Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
SHOW DETAILS
up-solid down-solid
Prior Page
eye
Title
Date Archived
Creator
Part three of my four part series about my “new” Amiga 500. In part 1 (https://youtu.be/5_q0235udJo) I was testing the machine and preparing a floppy drive emulator. In part 2 (https://youtu.be/G00QA1r5M6I) I was cleaning the whole machine which was extremely dirty and rusty and repairing the keyboard and internal floppy drive. This time I am making a proper video adapter, find a new home for the floppy drive emulator and make sure we can boot from the emulator when connected as an external...
Topics: Youtube, video, Gaming, retro, retro computing, amiga, commodore, video cable, gotek, cia, floppy,...
The final part four of my series about my “new” Amiga 500. In part 1 (https://youtu.be/5_q0235udJo) I was testing the machine and preparing a floppy drive emulator. In part 2 (https://youtu.be/G00QA1r5M6I) I was cleaning the whole machine which was extremely dirty and rusty and repairing the keyboard and internal floppy drive. In part 3 (https://youtu.be/tU3zFTXRXlU) I was making a proper video adapter, found a new home for the floppy drive emulator and made sure we can boot from the...
Topics: Youtube, video, Gaming, retro, retro computing, amiga, commodore, kickrom, mouse, ps/2, repair,...
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

An Analysis of Micro and Macro Cyber Attacks in the Ongoing War in Yemen CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Allan Liska, Winnona DeSombre, and Greg Lesnewich, Recorded Future Recording Sponsored by RiskIQ Yemen has been at civil war for more than 3 years. The Yemeni civil war isn't just a war between different factions in Yemen it has also served a proxy war for major global powers. This means that while there are cyber attacks ongoing between the two Yemeni factions...
Topics: Youtube, video, People & Blogs, CYBERWARCON
A panel discussion during Kaspersky Lab's Cyber Security Symposium and Global Corporate Product Launch. Panelists address how cyber-war affects both corporate and global security and provide an inside look at targeted attacks on nation states and businesses. Left to right: Moderator: Peter Firstbrook, Research Director, Gartner; Panelists: Eugene Kaspersky, Chairman and CEO, Kaspersky Lab; Gary McGraw, PhD and Chief Technology Officer of Cigital; Steve Adegbite, Director Cyber Innovations at...
Topics: Youtube, video, Science & Technology, IT security, business, IT business, Internet Security,...
Hacking and InfoSec stuff
movies

eye 18

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=TxbPPHTkgXY Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 13

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=_UIcJ1Bnxa0 Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 69

favorite 0

comment 0

How to Analyze Wi-Fi Data Using Jupyter Notebook Full Tutorial: https://nulb.app/x4ogu Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 141 Wireshark is a great tool for analyzing Wi-Fi packets and collecting information about the network traffic. However, this much information can be burdensome so interpret in a meaningful way without some help. Today, on this episode of Cyber Weapons Lab, we'll use Jupyter Notebook to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 25

favorite 0

comment 0

Another edition of "Lab Matters" with a special guest Uri Rivner, Head of New Technologies, Identity Protection and Verification, RSA Security, where he describes what happened when RSA was hacked with a zero-day vulnerability. Source: https://www.youtube.com/watch?v=I6fVydTJ1cg Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, targeted attacks, rsa, zero-day vulnerabilities, Uri...
Hacking and InfoSec stuff
by MIT Bitcoin Club
movies

eye 111

favorite 0

comment 0

Like us on Facebook! https://www.facebook.com/MITBitcoinClub Follow us on Twitter! https://twitter.com/MITBitcoinClub Follow us on Instagram! @mitbitcoinclub Check out our website http://bitcoin.mit.edu/ Source: https://www.youtube.com/watch?v=J8y_GypCWf4 Uploader: MIT Bitcoin Club Upload date: 2015-02-17
Topics: Youtube, video, Education, Bitcoin (Currency), Andreas Antonopoulos, MIT
Hacking and InfoSec stuff
movies

