure European cyberspace?October 7, 2014 RFID hackingOctober 7, 2014 DeepSec 2013: Mobile Fail: Cracking open “secure” Android containersOctober 7, 2014 NOTACON 3: Network printer hackingOctober 7, 2014 DeepSec 2009: Building the next generation IDS engineOctober 7, 2014 DEF CON 14: US-VISIT: Raping personal privacy since 2004October 6, 2014 DEF CON 19: Hacking and forensicating an Oracle database serverOctober 2, 2014 SOURCE Boston 2009: SplunkOctober 2, 2014 Hacking WPA2 key: Evil Twin methodOctober 1, 2014 OWASP AppSecUSA 2011: Simplifying threat modellingOctober 1, 2014 DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your networkOctober 1, 2014 ShmooCon 2014: ISP’s unauthenticated SOAP serviceOctober 1, 2014 DeepSec 2013: Uncovering your trailsSeptember 18, 2014 Remote hack on Damn Vulnerable LinuxSeptember 17, 2014 SOURCE Barcelona 2010: Carders.cc, the rise and fall of an underground forumOctober 7, 2014 Attacking SMS. It’s no longer your BFFOctober 7, 2014 DeepSec 2010: Debugging GSMOctober 7, 2014 DEF CON 16: Forensics is ONLY for Private InvestigatorsOctober 7, 2014 DeepSec 2011: The security of non-executable filesOctober 7, 2014 29C3: Russia’s surveillance stateOctober 7, 2014 ICS Cybersecurity Advanced Training Day 4October 7, 2014 24C3: Mifare (Little security, despite obscurity)October 7, 2014 OWASP AppSecUSA 2012: Bug bounty programsOctober 7, 2014 Introduction to Trusted ComputingOctober 2, 2014 25C3: Hacking the iPhoneOctober 2, 2014 OHM2013: Should law enforcement have hacking powers?October 1, 2014 DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilitiesOctober 1, 2014 24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 SecurityOctober 1, 2014 DeepSec 2013: Cracking and analysing Apple iCloud protocolsOctober 1, 2014 DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3September 18, 2014 DEF CON 17: Making fun of your malwareSeptember 18, 2014 The Honey project and CIC News EngineSeptember 18, 2014 Testing SQL injection with sqlmapSeptember 18, 2014 Battery firmware hackingSeptember 18, 2014 Owning bad guys (and mafia) with JavaScript botnetsSeptember 17, 2014 I know what I'm looking forVideos by category