Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 26

favorite 0

comment 0

This February. Best security experts. Will make cyber-underground tremble. Watch SAS 2015 official trailer. #TheSAS2015 Find more info and register at http://sas.kaspersky.com. Source: https://www.youtube.com/watch?v=E1OnLn7amNw Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, SAS, Security analyst summit, cancun, Kaspersky Lab...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 12

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=pLSGki3T3CA Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
We discuss The Attempted Tesla hack, Failed Spies, North Korea's New Ransomware, Bad Infosec Advice, The Great TP Shortage, Nightmare Interview Candidates, A... Source: https://www.youtube.com/watch?v=925KLD69iII Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
by Black Hat
movies

eye 16

favorite 0

comment 0

Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host.... By: Yuval Avrahami Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#escaping-virtualized-containers-21671 Source: https://www.youtube.com/watch?v=0hrv0qyOEd0 Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by Strange Loop
movies

eye 31

favorite 0

comment 0

French composer Erik Satie was the forefather of avant-garde music, the founder of a one-man occult sect, and the inventor of entirely new genres for his hauntingly repetitive, minimalist piano works. Personally, I could listen to his "Gnossiennes" forever, so I created a way to do so, using digital sheet music, markov chains, and browser-based midi to create a generative, unending Gnossienne. This talk will explore the strategies, algorithms, and libraries I used to go from 19th and...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 24

favorite 0

comment 0

Дмитрий Бестужев, руководитель латиноамериканского исследовательского центра «Лаборатории Касперского», рассказывает о португалоязычной киберпреступной группе, создавшей бутик таргетированных атак "Посейдон". Join the summit https://sas.kaspersky.com/ Undergo a training led by the best cybersecurity...
Topics: Youtube, video, Science & Technology, thesas2016, kaspersky lab, cybersecurity
Hacking and InfoSec stuff
movies

eye 24

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=OkZXMYLAUek Uploader: Georgia Weidman
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

I'm uploading old videos walking through Penetration Testing: A Hands-On Introduction to Hacking. This is the first part of Chapter 2: Using Kali Linux. Check back daily for more free content. Source: https://www.youtube.com/watch?v=PVSrIq630DY Uploader: Georgia Weidman
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 31

favorite 0

comment 0

J. Salvatore Testa II discusses ScatterChat, a secure instant messaging client designed for non-technical users who require secure and anonymous communications, at 2600 magazine's HOPE Number Six conference in New York City. Features Javaman answering some questions and Grandmaster Ratte' hula-hooping. Source: https://www.youtube.com/watch?v=WX3RM87OXlc Uploader: cultdeadcow
Topics: Youtube, video, Howto & Style, scatterchat, hope, cult, of, the, dead, cow, cdc, hacktivismo,...
Hacking and InfoSec stuff
movies

eye 21

favorite 0

comment 0

We're back! Here's what we've been up to, where we've been, and what we've changed to make sure we can keep bringing you great content! Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Thanks to a new policy banning instructional hacking, many of our videos started attracting unwanted attention. To fix this, we've been working on ways to keep bringing you the content you love, without getting banned from the platform. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by flash /me back
movies

eye 62

favorite 1

comment 0

This is the final part of my 386 machine build series. Sadly, the 386SX mainboard died after briefly coming back to life in the last video. I went hunting for a new one and found a gem of a 386DX40 mainboard. Its BIOS supports 4 floppy drives, but for reasons I only had space for three. But how often have you seen more than two floppy drives on a DOS computer? I'm also adding a network adapter so I can go online with this machine. All the hardware I am using gets a major refurbishment and...
Topics: Youtube, video, Gaming, retro, 386, dos, floppy, networking, internet, refurbish, hardware,...
Hacking and InfoSec stuff
movies

eye 75

favorite 0

comment 0

The talk about the secrets of modern yacht security by Stephan Gerling from Rosen Group on Industrial Cybersecurity Conference 2019. #KasperskyLab #KICS #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=_OIZ8cnSoQI Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, ICSSecurity, ICSCybersecurity, KICS, Industrial,...
Hacking and InfoSec stuff
movies

eye 23

favorite 0

comment 0

Dr. Stefan Lüders, CERN A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=5FYPYu6-2y0 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 18