eye 30

favorite 0

comment 0

Bitcoin Wednesday #22 Featuring Andreas Antonopoulos on 1 April 2015. The Bitcoin Expert gives a keynote about cryptocurrency, social and economic implications and future applications. After the keynote he does an extended Q&A session in which he answers questions asked of him by the Dutch government and the public at Bitcoin Wednesday. He also talks about the Bitcoin technology as well as his startup Third Key Solutions which was launched the day before. Source:...
Topics: Youtube, video, People & Blogs, Keynote, Q&A, Question And Answer, Bitcoin Wednesday, 1...
Hacking and InfoSec stuff
movies

eye 32

favorite 0

comment 0

Testimony at the Senate Economics References Committee of the Australian Senate, on March 4, 2015. Presenting on digital currencies and bitcoin. Text of the opening remarks: http://antonopoulos.com/2015/03/03/opening-remarks-andreas-m-antonopoulos-testimony-for-the-australian-senate-committee-on-economics-references-march-4th-2015/ Source: https://www.youtube.com/watch?v=XotOwt8bTeI Uploader: aantonop Upload date: 2015-03-03
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 16

favorite 0

comment 0

Hackerpraktikum vom 16.01.2013 Source: https://www.youtube.com/watch?v=zVu5ZYIMOto Uploader: Marcus Niemietz
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
movies

eye 14

favorite 0

comment 0

A student's life ago, the author somehow managed to graduate. On the way, he made a lot of mistakes – and he still does. A few people since called him 'successful', but LOL, if only they knew ... And now, the author will do another (big!) mistake: instead of hiding in shame as he probably should, he'll share his mistakes with anyone bored enough to attend, in the hope that he's the last person to ever look that dumb to commit such mistakes. If you're a genius and you know what to do in life,...
Topics: Youtube, video, Science & Technology, HackPra
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 20

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=RZfJfSdjN4g Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

In this talk, we will explain why diversity is essential for reaching the desired security and anonymity properties. Both for the Tor Project organization itself, but also for our community, as well as in our daily work with creating privacy-enhancing tools such as the Tor Browser or safeguarding the network itself against attackers. Alex (ahf) is a Free software minded hacker from Copenhagen who enjoys working on privacy-enhancing technologies, cryptography, security, and distributed systems....
Topics: Youtube, video, Nonprofits & Activism
Hacking and InfoSec stuff
by Privacy International
movies

eye 16

favorite 0

comment 0

More videos and information here: https://privacyinternational.org Support PI here: https://privacyinternational.org/donate Source: https://www.youtube.com/watch?v=6_nNOViNLt0 Uploader: Privacy International
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
Hacking and InfoSec stuff
movies

eye 23

favorite 0

comment 0

Are US Cyber Deterrence Operations Suppressing or Inciting Attacks? CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Jason Healey and Neil Jenkins, Columbia University and Cyber Threat Alliance Recording Sponsored by RiskIQ It is now the policy of the United States to use offensive cyber operations to force adversaries to stop or reduce their attacks. Critics believe such counteroffensive activity may only inflame adversaries, seeing the new U.S. actions as aggressive themselves,...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 14

favorite 0

comment 0

The words 'Cloud' and 'Grid Computing' have caused quite a stir for a number of years now. Service providers are telling everyone they can about SaaS, PaaS and other aaS and are quick to point to the benefits received by customers already using these services. IT security companies have not lagged behind in introducing new cloud-based services either. But what actually is 'in-the-cloud' security? What lies behind the wondrous names that these new technologies are given and how do these...
Topics: Youtube, video, Science & Technology, Cloud, Grid Computing, in-the-cloud security, Paul...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 28

favorite 0

comment 0

The SAS 2015 martial-artists are in advanced stages of preparation. Join the battle… Source: https://www.youtube.com/watch?v=VbS061V7NE4 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Kaspersky Lab (Business Operation), The sas, SAS,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 25

favorite 0

comment 0

As we ponder the dangers shared by the virtual world and the real world, it's important to understand that it's impossible for a single person to build a safe future for both worlds. If you care about securing both worlds, join me at #TheSAS2017 More information at https://sas.kaspersky.com Get access to the unique videos of the presentations given at #TheSAS2016: https://kas.pr/Y1X6 #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=bUL8VBuSYUs Uploader: Kaspersky...
Topics: Youtube, video, Entertainment, #TheSAS2017, kaspersky lab, cybersecurity, itsecurity, conference
Area41 Security Conference 2014: Ange Albertini & Gynvael Coldwind: Schizophrenic Files – A file that thinks it's many Source: https://www.youtube.com/watch?v=9Hm0obaDC58 Uploader: defconswitzerland
Topics: Youtube, video, Science & Technology, Area41, Security Conference, Ange Albertini, Gynvael...
Hacking and InfoSec stuff
movies

