Skip to main content

Hacking and InfoSec stuff



rss RSS

105
RESULTS


More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid
A B C remove-circle D E F G H I J K L M N O P Q R S T U V W X Y Z
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
movies

eye 25

favorite 0

comment 0

#days Security & Risk Conference 2012: Ange Albertini: Binary art: Byteing the PE that fails you Source: https://www.youtube.com/watch?v=kibEcaG0zCk Uploader: defconswitzerland
Topics: Youtube, video, Science & Technology, #days, ange albertini, pe, binary
Hacking and InfoSec stuff
movies

eye 95

favorite 0

comment 0

#days Security & Risk Conference: Ange Albertini: Such a weird processor - messing with x86 opcodes Source: https://www.youtube.com/watch?v=MJvsshovITE Uploader: defconswitzerland
Topics: Youtube, video, Science & Technology, Ange, Albertini, #days, hashdays, security, conference,...
Hacking and InfoSec stuff
movies

eye 87

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 72

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 87

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 72

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 76

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 62

favorite 2

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 70

favorite 1

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 61

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 57

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 67

favorite 1

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com... ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 23

favorite 0

comment 0

In this talk, we demonstrate how our 3dRedPill exploit breaks the security measures of virtio-gpu devices, achieving a full guest-to-host escape exploitation... By: Zhijian Shao, Matthew Shao, Jian Weng & Yue Zhang Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#d-red-pill--a-guest-to-host-escape-on-qemukvm-virtio-device-18583 Source: https://www.youtube.com/watch?v=oNV6KuhT02Q Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 43

favorite 0

comment 0

Arbor Networks researcher Jose Nazario talks about new DDoS bot families, most previously unidentified. Nazario provides a tour of recently discovered DDoS bots from around the world showing the proliferation of attack models, adoption of .Net, and new modular functionalities. Source: https://www.youtube.com/watch?v=9uHXGLvWhps Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, DDoS, botnets, Jose Nazario, Ryan Naraine, Lab Matters,...
Hacking and InfoSec stuff
by DEFCONConference
movies

eye 41

favorite 0

comment 0

Richard Thieme - Hacker Generations: From Building the Network to Using the Network to Being the Network Hacker Generations: From Building the Network to Using the Network to Being the Network It has all happened so fast. Eleven years of Def Con define three identifiable generations of hackers. (Yes, that's an arbitrary distinction, but it's useful.) The first generation helped build the network, the second learned how to use the network, and the third has become the network. The management of...
Topics: Youtube, video, Science & Technology
Source: https://www.youtube.com/watch?v=zmo1ajG4YBU Uploader: DEF CON Videos Upload date: 2013-03-30
Topics: Youtube, video, Science & Technology, defcon, Defcon, Blackhat, Whitehat, workshop, hacking,...
Hacking and InfoSec stuff
movies

eye 54

favorite 0

comment 0

Richard Thieme,Quantum Hacking: In Search of a Unified Theory The search for a unified theory of everything in contemporary physics stems in part from the fundamental inability to reconcile quantum physics and relativity theory. This has pushed research toward complex mathematical models such as string theory in an effort to model a single way of looking at everything. The same can be said of the distribution of power in networks and hierarchies. The individual person looks like one kind of...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 24

favorite 0

comment 0

Richard Thieme: Beyond Social Engineering: Tools for Reinventing Yourself Abstract: Managing multiple modular identities is not a trivial task. But that's what the technologies and politics of Now demand. These tools will enable you to create personas at a deep level, then link them into a seamless life. Bio: Richard Thieme is a business consultant, writer, and professional speaker focused on "life on the edge," in particular the human dimension of technology and work. He is a...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
by DEFCONConference
movies

eye 42

favorite 0

comment 0

Richard Thieme: Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors You're over the line," an intelligence professional told Richard Thieme recently. "You know enough to know what's not true but you can't know enough to know what is. You're well into the wilderness of mirrors." Hacking one complex system is always in some ways like hacking another. You must see nested levels of the context that others assume and which is therefore invisible, you must see through the story...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 60