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=ExPDcrlaZWA Uploader: Georgia Weidman
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 107

favorite 0

comment 0

Cory Doctorow and John Scalzi stop by the Googleplex to discuss their most recent books, and each other. Cory Doctorow's "Walkaway" Fascinating, moving, and darkly humorous, Walkaway is a multi-generation SF thriller about the wrenching changes of the next hundred years...and the very human people who will live their consequences. John Scalzi's "The Collapsing Empire" Our universe is ruled by physics. Faster than light travel is impossible—until the discovery of The Flow,...
Topics: Youtube, video, People & Blogs, Cory Doctorow, John Scalzi, Talks at GOogle
Hacking and InfoSec stuff
by Privacy International
movies

eye 30

favorite 0

comment 0

More videos and information here: https://privacyinternational.org Support PI here: https://privacyinternational.org/donate Source: https://www.youtube.com/watch?v=NMxR2_hM2Oc Uploader: Privacy International
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
Hacking and InfoSec stuff
movies

eye 15

favorite 0

comment 0

Hackerpraktikum vom 16.01.2013 Source: https://www.youtube.com/watch?v=zVu5ZYIMOto Uploader: Marcus Niemietz
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
movies

eye 80

favorite 0

comment 0

In this video we will perform some live demos with the under door tool on door knobs, introducing some new tech as well as showing what goes right and what g... Source: https://www.youtube.com/watch?v=0Scq6DVkFD0 Uploader: TheNotSoCivilEngr
Topics: Youtube, video, lock, lockpicking, pentesting, physical penetration testing, picking, lock picking,...
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

Bitcoin Wednesday #22 Featuring Andreas Antonopoulos on 1 April 2015. The Bitcoin Expert gives a keynote about cryptocurrency, social and economic implications and future applications. After the keynote he does an extended Q&A session in which he answers questions asked of him by the Dutch government and the public at Bitcoin Wednesday. He also talks about the Bitcoin technology as well as his startup Third Key Solutions which was launched the day before. Source:...
Topics: Youtube, video, People & Blogs, Keynote, Q&A, Question And Answer, Bitcoin Wednesday, 1...
Hacking and InfoSec stuff
movies

eye 36

favorite 1

comment 0

James Foster, CEO, ZeroFOX Avi Rubin, Professor, Johns Hopkins University Facebook is not to blame for nearly every country’s lack of guidance, regulation or legal precedent on how to secure their sovereignty from election meddling and hacking. This talk will show how nation-state adversaries are targeting election systems, election system supply chains, regional populations, elected officials and the democratic state.Learning Objectives:1: Understand the history of election hacking and how...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
movies

eye 105

favorite 0

comment 0

How to Destroy a Laptop with Top Secrets How did GCHQ do it to the Guardian's copy of Snowden's files? In the summer of 2013, Guardian employees destroyed computers storing top secret documents from Snowden, on instruction and supervision from GCHQ. With access to the destroyed pieces, we investigated what GCHQ's instructions were and what we can learn from it about securely eradicating data on a machine. While the initial disclosures by Edward Snowden revealed how US authorities are conducting...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

Huma Abidi discusses the importance of optimization to deep learning frameworks and shares Xeon performance results and work that Intel is doing with its framework partners, such TensorFlow. Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly Instagram: https://www.instagram.com/oreillymedia LinkedIn: https://www.linkedin.com/company-beta/8459/ Source:...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 30

favorite 0

comment 0

Ted Claypoole, Partner, Womble Bond Dickinson Natalie Pierce, Shareholder, Littler Mendelson P.C. Stephen Wu, Shareholder, Silicon Valley Law Group Companies that develop, sell or even just operate AI applications and robots are vulnerable to liability for causing accidents, data breaches and other possible system-wide disasters. This talk will explain how the behavior of neural networks and machine learning can cause vulnerabilities and open companies to litigation. The panelists will cover...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
by The Tor Project
movies

eye 17

favorite 0

comment 0

State of the Onion 2020 Topic: The Guardian Project Presenter: Nathan Freitas https://blog.torproject.org/state-of-the-onion-2020 Resist the surveillance pandemic, support Tor: https://donate.torproject.org The Tor Project is building usable free software to fight surveillance and censorship across the globe. In this talk we'll give an update on what we got up to during 2020, what happened in the wider Tor ecosystem, and what lies ahead of us. Source: https://www.youtube.com/watch?v=F1ddl6XMnQU...
Topics: Youtube, video, Entertainment
Hacking and InfoSec stuff
by 13Cubed
movies