eye 38

favorite 0

comment 0

Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly Instagram: https://www.instagram.com/oreillymedia LinkedIn: https://www.linkedin.com/company-beta/8459/ Source: https://www.youtube.com/watch?v=ln6MdYjIJug Uploader: O'Reilly
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 21

favorite 0

comment 0

Los expertos en seguridad de Kaspersky Lab, Santiago Pontirol y Roberto Martinez explican cómo funciona el malware que afecta a los cajeros automáticos en Latinoamérica y por qué es tan difícil descubrir este malware Source: https://www.youtube.com/watch?v=7j2ES5bxFZw Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, thesas2012, kaspersky lab, cybersecurity
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 15

favorite 0

comment 0

In this newest edition of Lab Matters, Director of Kaspersky Lab's Global Research and Analysis Team Costin Raiu offers some predictions about what we will see in the second half of 2011. Raiu's predictions include a surge in malicious activity on mobile device app stores. Source: https://www.youtube.com/watch?v=mfMSBzi25SE Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, malicious activity, predictions 2011, Android, Costin...
Hacking and InfoSec stuff
movies

eye 66

favorite 0

comment 0

I bought an Atari 1040STf quite a while ago and spent several months cleaning it, making an operating system upgrade that allows me to select the TOS version using a switch. I also replace the broken floppy drive and build a VGA cable for it. And I use Retr0bright on the case, failing horribly. So the whole video is a mixture of great success and terrible failure. Enjoy! Source: https://www.youtube.com/watch?v=jP0vpyM_kAk Uploader: flash /me back
Topics: Youtube, video, Gaming, retro, retrocomputing, atari, 1040, st, old hardware, soldering,...
Hacking and InfoSec stuff
movies

eye 49

favorite 0

comment 0

In recent years, Machine Learning (ML) techniques have been extensively deployed for computer vision tasks, particularly visual classification problems, where new algorithms reported to achieve or even surpass the human performance... By: Dou Goodman, Yang Wang & Hao Xin Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#attacking-and-defending-machine-learning-applications-of-public-cloud-18725 Source:...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
movies

eye 70

favorite 0

comment 0

The talk about attacks on industrial enterprises by Vyacheslav Kopeytsev from Kaspersky Lab on Industrial Cybersecurity Conference 2019. #KasperskyLab #KICS #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=SZrDLehoAPY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, ICSSecurity, ICSCybersecurity, KICS, Industrial,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 64

favorite 1

comment 0

The talk about cyber espionage by Yury Namestnikov from Kaspersky Lab on Industrial Cybersecurity Conference 2019. #KasperskyLab #KICS #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=n6MFrCJj6II Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, ICSSecurity, ICSCybersecurity, KICS, Industrial,...
Hacking and InfoSec stuff
movies

eye 38

favorite 0

comment 0

Adam Meyers, VP Intelligence, CrowdStrike In July 2016, Google released their Cloud Natural Language API. This presentation will explore the use of NLP in Threat Intel and demonstrate findings from its use against the Virus Total platform. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=VNuPmxGakw0 Uploader: RSA Conference Upload date: 2017-02-19
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Hackers & Threats, Security...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 13

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=7FeiZQ2BkiA Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 53

favorite 0

comment 0

Cory Doctorow and Charles Stross have just signed with Tor Books to co-author a fix-up novel based on a series of short stories called Rapture of the Nerds. The authors and their editor told us what to expect: Cory and Charlie intend to write a third novella in the sequence begun with "Jury Service" and "Appeals Court," and THE RAPTURE OF THE NERDS will consist of all three novellas, possibly with some small additional connective tissue if necessary. Many distinguished SF...
Topics: Youtube, video, Nonprofits & Activism, TalksAtGoogle
Hacking and InfoSec stuff
movies

eye 366

favorite 2

comment 0

How to Automate Wi-Fi Hacking with Wifite2 on Kali Full Tutorial: http://bit.ly/Wifite2 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux comes with an array of tools designed to scan and attack Wi-Fi networks out of the box. We'll show you how to automate this process with Wifite2 on this episode of Cyber Weapons Lab. If you don't have Wifite2 installed, it's easy enough to do so. Wifite2 can target WPS, WPA, and WEP networks. And it uses...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 47