favorite 0

comment 0

Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World Dmitri Alperovitch VP Threat Research, McAfee Marcus Sachs Director, SANS Internet Storm Center Phyllis Schneck VP Threat Intelligence, McAfee Ed Skoudis Founder&Senior Security Consultant, InGuardians Cyber warfare is the new hot topic of debate in political and military circles in Washington. This panel of cyber policy experts will explore the definition and reality of a cyber warfare threat, focusing on...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), 2009, Hacker, dc17, DEF CON,...
Hacking and InfoSec stuff
movies

eye 47

favorite 0

comment 0

Hacking, Biohacking, and the Future of Humanity Richard Thieme ThiemeWorks I was asked in 2006 at AusCert in Australia, my second of three years of keynoting, where did I see hacking headed in the future? I described biohacking and noted that genetic engineering, neuroscience (both black and white R&D) and the availability of everything one needs for a few thousand bucks to hack the genome in a garage, all made hacking human attributes and identity the next level of the transformation of...
Topics: Youtube, video, Science & Technology, 2009 Hacker Dc17 Def Con Def Con Las Vegas Defcon...
Hacking and InfoSec stuff
by DEFCONConference
movies

eye 68

favorite 0

comment 0

Richard Thieme - Getting Root: Remote Viewing, Non-Local Consciousness, Big Picture Hacking, and Knowing Who You Are Richard Thieme celebrates speaking for Def Con for fifteen years by discussing the deepest truths he knows and relating them to Big Picture hacking. Thieme references the most fervent explorations of his life, from immersion in the works of the Society for Psychical Research while living in England as a young man to conversations with remote viewers in the governmentís Stargate...
Topics: Youtube, video, Science & Technology, 2010, Hacker, dc18, DEF CON, Def Con, Las Vegas, DEFCON,...
Hacking and InfoSec stuff
by DEFCONConference
movies

eye 74

favorite 1

comment 0

Richard Thieme - Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence https://www.defcon.org/images/defcon-19/dc-19-presentations/Thieme/DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf Nothing is harder to see than things we believe so deeply we don't even see them. This is certainly true in the "security space," in which our narratives are self-referential, bounded by mutual self-interest, and characterized by a heavy dose of group-think....
Topics: Youtube, video, Science & Technology, 2011, Hacker, dc19, DEF CON, Def Con, Las Vegas, DEFCON,...
Source: https://www.youtube.com/watch?v=474IKK94hGs Uploader: DEFCON Upload date: 2014-08-28
Topics: Youtube, video, People & Blogs, defcon, def con, security, hacking, how to hack, learn to hack,...
Source: https://www.youtube.com/watch?v=dVbmu6lABhg Uploader: DEF CON Videos Upload date: 2013-04-28
Topics: Youtube, video, Science & Technology, defcon, Defcon, Blackhat, Whitehat, workshop, hacking,...
Hacking and InfoSec stuff
movies

eye 20

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=chaGeClvjho Uploader: HackersOnBoard
Topics: Youtube, video, Howto & Style, Richard Thieme (Author), Biohacking, Neuroscience (Field Of...
Hacking and InfoSec stuff
movies

eye 40

favorite 2

comment 0

Incorporating natural elements, complex fabrication techniques, and components rarely seen by the outside world, the DEF CON 27 Badge brings our community together through Technology's Promise. Join DEF CON's original electronic badge designer Joe Grand on a behind-the-scenes journey of this year's development process and the challenges, risks, and adventures he faced along the way. Joe Grand (Kingpin) Joe Grand, also known as Kingpin, is a computer engineer, hardware hacker, DEF CON badge...
Topics: Youtube, video, Science & Technology, DEF, CON, DEFCON, DEF CON 27, DC27, DEF CON 2019, hacker,...
Hacking and InfoSec stuff
movies

eye 44

favorite 0

comment 0

Richard Thieme - Social Engineering at Def Con: Games Hackers Play Social Engineering at Def Con: Games Hackers Play DefCon has changed dramatically from Def Con 1 - when sixty real hackers met in face-time for the first time to Def Con 8 when thousands crowd into a hotel for a hacking "event scene." Richard Thieme has been called a "shrewd observer of hacker attitudes and behaviors" and sometimes he is. You be the judge. In this talk he reviews *very subjectively* the way...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 83