eye 45

favorite 0

comment 0

The previous episode of “Introduction to Hashcat” proved to be quite popular, so my colleague Mike Peterson and I decided to create part two. In this episode, we’re going to perform a brief introduction of one of the new features available in Hashcat 4.0, cover an optional flag you may find especially useful, and lastly, look at the PRINCE attack and a variation of that attack dubbed PRINCEPTION. If you haven’t yet watched Introduction to Hashcat, it is recommended you do so prior to...
Topics: Youtube, video, Science & Technology, Hashcat, crack password, crack passwords, crack...
The real cost of security work and professional intelligence goes beyond dollars. It is measured in family life, relationships, and mental and physical well-being. The divorce rate is as high among intelligence professionals as it is among medical professionals, for good reason – how can relationships be based on openness and trust when one’s primary commitments make truth-telling and disclosure impossible? We might as well begin our discussion with reality. Choosing unreality instead means...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
by The Tor Project
movies

eye 22

favorite 0

comment 0

State of the Onion 2020 Topic: Integration Presenter: Alex Færøy https://blog.torproject.org/state-of-the-onion-2020 Resist the surveillance pandemic, support Tor: https://donate.torproject.org The Tor Project is building usable free software to fight surveillance and censorship across the globe. In this talk we'll give an update on what we got up to during 2020, what happened in the wider Tor ecosystem, and what lies ahead of us. Source: https://www.youtube.com/watch?v=cCnqMzI1xtY Uploader:...
Topics: Youtube, video, Entertainment
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 10

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=X14bBJOfRCE Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 30

favorite 0

comment 0

In the newest edition of the Lab Matters webcast, founder and chief executive officer of Kaspersky Lab Eugene Kaspersky discusses the evolution of malware attacks -- from nuisance e-mail worms to well-organized, for-profit cyber-criminals taking control of millions of computers. In this Q&A with Ryan Naraine, Kaspersky talks about the different eras in malicious computer activity, from passive viruses to Internet worms to botnets and, now, a new era of cyber-warfare. Source:...
Topics: Youtube, video, Science & Technology, kaspersky, malware, stuxnet, viruses, trojan, spyware
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 15

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=-pWrij0YhGo Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 18

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=F28GpaNZ06c Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 33

favorite 0

comment 0

The first episode of the Zcash Show & Tell series will feature David Mercer aka radix42 who is has taken on an immense amount of work to port the Zcash client to Mac (already released) and Windows (up-and-coming)! You can find his work on github here: https://github.com/radix42 Each Show & Tell will be a 15-20 minute presentation by an outstanding community member (including ZcashCo employees from time to time) showcasing a project they've been working on. There will be 10 or 15 minutes...
Topics: Youtube, video, Science & Technology, zcash, cryptocurrency, bitcoin, cryptography,...
A panel discussion during Kaspersky Lab's Cyber Security Symposium and Global Corporate Product Launch. Panelists address how cyber-war affects both corporate and global security and provide an inside look at targeted attacks on nation states and businesses. Left to right: Moderator: Peter Firstbrook, Research Director, Gartner; Panelists: Eugene Kaspersky, Chairman and CEO, Kaspersky Lab; Gary McGraw, PhD and Chief Technology Officer of Cigital; Steve Adegbite, Director Cyber Innovations at...
Topics: Youtube, video, Science & Technology, IT security, business, IT business, Internet Security,...
Hacking and InfoSec stuff
movies

eye 48

favorite 0

comment 0

How to Remotely Access Devices with the Libssh Vulnerability Full Tutorial: http://bit.ly/libsshFLAW Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The libssh authentication bypass discovered in an October 2018 exploit left thousands of devices on the internet vulnerable. We'll explain how it works and how to test if a device is vulnerable to it using a combination of pentesting tools such as Nmap, libssh-scanner, and libSSH-Authentication-Bypass....
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 54

favorite 0

comment 0

American Fuzzy Lop (AFL) revolutionized fuzzing. It’s easily the best thing out there for quickly performing cutting-edge automated vulnerability analysis on command line applications. But what about the situations where accessing the logic you want to fuzz via command line isn’t so simple? For example, maybe you want to fuzz a parsing function from an embedded system that receives input via an analog RF front-end. Sometimes you can write a test harness, but what if you could just emulate...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, afl-unicorn
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 58

favorite 0

comment 0

In this video we take a look at how effective the improved double wrench method (as popularized by lockpicking lawyer) is. Source: https://www.youtube.com/watch?v=RzoqnCKIEGc Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
movies

eye 149

favorite 2

comment 0

BruteSpray Helps Hackers Brute-Force Network Service Passwords Full Video: https://nulb.app/x4aaw Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 055 (Recut - Partial Episode) Nmap is a powerful tool for network recon. However, when paired with other services, Nmap scan outputs can be used offensively as well. Today, on this episode of Cyber Weapons Lab, we'll show you how hackers and pentesters would pipe Nmap scans into...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 36

favorite 1

comment 0

Defcon 18 Source: https://www.youtube.com/watch?v=YDW7kobM6Ik Uploader: killab66661
Topics: Youtube, video, Education, Defcon, 18
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