favorite 0

comment 0

While WikiLeaks managed to get mainstream media attention all around the world by publishing leaked documents which turned governments upside down and caught multi-national companies off-guard, smaller organizations and even individuals are facing a very similar threat of their own, which is as dangerous as it is overlooked. Stolen identities, data breaches and financial crimes - they are all examples of what the average user is facing on a day-to-day basis. Even though these crimes are carried...
Topics: Youtube, video, Science & Technology, wikileaks, stolen identities, data breaches, financial...
Hacking and InfoSec stuff
movies

eye 21

favorite 0

comment 0

Nearly two full hours of step-by-step instruction details the use of computer-generated curve picks, rockers, magnetic lock picking, lock-aid guns, and elect... Source: https://www.youtube.com/watch?v=F2GK9xZJhvQ Uploader: mhzghz2
Topics: Youtube, video, gbppr, lock, `picking, covert, entry
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 47

favorite 0

comment 0

In early September 2016, a story was published about an Israeli DDoS-for-hire service, vDOS, which had been hacked, revealing “tens of thousands of paying customers and their (DDoS) targets.” Afterwards, vDOS itself was also a victim of a recent BGP hijack from a company called BackConnect. The CEO of BackConnect defended this act as justifiable and said it was a one-time event. Dyn provided some some assistance in researching what appeared to be a series of BGP hijacks conducted by...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
movies

eye 53

favorite 0

comment 0

For us, understanding a botnet’s infrastructure is an essential part of research and since nowadays almost all of relevant threats are behind myriads of proxies and bulletproof servers, penetration of those servers is equally important, and quite fun! In this talk, I will present a few undisclosed vulnerabilities in popular crimeware C&C’s and share some stories about how criminals run their operations. * Get exclusive access to more presentations given at #TheSAS2017:...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 341

favorite 0

comment 0

CULT OF THE DEAD COW released Back Orifice 2000 at DEF CON 7, held in July 1999 at the Alexis Park Resort in Las Vegas. Withheld from the public for 20 years, this candid footage taken inside the Suite of the Elite provides an eyewitness glimpse of the final hours leading up to this unforgettable point in hacker culture. Back during the days of media demonization of hackers, before industry embraced bug bounties, and before the mainstream adoption of Linux, cDc found a way to raise public...
Topics: Youtube, video, Science & Technology, Cult of the Dead Cow, Ninja Strike Force, Back Orifice...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 37

favorite 0

comment 0

This was on the cDc site in the days leading up to the release of everyone's favorite remote network administration tool, Back Orifice 2000, in July of 1999. Source: https://www.youtube.com/watch?v=_maZ2Kf5KDs Uploader: cultdeadcow
Topics: Youtube, video, Entertainment, bo2k, back, orifice, 2000, cdc, cult, dead, cow, hack, hacking,...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 58

favorite 0

comment 0

You'd Better Buy Some More Lube This was on the cDc site in the days leading up to the release of everyone's favorite remote network administration tool, Back Orifice 2000, in July of 1999. Source: https://www.youtube.com/watch?v=_Nfuz3oAO_M Uploader: cultdeadcow
Topics: Youtube, video, Science & Technology, cdc, cult, dead, cow, bo2k, back, orifice, 2000, defcon,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 41

favorite 0

comment 0

Tizen is Samsung's newest OS for devices and considered by them as the operation system of everything, aiming to run on every device from simple IoT, mobile phones, televisions, and even vehicles. Today #Tizen could be found mostly in Samsung's newest televisions and on some mobile phones in certain markets. There are currently than 10 million Tizen devices in the world. Over the last few months, I observed that Samsung is laying the groundwork for a larger expansion of Tizen in the mobile...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=0xhC3n4CDrs Uploader: BSides Belfast
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 26

favorite 0

comment 0

My talk at BSides Orlando 2019 was all about running physical security operations for conferences and events. In an arena where words are your most powerful weapons and you most useful tools, I ask all in attendance to consider what training and techniques they've learned and practiced when it comes to conflict de-escalation, crisis management, and victim counseling. The full talk is up on their YouTube channel... https://www.youtube.com/watch?v=dVTcifBspRc ...and I'd value and appreciate your...
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
movies