favorite 0

comment 0

Richard Thieme - Hacking in a Context of Pan-global Culture, the Wetware / dryware Interface, and Going to Europa When Richard Thieme spoke at DefCon 4, he said hacking was practice for trans-planetary life in the 21st century. Well, guess what? It was. But a changing context has also changed what hacking looks like. Context is content, and what was hacking at MIT on a PDP-6 just doesn't cut it any more. The essence of hacking is the same, but the game is played differently. When space war...
Topics: Youtube, video, Science & Technology, DEF CON (Conference Series), Richard Thieme (Author),...
Hacking and InfoSec stuff
movies

eye 19

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=lm8kyIlXzEI Uploader: DEF CON Videos Upload date: 2013-03-30
Topics: Youtube, video, Science & Technology, defcon, Defcon, Blackhat, Whitehat, workshop, hacking,...
Hacking and InfoSec stuff
movies

eye 45

favorite 0

comment 0

Speakers: Michael Ligh, Security Intelligence Engineer, iDEFENSE Greg Sinclair Rapid Response Engineer, VeriSign iDefense Rapid Response This talk will focus on using a debugger to reverse engineer malware, with an emphasis on building decryption tools for credential recovery and command/control (c&c) inspection. Most modern-day trojans exhibit cryptography, or just home-grown obfuscation techniques, to prevent analysis of the stolen data or c&c protocol. This presentation will show how...
Topics: Youtube, video, Science & Technology, debugger, decrypt, enigeer
Hacking and InfoSec stuff
by Christiaan008
movies

eye 17

favorite 0

comment 0

Speakers: Michael Ligh Malicious Code Analyst, iDefense Matthew Richard Malicious Code Operations Lead, Raytheon Corporation Would you laugh if you saw a bank robber accidentally put his mask on backwards and fall into a man hole during the getaway, because he couldn't tell where he was going? Criminals do ridiculous things so often, its impossible to capture them all on video. Rest assured, when the criminals are malware authors, we can still make fun of them through evidence found in...
Topics: Youtube, video, Science & Technology, code, capture, authors, criminals
Hacking and InfoSec stuff
by Christiaan008
movies

eye 20

favorite 0

comment 0

Speakers: Nicholas J. Percoco Vice President of SpiderLabs, Trustwave Jibran Ilyas Senior Forensic Investigator, SpiderLabs, Trustwave We see a lot of compromised environments every year. In 2008 alone, we performed full forensic investigations on over 150 different environments ranging from financial institutions, hotels, restaurants and even some casinos not too far from DEF CON. This presentation will show the inner workings of three very interesting pieces of malware, ranging from somewhat...
Topics: Youtube, video, Science & Technology, interesting, forensic, pieces
Hacking and InfoSec stuff
by Christiaan008
movies

eye 30

favorite 0

comment 0

Speaker: Moxie Marlinspike This talk aims to pick up where SSL stripping left off. While sslstrip ultimately remains quite deadly in practice, this talk will demonstrate some new tricks for defeating SSL/TLS in places where sslstrip does not reach. Cautious users, for example, have been advised to explicitly visit https URLs or to use bookmarks in order to protect themselves from sslstrip, while other SSL/TLS based protocols such as imaps, pop3s, smtps, ssl/irc, and SSL-based VPNs never present...
Topics: Youtube, video, Science & Technology, ssl, sslstrip
Speakers: Danny Quist CEO, Offensive Computing Lorie M. Liebrock New Mexico Tech Computer Science Department Recent advances in hypervisor based application profilers have changed the game of reverse engineering. These powerful tools have made it orders of magnitude easier to reverse engineer and enabled the next generation of analysis techniques. We will also present and release our tool VERA, which is an advanced code visualization and profiling tool that integrates with the Ether Xen...
Topics: Youtube, video, Science & Technology, vera, code, tool
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