Are US Cyber Deterrence Operations Suppressing or Inciting Attacks? CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Jason Healey and Neil Jenkins, Columbia University and Cyber Threat Alliance Recording Sponsored by RiskIQ It is now the policy of the United States to use offensive cyber operations to force adversaries to stop or reduce their attacks. Critics believe such counteroffensive activity may only inflame adversaries, seeing the new U.S. actions as aggressive themselves,...
Topics: Youtube, video, People & Blogs, CYBERWARCON
We talked about EMP Weapons, Stalkers & Home Security, Deviant's covert Pie, Cars, Guns, Infosec Buzzwords, The Darknet, and Bad Risk Management. Featuring @... Source: https://www.youtube.com/watch?v=gNJYDSY4KBk Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
by CCCen
movies

eye 42

favorite 1

comment 0

Fueling the Revolution Personal production of bio-fuels Bio-fuels from waste can be part of the solution to stabilize climate change, but inaction by governments and industry means such fuels are not readily available. This talk will outline work being done to solve this problem at a personal level, by producing open source designs for equipment for local production of bio-fuels. Bio-fuels are better for the environment and a key way we could be reducing CO2 emissions. However in many countries...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Hacking and InfoSec stuff
by HackersOnBoard
movies

eye 54

favorite 1

comment 0

Noah Schiffman & Skydog August 1st--4th, 2013 Rio Hotel & Casino • Las Vegas, Nevada Source: https://www.youtube.com/watch?v=N9EeJBpuHoU Uploader: HackersOnBoard
Topics: Youtube, video, Science & Technology, 2013, defcon, 21, defcon21, t129, defcon 21 videos, def...
Hacking and InfoSec stuff
movies

eye 117

favorite 2

comment 0

With the US leading the AI revolution for decades, it would almost seem inconceivable that China could catch up. But China is rapidly catching up with the US in AI applications. Kai-Fu Lee discusses the five key factors that enabled this rapid ascension: tenacious entrepreneurs, speed and execution, tremendous capital, a big market and bigger data, and techno-utilitarian government policies. Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter:...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 53

favorite 0

comment 0

Jaime Blasco, AlienVault A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=UVYnVELzJk4 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 24

favorite 1

comment 0

We have identified serious security weaknesses in chipsets used by a significant number of Wi-Fi capable devices. Specifically, we discovered that FullMAC Wi-Fi chipsets by Broadcom/Cypress – and possibly other manufacturers – are vulnerable to encrypting packets in a WPA2-protected network with an all-zero encryption key... By: Robert Lipovsky & Stefan Svorencik Full Abstract & Presentation Materials:...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 42

favorite 1

comment 0

We discuss how to fight cybercrime at the Security Analyst Summit 2014 http://sas.kaspersky.com/ Source: https://www.youtube.com/watch?v=1vTR6JVKT38 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2014, infosecurity, cybersecurity
Hacking and InfoSec stuff
movies

eye 53

favorite 0

comment 0

Watch me fumble my way though my first impression of Ghidra. If you like my videos, please consider supporting me on Patreon: https://www.patreon.com/join/MalwareTech First broadcasted live on Twitch -- Watch live at https://www.twitch.tv/malwaretechblog Source: https://www.youtube.com/watch?v=285b_DEmvHY Uploader: MalwareTech
Topics: Youtube, video, Science & Technology, twitch, Ghidra, NSA, Reverse Engineering
Hacking and InfoSec stuff
movies

eye 21

favorite 0

comment 0

Detecting adversaries in your environment is a challenging task: Most organizations need at least several months to detect them... IF they detect them at all.Many companies have started to investigate Windows Event Log... By: Miriam Wiesner Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#what-the-log-so-many-events-so-little-time-19400 Source: https://www.youtube.com/watch?v=3x5-nZ2bfbo Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
movies