eye 16

favorite 0

comment 0

Intruders are attacking mobile networks from all possible angles, in part by leveraging multiple protocols in combined attacks. In this presentation, I will describe how an attacker can take advantage of vulnerabilities in different generations of signaling protocols... By: Sergey Puzankov Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#back-to-the-future-cross-protocol-attacks-in-the-era-of-g-18586 Source:...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 46

favorite 0

comment 0

Thomas Rid of King's College London presents the previously untold story of MOONLIGHT MAZE, the first known state-on-state computer espionage campaign in history. A detailed account is in the last chapter of his book RISE OF THE MACHINES, out in the summer of 2016, http://amzn.to/1qGVOGX APT, a bit of jargon Thomas uses to open the talk, stands for "Advanced Persistent Threat," a common shorthand for espionage campaign. Source: https://www.youtube.com/watch?v=zSrjkWDXSS8 Uploader:...
Topics: Youtube, video, Science & Technology, thesas2016, kaspersky lab, cybersecurity
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 28

favorite 0

comment 0

Michael Toecker, Context Industrial Security A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=dScvurCKMGQ Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
by CYBERWARCON
movies

eye 17

favorite 0

comment 0

Barely Whispering CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Kurt Baumgartner, Kaspersky Recording Sponsored by RiskIQ Data points over the past couple of years provide quiet hints of links between what was previously considered Sofacy, Zebrocy, and Black Energy. Now, evidence seems to suggest yet another clustering. Some of these connectors breezed through public discussion and some have not. However, when data unexpectedly overlaps between even Turla and Zebrocy, these weak...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 18

favorite 0

comment 0

Botnets (infected computers controlled by cybercriminals) are a global problem without a clear-cut solution. Despite the best efforts of security response teams, the fight against botnets is hamstrung by legal and technical issues. Taking over an international botnet in order to disinfect the drones without permission from the infected victims is a classic example of action being technically possible, but restricted by law. More recently, law enforcement agencies have pursued some avenues to...
Topics: Youtube, video, Science & Technology, Botnets, cybercriminals, DDoS attacks, Kido, Tillmann...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 16

favorite 0

comment 0

Botnets (infected computers controlled by cybercriminals) are a global problem without a clear-cut solution. Despite the best efforts of security response teams, the fight against botnets is hamstrung by legal and technical issues. Taking over an international botnet in order to disinfect the drones without permission from the infected victims is a classic example of action being technically possible, but restricted by law. More recently, law enforcement agencies have pursued some avenues to...
Topics: Youtube, video, Science & Technology, Botnets, cybercriminals, DDoS attacks, Kido, Tillmann...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 14

favorite 0

comment 0

Botnets (infected computers controlled by cybercriminals) are a global problem without a clear-cut solution. Despite the best efforts of security response teams, the fight against botnets is hamstrung by legal and technical issues. Taking over an international botnet in order to disinfect the drones without permission from the infected victims is a classic example of action being technically possible, but restricted by law. More recently, law enforcement agencies have pursued some avenues to...
Topics: Youtube, video, Science & Technology, Botnets, cybercriminals, DDoS attacks, Kido, Tillmann...
Hacking and InfoSec stuff
by GoogleTechTalks
movies

eye 26

favorite 0

comment 0

Google Tech Talks September 13, 2007 ABSTRACT TBA Credits: Speaker:Mike Pittaro Source: https://www.youtube.com/watch?v=vsEy6HzXoCo Uploader: GoogleTechTalks Upload date: 2007-10-08
Topics: Youtube, video, Howto & Style, google, howto, baypiggies, developing, product
Bears in the Lines: Russian Critical Infrastructure Espionage in the Face of US Grid Resilience CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Alex Orleans, FireEye Recording Sponsored by RiskIQ This talk examines the relative resiliency across the U.S. electricity sector to Russia-nexus cyber operations and why, despite significant resiliency in key targets, actors like TEMP.Isotope (aka Dragonfly 2.0, Berserk/Energetic Bear) will continue to engage such targets into the...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 1,270

favorite 8

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education, software cracking, cracking, cracking software, software, hacking, crack...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 465