Speaker: Nick Harbour Principal Consultant, Mandiant This presentation will discuss a new free tool for Reverse Engineering called API Thief, the "I Win" button for malware analysis. The unique way the tool operates will be explored as well as how it is able to provide better quality data than other tracing tools currently available. Advanced usage of the tool for malware analysis will be demonstrated such as Sandboxing functionality and a new technique for automated unpacking. For...
Topics: Youtube, video, Science & Technology, DEFCON, 17, Hacking, Conference, Presentation, By, Nick,...
Hacking and InfoSec stuff
movies

eye 30

favorite 0

comment 0

Speaker: Max Kelly With the current media hype about cyber threats and cyber warfare, Max Kelly - former CSO of Facebook - offers his perspective on the effects of internet militarization and it's relationship to traditional security operations. For presentations, whitepapers or audio version of the Defcon 18 presentations visit: http://defcon.org/html/links/dc-archives/dc-18-archive.html Source: https://www.youtube.com/watch?v=hbt4pX62Pls Uploader: Christiaan008 Upload date: 2010-10-27
Topics: Youtube, video, Science & Technology, 10, defcon, 004, clip1
Hacking and InfoSec stuff
movies

eye 26

favorite 0

comment 0

Speaker: Max Kelly With the current media hype about cyber threats and cyber warfare, Max Kelly - former CSO of Facebook - offers his perspective on the effects of internet militarization and it's relationship to traditional security operations. For presentations, whitepapers or audio version of the Defcon 18 presentations visit: http://defcon.org/html/links/dc-archives/dc-18-archive.html Source: https://www.youtube.com/watch?v=ewDSRE4yBgw Uploader: Christiaan008 Upload date: 2010-10-27
Topics: Youtube, video, Science & Technology, 10, defcon, 004, clip2
Hacking and InfoSec stuff
movies

eye 31

favorite 0

comment 0

Speaker: Max Kelly With the current media hype about cyber threats and cyber warfare, Max Kelly - former CSO of Facebook - offers his perspective on the effects of internet militarization and it's relationship to traditional security operations. For presentations, whitepapers or audio version of the Defcon 18 presentations visit: http://defcon.org/html/links/dc-archives/dc-18-archive.html Source: https://www.youtube.com/watch?v=n6xSpIE-lSQ Uploader: Christiaan008 Upload date: 2010-10-27
Topics: Youtube, video, Science & Technology, 10, defcon, 004, clip3
Hacking and InfoSec stuff
by Christiaan008
movies

eye 39

favorite 1

comment 0

Speaker: Matt 'openfly' Joyce Trolling is something that today has a very negative connotation on the Internet and in the common usage of the word outside of it. However, for better or worse trolling has long enjoyed a close relationship with hacking be it in the area of information security, or simply in technology development. I intend to delve into the definition of a troll, the history of trolling in human culture ( as well as its contributions ), and the techniques that are generally...
Topics: Youtube, video, Science & Technology, DEF, CON, 19, Hacking, Conference, Presentation, By,...
Hacking and InfoSec stuff
by Christiaan008
movies

eye 41

favorite 0

comment 0

Speakers: Whitfield Diffie | Moxie Marlinspike Come watch Whitfield Diffie and Moxie Marlinspike talk about certificate authorities, DNSSEC, SSL, dane, trust agility and whatever else they want to. Moderated by the Dark Tangent and with Q&A from the audience. For more information visit: http://bit.ly/defcon19_information To download the video visit: http://bit.ly/defcon19_videos Playlist Defcon 19: http://bit.ly/defcon19_playlist Source: https://www.youtube.com/watch?v=lt7uW6vDk00 Uploader:...
Topics: Youtube, video, Science & Technology, DEF, CON, 19, Hacking, Conference, Presentation, By,...
Hacking and InfoSec stuff
movies