eye 56

favorite 0

comment 0

Antivirus is the first line of defense for most systems, allowing even well-crafted malware to be defeated before deploying a payload. Timothy Shellion is a CS student using the USB Rubber Ducky to design payloads to defeat antivirus, and explains what a rogue device like a USB Rubber Ducky is, and how it works. He demonstrates his simple Duckyscript code to disable antivirus on Windows, and explains how the device can be used to defeat even well-defended systems when physical access is...
Topics: Youtube, video, People & Blogs, nullspace, nullbyte, null space, null byte, wonderhowto, wifi...
Hacking and InfoSec stuff
movies

eye 34

favorite 0

comment 0

A talk by Andreas M. Antonopoulos about how new technologies are initially built on old infrastructures until an "infrastructure inversion" happens and they replace the old infrastructure. Comparisons to the automobile, electricity and internet explain the concept and predict a similar future for bitcoin and financial infrastructure. Source: https://www.youtube.com/watch?v=5ca70mCCf2M Uploader: aantonop Upload date: 2016-04-04
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks, infrastructure,...
Hacking and InfoSec stuff
movies

eye 16

favorite 0

comment 0

Beware lest staring into the abyss turns into the abyss staring into you, Nietzsche warned. But once we are committed to seeing clearly and saying clearly what we see, it is hard to turn away. Richard Thieme has spent 25+ years in this “infosec space,” and the phase changes of the industry have taken him and all of us beyond the beginning of the end to the end itself – the end of what we thought we were doing by hacking in the spirit of the hacker ethos. We have created a world that is...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 39

favorite 0

comment 0

Tizen is Samsung's newest OS for devices and considered by them as the operation system of everything, aiming to run on every device from simple IoT, mobile phones, televisions, and even vehicles. Today #Tizen could be found mostly in Samsung's newest televisions and on some mobile phones in certain markets. There are currently than 10 million Tizen devices in the world. Over the last few months, I observed that Samsung is laying the groundwork for a larger expansion of Tizen in the mobile...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 99

favorite 0

comment 0

Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=q5I8B6b-BoY Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, wifi hacking, learn hacking, learn...
Hacking and InfoSec stuff
movies

eye 58

favorite 0

comment 0

Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop How to Find Installed AV Software on a Windows PC from Wi-Fi Traffic Full Tutorial: https://nulb.app/z4m9a Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 168 Once you have access to a network, knowing what antivirus and firewall software is installed on a Windows computer is crucial. Today, in this episode of Cyber Weapons Lab, we'll use deep packet...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 65

favorite 0

comment 0

After the shockwaves triggered by the Brexit referendum and the election of Donald Trump, media outlets desperately looked for explanations. Previously unknown researchers offered a saving straw: Automated accounts on social media had influenced the public opinion on a massive scale. This theory was widely spread by research institutions, the media, and even government officials, but taking a closer look at the research behind it shows that the whole social bots theory has absolutely no basis....
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 106

favorite 0

comment 0

JOIN OUR DISCORD!: https://discord.gg/wqKQcmK Zayka's gaming stream Join her army and help the bunnies! https://www.twitch.tv/zayka_gamer_girl GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=jdPS_qcxS10 Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, hack, hacker, learn hacking, mobile hacking, why i quit...
Hacking and InfoSec stuff
movies

eye 25

favorite 0

comment 0

Dr. Edward Amoroso, CEO, TAG Cyber Practitioners from the FBI, financial services, telecommunications and technology sectors share real-world case studies of how cyber-risk became business risk, and how those threats were mitigated. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=mYHiKKtvQco Uploader: RSA Conference Upload date: 2017-02-17
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Case Studies, Security Operations,...
Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Use MicroPython to Control Electronic Devices Full Tutorial: https://nulb.app/x5i8l Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 175 MicroPython is a great language for beginners trying to learn the how to program small electronic devices like an ESP8266. In this episode of Cyber Weapons Lab, we'll teach you how to use both —...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 35

favorite 0

comment 0

by Evgeny Goncharov A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=-zxleTfmDYs Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Hacking and InfoSec stuff
by a16z
movies

eye 25

favorite 0

comment 0

The U.S. spent $2.6 trillion on healthcare in 2010; this is expected to double by 2020. Why so expensive? And why has healthcare been so resistant to the innovations that could bring costs down; why is it still so time-consuming and difficult to bring effective solutions to market? By enabling a more powerful understanding of biology, tech is literally "rewriting" how the healthcare industry discovers, tests, and brings new medicines to market... and ultimately, to patients. In this...
Topics: Youtube, video, Science & Technology, healthcare, disruption, innovation
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 11

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=Nk5Rtha54LQ Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 19

favorite 0

comment 0

by Vasilios Hioureas A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=_5LchCX9PbA Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Hacking and InfoSec stuff
movies

eye 26

favorite 1

comment 0

In this talk, Andreas looks at the design principles, metaphors and words used in bitcoin and how they relate to the user experience. Source: https://www.youtube.com/watch?v=Ur037LYsb8M Uploader: aantonop Upload date: 2016-02-03
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks, design, UX, user...
Hacking and InfoSec stuff
by TROOPERScon
movies

eye 52

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=mqioXYpyYhM Uploader: TROOPERScon
Topics: Youtube, video, Education, TR16, TROOPERS16, ERNW, Conference, Talks, Heidelberg, Print Media...
Hacking and InfoSec stuff
movies

eye 19

favorite 0

comment 0

The acquisition of money or sensitive information is the main motivation behind all modern cyber-attacks. During the last few years, the number of attacks has increased to such an extent that today we face a situation in which black markets, with a fully developed underground economy, are present in almost every nation in the world. Source: https://www.youtube.com/watch?v=1IkoDLLN0MU Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Kaspersky Lab, Lab Matters, Underground Economy, Black...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 14

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=1pBXxZkdq9E Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 30

favorite 0

comment 0

Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly Instagram: https://www.instagram.com/oreillymedia LinkedIn: https://www.linkedin.com/company-beta/8459/ Source: https://www.youtube.com/watch?v=4ZulHySMC6Y Uploader: O'Reilly
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
More videos and information here: https://privacyinternational.org Support PI here: https://privacyinternational.org/donate Source: https://www.youtube.com/watch?v=5Ihl4xOxl_k Uploader: Privacy International
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 11

favorite 0

comment 0

Get your ass to SAS! #TheSAS2015 Source: https://www.youtube.com/watch?v=hJlnkLHYwEk Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, thesas2015, Security Analyst Summit, Kaspersky Lab,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 15

favorite 0

comment 0

In this episode of Lab Matters, malware researcher Tim Armstrong joins Ryan Naraine to examine the security posture of the Android mobile operating system. Armstrong looks at strengths and weaknesses of the open-source platform and warns about the risks associated with jailbreaking/rooting Android devices. Source: https://www.youtube.com/watch?v=hHv5LXxy5GE Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Android, vulnerability, jailbreaking devices, mobile...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 17

favorite 0

comment 0

The best international conference, best international researchers – this is SAS :) We speak YOUR language – the language of IT Security :) Join the summit https://sas.kaspersky.com/ Undergo a training led by the best cybersecurity experts https://sas.kaspersky.com/#trainings Join our discussion on Twitter #TheSAS2016 Source: https://www.youtube.com/watch?v=iIDvBsrYQA0 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
by RSA Conference
movies

eye 46

favorite 0

comment 0

Matthew Olsen, President, Business Development, IronNet Cybersecurity, Inc. Terrorist groups, like ISIS and al-Qaida, are looking to build their capabilities to carry out cyberattacks. What is the nature of this threat, how is it growing and how should we respond? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=kuN0Zdo9EHU Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Critical Infrastructure, Threat...
Hacking and InfoSec stuff
by GoogleTechTalks
movies

eye 235

favorite 2

comment 0

Google Tech Talks July 1, 2008 ABSTRACT "Python behind the scenes": some advanced aspects of Python. The talk addresses an audience of proficient Python programmers and deals with several advanced topics: object creation: metaclasses, new, and init - attribute lookup mechanics and descriptor objects - introspection on objects, garbage collection, stack frames, tracebacks - Python bytecode inspection and alteration. Speaker: Alex Martelli Source:...
Topics: Youtube, video, Science & Technology, google, techtalks, techtalk, engedu, talk, talks,...
Hacking and InfoSec stuff
movies

eye 89

favorite 2

comment 0

How to Discreetly Sniff Data Packets with a Cheap Microcontroller Full Tutorial: http://bit.ly/Sniff8266 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Monitoring network traffic is an essential skill for a hacker. However the tools used can be a little conspicuous. On this episode of Cyber Weapons Lab, we'll show you how to use an ESP8266 to sniff data packets discreetly. Specifically, we'll be using a D1 Mini with a datalogger shield that has a...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 101

favorite 0

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Crack Protected ZIP Files, PDFs & More Full Tutorial: https://nulb.app/z4tgm Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 183 PDFs and ZIP files can often contain a vast amount of useful and sensitive information, such as network diagrams, IP addresses, and login credentials. On this episode of Cyber Weapons Lab, we're going to show...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...