favorite 8

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education, hacking, hacking tutorial, hacker, hackers, learn hacking, hack, hacking...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 89

favorite 5

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 94

favorite 4

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 90

favorite 4

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by CYBERWARCON
movies

eye 17

favorite 0

comment 0

Behind the Next Destructive Attack CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Adam Meyers, Crowdstrike Recording Sponsored by RiskIQ Board of Directors and C-Level executives concerns around cyber attacks consistently reflect the need for resiliency: can you defend against the next attack like NotPetya? Do you know what threat actors target your industry? What is your plan for crisis response when an attack occurs or after a breach? Gain valuable insight into topics ranging...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 15

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=ee7oRsDnNNc Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by flash /me back
movies

eye 100

favorite 0

comment 0

I'm going to build a 386SX machine and for that I need a fast VGA card. In this video I'm trying to find out which of the cards I own is the fastest. The contestants: Trident TVGA8800CS Trident TVGA9000B Video Seven 456-0023 Cirrus Logic CL-GD5422 This video is part one of two series I'm working on. One about benchmarking different graphics cards and one about the 386SX build. Why a lowly SX, you ask? Because I need a PC with a 16 Bit Data-Bus CPU for a thing I'm working on. I mention my other...
Topics: Youtube, video, Gaming, retro, vga, 386, 486, vesa, local bus, benchmark, isa, 16 bit, 32 bit,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 34

favorite 0

comment 0

This April. Best security experts defend the digital frontier at #TheSAS2017. Find more info and register at http://sas.kaspersky.com. Twitter @KasperskySAS Get access to the unique videos of the presentations given at #TheSAS2016: https://kas.pr/Y1X6 #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=4vss3UzSx2Q Uploader: Kaspersky Lab
Topics: Youtube, video, Entertainment, #TheSAS2017, kaspersky lab, it-security, cybersecurity, conference
Hacking and InfoSec stuff
by 0xdade
movies

eye 57

favorite 2

comment 0

Git is a widely-used Version Control System for software development projects. Because of the way Git works, “deleted” secrets don’t disappear from the filesystem. That means when a developer commits encryption keys, production passwords, or other secrets to the repository, removing them in a later commit won’t scrub them from the history. They live on in compressed plaintext on every developers’ machine, unless the history is rewritten. Grawler is a command line utility written in...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, AWS, Git hacking,...
Hacking and InfoSec stuff
movies

eye 36

favorite 1

comment 0

Artificial intelligence has not only become an international arms race, competition has now heated up as companies look to adopt machine learning/deep learning at an unprecedented pace. But the conversation about AI has largely focused on pitting humanity against AI, instead of what happens when we bring together humans *with* AI. In this talk by a16z operating partner Frank Chen, given at the annual a16z Summit, Chen goes beyond the hype to look forward at how AI and automation will augment,...
Topics: Youtube, video, Science & Technology, artificial intelligence, AI, machine learning, ML,...
Hacking and InfoSec stuff
movies

eye 77

favorite 0

comment 0

Google Tech Talks October 12, 2006 Alex Martelli Google, Bay Area Python Interest Group Credits: Speaker:Alex Martelli Source: https://www.youtube.com/watch?v=A--VsTrwoMA Uploader: GoogleTechTalks Upload date: 2007-10-08
Topics: Youtube, video, Howto & Style, python, google, howto
Hacking and InfoSec stuff
by a16z
movies

eye 54

favorite 3

comment 0

From the quest for digital money and history of Bitcoin, to the emergence of Ethereum and smart contracts, this short presentation from Linda Xie (co-founder and managing director of Scalar Capital, and former product manager at Coinbase) covers a practical introduction and tour through key terms and concepts in the crypto(currencies, tokens, networks) space. The talk was given at a16z's annual innovation summit, which features invited speakers from various organizations discussing innovation...
Topics: Youtube, video, Science & Technology, crypto, cryptocurrencies, ethereum, bitcoin
From powering AI clouds to changing the way visual effects are created with machine learning, Intel AI is working side by side with a diverse range of organizations across the globe to accelerate their AI transformation. In this keynote, Julie Choi explores three real-world use cases featuring a diverse set of data centric problems and Intel solutions. Julie also welcomes Ariel Pisetzky, the Vice President of IT at Taboola to discuss how AI is transforming their business as they create...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 2,783