eye 57

favorite 0

comment 0

Speaker: RICHARD THIEME THIEMEWORKS Thieme's keynote at DEF CON 4 for a few hundred people was "Hacking as Practice for Trans-planetary Life in the 21st Century." Mudge recently said, "Some of us knew what you meant, and some of us thought you were nuts." That's likely to be the response to this talk too. Thieme addresses what he said 17 cons ago, why it was true, and illuminates some likely futures for hacking and hackers, anonymous 2.0.1, and the gray space of the noir...
Topics: Youtube, video, Science & Technology, DEFCON, security conference
Hacking and InfoSec stuff
movies

eye 104

favorite 2

comment 0

DEVCON1 10:45am Day 5 Ethereum's CTO Dr. Gavin Wood presents "Ethereum for Dummies" or "So, now we've built it, WTF is it?" Source: https://www.youtube.com/watch?v=U_LK0t_qaPo Uploader: Ethereum Upload date: 2015-12-11
Topics: Youtube, video, Science & Technology, ethereum, smart contracts, Dr. Gavin Wood, Gav, Wood,...
Hacking and InfoSec stuff
by Ethereum
movies

eye 43

favorite 0

comment 0

DEVCON1 1.25pm Day1 Ethereum's Dr. Daniel Nagy and Viktor Tron present on Swarm, the decentralised, incentivised file storage system. Source: https://www.youtube.com/watch?v=VOC45AgZG5Q Uploader: Ethereum Upload date: 2015-11-30
Topics: Youtube, video, Science & Technology, ethereum, smart contracts, Swarm, kademelia, DHT,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 17

favorite 0

comment 0

A look at the top five database breaches and the technologies that may have helped limit the damage. Source: https://www.youtube.com/watch?v=xe3WMGGX6L8 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, IT security, DLP, database breaches, technologies,...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 17

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=RkstQghirRs Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 20

favorite 0

comment 0

Kurt Baumgartner, Vitaly Kamluk; Kaspersky Lab A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=6mZU4XbW_sw Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 28

favorite 0

comment 0

On the first anniversary of Stuxnet, Roel Schouwenberg discusses gaping holes in Industrial Control Systems and the risks associated with these vulnerabilities. Source: https://www.youtube.com/watch?v=pJcXY7WLTrU Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Stuxnet, vulnerabilities, Industrial Control Systems,...
Hacking and InfoSec stuff
by Privacy International
movies

eye 53

favorite 0

comment 0

Data protection is about understanding how our data is being used, with whom it is being shared, how long it is being stored, and when/if it will be deleted. Learn more by watching this video! Privacy ensures that democracy is maintained by allowing citizens to have safe spaces to discuss ideas, grow, and learn. PI investigates the secret world of government surveillance and exposes the companies enabling it and litigate to ensure that surveillance is consistent with the rule of law. We...
Topics: Youtube, video, People & Blogs, data protection, data protection act, data exploitation,...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 12

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=X14bBJOfRCE Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 13

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=kKN_QO_Dp4A Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 12

favorite 0

comment 0

David Lenoe, Adobe PSIRT group manage, discusses the Sandbox bypass press release which offered only partial disclosure, leaving much to be left unaddressed in terms of potential vulnerabilities. Source: https://www.youtube.com/watch?v=kMnF3xDnAQg Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Kaspersky, SAS, Security analyst summit, David Lenoe,...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 15

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=J6ECBUTY3QY Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 59

favorite 0

comment 0

Day2-Track1-Kris Kaspersky - Remote Code Execution Through Intel CPU Bugs_000 |Uploaded with TubeShack http://www.shacksoftware.com Source: https://www.youtube.com/watch?v=lfFMKAeFfK8 Uploader: HackingCons
Topics: Youtube, video, Education, Hack, Hacking, Hacker, Con, Convention, Conventions, HackCon, DefCon,...
Hacking and InfoSec stuff
movies

eye 31

favorite 0

comment 0

In this talk, recorded at D10E in San Francisco in July 2016, Andreas discusses the architecture of power, how decentralization compares to centralization and how each scales. Architecture determines how power is concentrated and has important implications for liberty. Want to hear more about Bitcoin and open blockchains? Follow on Twitter: @aantonop Visit my website: https://antonopoulos.com/ Read more: “Mastering Bitcoin” - https://www.bitcoinbook.info/ “The Internet of Money” -...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks, decentralization,...
Hacking and InfoSec stuff
movies

eye 76

favorite 3

comment 0

On the surface, the story of cryptocurrencies has been a story about new financial opportunities -- whether it’s people betting on bitcoin, or banking on the blockchain. But the building blocks of this story go back to the history of currency, the evolution of the internet and distributed networks, and towards the advent of Ethereum. As these threads come together, how are they being woven together into new opportunities right now? Andreessen Horowitz general partner Alex Rampell reflects on...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, cryptocurrency, ICOs
Domain generation algorithm (DGA) malware makes callouts to unique web addresses to avoid detection by static rules engines. To counter this type of malware, we created an ensemble model that analyzes domains and evaluates if they were generated by a machine and thus potentially malicious. The ensemble consists of two deep learning models – a convolutional neural network and a long short-term memory network, both which were built using Keras and Tensorflow. These deep networks are flexible...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, malware detection
Hacking and InfoSec stuff
movies

eye 59

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=dBtmzY5gcO8 Uploader: HackersOnBoard Upload date: 2013-06-25
Topics: Youtube, video, Science & Technology, Defcon, 18, Changing, threats, to, privacy, Moxie,...
Hacking and InfoSec stuff
movies

eye 44

favorite 1

comment 0

Defcon 18 Source: https://www.youtube.com/watch?v=YDW7kobM6Ik Uploader: killab66661
Topics: Youtube, video, Education, Defcon, 18
Hacking and InfoSec stuff
by killab66661
movies

eye 22

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=gLMEnPFBvnI Uploader: killab66661 Upload date: 2010-12-11
Topics: Youtube, video, Education, Defcon, 18, Getting, Root, Richard, Thieme, Part
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net "Whoever fights monsters should see to it that in the process he does not become a monster." - Friedrich Nietzsche. Aaron Barr returns for the first time in what's sure to be a gritty and frank (and heated) panel. How can we conduct ourselves without losing ourselves? How far is too far - or not far enough? IT security has finally gotten the attention of the mainstream media, Pentagon...
Topics: Youtube, video, Education, securitytube, defcon, def con, hacking, hackers, information security,...
Hacking and InfoSec stuff
by HackersOnBoard
movies

eye 60

favorite 1

comment 0

Noah Schiffman & Skydog August 1st--4th, 2013 Rio Hotel & Casino • Las Vegas, Nevada Source: https://www.youtube.com/watch?v=N9EeJBpuHoU Uploader: HackersOnBoard
Topics: Youtube, video, Science & Technology, 2013, defcon, 21, defcon21, t129, defcon 21 videos, def...
Hacking and InfoSec stuff
by HackersOnBoard
movies

eye 54

favorite 0

comment 0

Karl Koscher & Eric Butler August 1st--4th, 2013 Rio Hotel & Casino • Las Vegas, Nevada Source: https://www.youtube.com/watch?v=31D94QOo2gY Uploader: HackersOnBoard
Topics: Youtube, video, Science & Technology, 2013, defcon, defcon21, t213, def con 21, conference,...
Hacking and InfoSec stuff
movies

eye 61

favorite 1

comment 0

How to Defeat Evil Maid Attacks & Malware on a Mac Full Tutorial: http://bit.ly/LuLuDND Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you're serious about your Mac's security and want to take fortifying its defenses a little further, we have a couple tools just right for you. On this episode of Cyber Weapons Lab, we'll recommend tools by Objective-See that will help you detect un-granted access to your computer as well as unknown outgoing...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 71

favorite 0

comment 0

Protect Your Ubuntu System from Network-Based Threats Full Tutorial: https://nulb.app/z4bky Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie tokyoneon's Twitter: https://twitter.com/tokyoneon_ One of the most common attack vectors a hacker exploits is a target's network. If not secured correctly, a hacker could easily discover vulnerabilities during their recon phase and subsequently seek to attack your system. We've covered how to lock down your...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 38

favorite 0

comment 0

Many people have a plan to make it through the robopocalypse (robot apocalypse), but in this talk we put these plans to the test. We start our discussion with a quick overview of physical and social abilities of current robots, mainly as a way to inform the people that haven’t taken the time to think what their life might be like if robots were to take over. We follow this by doing live demos of robot physical and social engineering attacks, and some of the defenses that we have employed to...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, robopocalypse, robots
Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly Instagram: https://www.instagram.com/oreillymedia LinkedIn: https://www.linkedin.com/company-beta/8459/ Source: https://www.youtube.com/watch?v=v-yROJ-skzQ Uploader: O'Reilly
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 21

favorite 0

comment 0

In this talk, we will demystify the techniques armed by binary disassembling through a presentation on our study with 8 open-released tools (Ghidra, Angr, McSema, Dyninst, Radare2, Jakstab, Uroboros, and Objdump).... By: Eric Koskinen, Chengbin Pang & Jun Xu Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#demystify-todays-binary-disassembling-and-how-modern-abi-makes-it-easier-18415 Source: https://www.youtube.com/watch?v=LYCufH9KQxE...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 26

favorite 0

comment 0

by Dmitry Bestuzhev A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=JGmsYmuiLZY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Hacking and InfoSec stuff
movies

eye 122

favorite 2

comment 0

How to Set Up a Friend Detector That Tracks Friendly Devices Full Tutorial: http://bit.ly/FriendDet Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie MAC address randomization is a feature new smartphones have to help prevent tracking by third parties. However, it's a fairly easy to defeat. Today, we'll show you how to detect the signals smartphones use to connect to Wi-Fi networks via an ESP8266 NodeMCU and Friend Detector on this episode of Cyber...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 35

favorite 0

comment 0

In this edition of Lab Matters, Ryan Naraine interviews Kaspersky Lab CTO Nikolay Nikolay Grebennikov about malicious threats on mobile devices. Grebennikov talks about the taxonomy of threats and explains Kaspersky Lab's vision for protecting data on smart phones. The discussion touches on privacy issues, data protection, anti-theft recovery, social engineering, URL filtering and parental control. Source: https://www.youtube.com/watch?v=wpswUzjlC3Y Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, mobile security, mobile threats, smart phones, privacy...
Hacking and InfoSec stuff
movies

eye 519

favorite 0

comment 0

Ian Allison, Sr Manager Security Testing/Red Team, Intuit Inc. Join Ian Allison and Javier Godinez as they demonstrate the Red Teaming of Amazon Web Services Identity Access Management Instance roles and how they can be used to compromise an AWS account. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=OkWBHOJr5YQ Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, RSA Conference 2017, DevOps, Security Awareness,...
Hacking and InfoSec stuff
movies

eye 33

favorite 0

comment 0

In this episode, Kody and Tim will develop malicious Duckyscript payloads from scratch targeting PowerShell. Source: https://www.youtube.com/watch?v=8nZEkFcXFp0 Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, hacking, powershell, varonis, securityfwd, computer,...
Hacking and InfoSec stuff
movies

eye 54

favorite 0

comment 0

Blockchain-coordinated decentralized applications represent a radical departure from the client-server model on which most of the currently popular web applications are based. On one hand, such đapps’ approach to scalability is more natural as the computing power and bandwidth available for applications grows in proportion to their user base, while on the other hand the lack of a centralized trusted infrastructure under the control of a single — typically corporate — entity raises unique...
Topics: Youtube, video, Science & Technology, blockchain, smart contracts, distributed ledger
Hacking and InfoSec stuff
by Black Hills Information Security
movies

eye 121

favorite 0

comment 0

Deviant Ollam, from The Core Group, gives a presentation on physical penetration testing and the emotional impact on stakeholders that must be considered when scoping and conducting an engagement. This is a must see for any penetration testing professional or security team considering hiring someone to test their physical security. Download slides: https://deviating.net/lockpicking/slides.html Direct link: https://deviating.net/lockpicking/slides/pen_testing_and_emotional_work.pdf The CORE...
Topics: Youtube, video, Education, Physical Penetration Testing, Pentesting, Pentester, Ethical Hacker,...