favorite 1

comment 0

Kim Zetter, Journalist, Author, Speaker, Freelance journalist Gary Brown, Professor of Cyber Security, Marine Corps University Oren Falkowitz, CEO and Co-Founder, Area 1 Security Roy Katmor, Co-Founder and CEO, enSilo Samples of malware in the wild hint how digital weapons today may be more powerful and stealthy than Stuxnet. Cyberwar experts will explore the current state of the art and future of digital weaponry. https://www.rsaconference.com/events/us17 Source:...
Topics: Youtube, video, Science & Technology, Cyber Warfare, Zero Day Vulnerability, Hackers &...
Hacking and InfoSec stuff
by Privacy International
movies

eye 47

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=HOoKhnvoYkU Uploader: Privacy International
Topics: Youtube, video, People & Blogs, big data, Privacy (Legal Subject), Human Rights (Quotation...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 23

favorite 0

comment 0

Hannes Sjöblad A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 music background by Bonnie Tyler "Holding Out For A Hero" Learn more about True Cybersecurity for Healthcare: https://kas.pr/ba7x Source: https://www.youtube.com/watch?v=_Zwviw8gFpk Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, kaspersky lab, sas2016, cyber security, conference, true...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 32

favorite 0

comment 0

Security researchers are working hard to show off their discoveries and creations at #TheSAS2017. Take a sneak peek.... Take a sneak peek and get yours ready. CFP closes on December 1st, 2016 https://sas.kaspersky.com/#call-for-papers #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=M1pzAEusTgw Uploader: Kaspersky Lab
Topics: Youtube, video, Entertainment, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity, conference
Hacking and InfoSec stuff
movies

eye 11

favorite 0

comment 0

In this talk, we will explore the various types of biometric data, their uses by both government and private organizations, and whether the collection and use of such data is covered by the privacy legislation in the APAC region in particular, but more broadly around the world... By: Melissa Wingard Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#biometrics--privacy-time-to-faceoff-or-is-that-faceapp-18743 Source:...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

Trusted Platform Module (TPM) is a tamper-resistant security module. It has been widely deployed in commercial devices to protect secret data and ensure the trustworthiness of a system... By: Seunghun Han Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#bitleaker-subverting-bitlocker-with-one-vulnerability-19413 Source: https://www.youtube.com/watch?v=EXyDAWWHeYY Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
movies

eye 41

favorite 0

comment 0

This is part of a talk which took place on October 19th 2016 at the Bitcoin Wednesday Meetup in Amsterdam, Netherlands: https://www.meetup.com/BitcoinWednesday/events/234498117/ Event Info: http://www.bitcoinwednesday.com/event/special-edition-19-october-2016/ Presentation Info: http://www.bitcoinwednesday.com/antonopoulos-money-under-surveillance/ Source: https://www.youtube.com/watch?v=3MLy5Z5ISeA Uploader: aantonop Upload date: 2017-02-04
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Hacking and InfoSec stuff
movies

eye 28

favorite 1

comment 0

In this talk, Andreas looks at the design principles, metaphors and words used in bitcoin and how they relate to the user experience. Source: https://www.youtube.com/watch?v=Ur037LYsb8M Uploader: aantonop Upload date: 2016-02-03
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks, design, UX, user...
Hacking and InfoSec stuff
movies

eye 26

favorite 0

comment 0

This talk took place on March 29th 2016 at the Blockchain Meetup in Berlin, Germany: https://www.meetup.com/de-DE/Blockchain-Meetup-Berlin/events/229025415/ In this talk, Andreas looks at the inner structure of bitcoin and how high-level financial and trust applications are composed from smaller elements. Using analogies from Lego blocks to a chef creating new recipes, this talk highlights the connection between creativity and the flexibility offered by fine-grained components. Want to hear...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Hacking and InfoSec stuff
by aantonop
movies

eye 25

favorite 0

comment 0

A talk in Sydney Australia on the programmability of bitcoin. Want to hear more about Bitcoin and open blockchains? Follow on Twitter: @aantonop Visit my website: https://antonopoulos.com/ Source: https://www.youtube.com/watch?v=6IDzpvmGzxo Uploader: aantonop Upload date: 2016-07-10
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks