Skip to main content

Hacking and InfoSec stuff



rss RSS

117
RESULTS


More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid
A B C D E F G H I J K L M N O P Q R S remove-circle T U V W X Y Z
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 18

favorite 0

comment 0

The Kaspersky Security Analyst Summit (SAS) is an annual event connecting anti-malware researchers and developers, global law enforcement agencies and CERTs and members of the security research community. The goal is to learn, debate, share and showcase cutting-edge research, new technologies and discuss ways to improve collaboration in the fight against cyber-crime. #TheSAS2014 gathered more than 200 security experts from around the globe to work hard and have fun in Punta Cana, Dominican...
Topics: Youtube, video, Science & Technology, #TheSAS2014, #security, #kaspersky, #infosec
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 22

favorite 0

comment 0

The Security Analyst Summit (SAS) is an exclusive, invite-only gig, with only the cream of the world’s crop of top IT security movers and shakers taking part. It’s not massive – it’s more intimate, which means it’s more meaningful and more gets done – and twice as engaging and interesting for all participants. But don’t feel left-out by this guest-list-only cliquishness. Read More http://eugene.kaspersky.com/2015/02/26/kaspersky-lab-security-analyst-summit-2015/ Join the...
Topics: Youtube, video, Science & Technology, #TheSAS2015, KASPERSKY LAB, cyber security, anti-virus,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 25

favorite 0

comment 0

Kaspersky Lab presents Security Analyst Summit 2015 - #TheSAS2015 February 15-19, 2015; Cancun, Mexico Learn more on https://sas.kaspersky.com #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=Yz2eUO4KrOw Uploader: Kaspersky Lab
Topics: Youtube, video, Travel & Events, Security Analyst Summit, Kaspersky Lab, #TheSAS2015, Cancun,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 15

favorite 0

comment 0

Every February several hundred of the world’s top IT security experts gather in a sunny beach resort, be it in the Americas, Europe, Asia, or just off the coast of Western Africa. But they don’t go for the sun, per se. Or the beach. Or the beach-bar cocktails. They go… to fight cyber-swine! At least, that’s what they attempt to tell their loved ones when they disappear for a week in Feb to this year’s chosen idyllic paradise. And this year’s idyllic paradise was the Canary Islands...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 18

favorite 0

comment 0

The world is turning… But SAS will always be the same... Tenerife, Spain, February 7-11, 2016. #TheSAS2016 Source: https://www.youtube.com/watch?v=zbXpQyZRi8o Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2016, Kaspersky Lab (Business Operation),...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 29

favorite 0

comment 0

#TheSAS2017 Find more info http://sas.kaspersky.com Twitter @KasperskySAS *** Get access to the unique videos of the presentations given at #TheSAS2016: https://kas.pr/Y1X6 *** #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=oBwlBOFuEgg Uploader: Kaspersky Lab
Topics: Youtube, video, Entertainment, thesas2017, kaspersky lab, cyber security, anti virus, conference,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 48

favorite 0

comment 0

On the Grid, there is no chance of survival without humans working closely with machines. In the real world, humans must protect our machines to keep society in order. Our guys are ready for this challenge. Join the battle at #TheSAS2017. Find more info and register at http://sas.kaspersky.com Twitter @KasperskySAS *** Get access to the unique videos of the presentations given at #TheSAS2016: https://kas.pr/Y1X6 *** #KasperskyLab #cybersecurity #ITsecurity Source:...
Topics: Youtube, video, Entertainment, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity, conference
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 66

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=WgBWFuDTGBM Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, thegrugq
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 29

favorite 0

comment 0

Mark Dowd Azimuth Security Memory safety vulnerabilities are everywhere: they appear in your favorite iPhone or Android jailbreak, your favorite malware kit, and your favorite Project Zero blog posts. The last 10 years has seen an explosive growth in technologies aimed at mitigating these vulnerabilities or eliminating them entirely. The traditional strategies employed to combat memory safety vulnerabilities have undergone significant refinement, and new technologies have also been created to...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 112

favorite 0

comment 0

Many of the most active APT actors from the last decade have faded into oblivion, either following high profile public outings, or for reasons unknown. Others, in spite of public reporting, have remained active and have continued to operate quietly under the radar for years. In this presentation, we take an indepth look into one such group. Operating since 2009, followed closely by the security community for years, and with high profile exposure in 2013, many assumed they subsequently...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
movies

eye 41

favorite 0

comment 0

Jaime Blasco /Alienvault Labs Juan Andrés Guerrero-Saade /Kaspersky Lab South Korea has been getting pummeled. Their threat landscape includes players of different stripes, ranging from financial crime to cyber-espionage. Perhaps the most interesting players are a subset intent on using extortion and sabotage to get their way. Equipped with wiper malware and target specific exploits, these actors are zipping into networks, exfiltrating data in bulk, and then leveraging outrageous demands. Once...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 24

favorite 0

comment 0

Drones in the sky, drones in the sea, drones on land, but are we ready? Drones are expected to play key roles in future smarter cities, hovering throughout the city in defined missions and various objectives. Drones are expected to avoid, signal and prevent any possible cause of threat to any of the city’s constituents or performance. The implementation of coordinated municipal drone programs is highly demanding from a cybersecurity perspective and requires a set of technological and...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 63

favorite 0

comment 0

Catherine Lotrionte Georgetown University Security researchers and malware reversers have morphed into threat intelligence brokers. You discover a new malware sample, do your magic, and staring you in the face is a multi-million dollar nation-state operation targeting suspected terrorists. Or, your newest amazing discovery is a key piece of a global law enforcement surveillance effort to nab an online sex trafficking or pedophilia ring. As much as we’d like to paint cyber operations as...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
movies

eye 25

favorite 0

comment 0

You’ve heard it all before: “The security industry has failed.” “Developers just don’t care.” “They deserved to be breached.” These and many other overused themes are promulgated by security practitioners at conferences, in social media, and worst of all, in their day jobs. Security practitioners, particularly those new to the industry, regurgitate the same counterproductive ideas and behaviors to the extent they have become clichés. This ultimately damages our collective...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 14

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=_mE_JmwFi1Y Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by TROOPERScon
movies

eye 47

favorite 0

comment 0

TROOPERS17 - Defense & Management - IT-Security Conference Upcoming: TROOPERS18 - 12th - 16th March 2018, Heidelberg, Germany. Find out more: https://www.troopers.de Source: https://www.youtube.com/watch?v=wP2J9aYM6Oo Uploader: TROOPERScon Upload date: 2017-04-05
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

According to a new Cisco report, Internet of Things devices will grow faster than any other category of connected devices by the year 2020. A substantial number of these fall into the category of Industrial Internet of Things (IIoT). Most of these IIoT products are likely to contain some level of encryption as security and privacy play a greater role going forward. With globalization, these ‘things’ can be designed, sourced, manufactured, and assembled in totally different countries;...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
movies

eye 42

favorite 0

comment 0

Kymberlee Price Bugcrowd Over the last 15 years there have been vulnerability disclosure policies written by individuals, companies, and cross-industry working groups. They are all well thought out by intelligent people who were trying to make things better for everyone. Each of these policies has failed. Why are they failures? Can we do anything to make any of them successful? And frankly does it matter if we just give up and stick with the status quo? In this presentation, I will discuss the...
Topics: Youtube, video, Science & Technology, thesas2016, kaspersky lab, security analyst summit
Hacking and InfoSec stuff
movies

eye 269

favorite 0

comment 0

How to Hijack MacOS Machines with EvilOSX Full Tutorial: http://bit.ly/EvilOSX Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While many people consider macOS (aka Mac OS X) computers to be more secure, some of its most prominent features make it all the more damaging when infiltrated by a skilled attacker. On this episode of Cyber Weapons Lab, we'll teach you how to infiltrate a MacBook or other macOS computer using EvilOSX. Follow Null Byte on:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 82

favorite 0

comment 0

Manage Network Bandwidth Per Device with Evil Limiter Full Tutorial: http://bit.ly/EvilLimits Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you've ever found an unknown device connected to your network or think that a particular computer is taking up too much bandwidth, being able to limit the traffic flowing to said devices can be very useful. Today on Cyber Weapons Lab, we'll show you how to use Evil Limiter, a tool for controlling network...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 63

favorite 0

comment 0

Note: use "beef-xss" not "beef" when installing the tool. Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Hijack Browsers with BeEF Full Tutorial: https://nulb.app/z3pkb Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 156 Compromising a browser can enable a hacker to wreak all sorts of havoc on an unsuspecting target. Today, in this episode of Cyber Weapons Lab,...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 107

favorite 0

comment 0

How to Hack a Sonos Wi-Fi Speaker with Python Full Tutorial: http://bit.ly/SonosHack Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie IoT devices such as speakers are great products, but they're a point of vulnerability when incorrectly secured onto a network. Today, we'll show you how to use python to take control of Sonos speakers on this episode of Cyber Weapons Lab. In our example, we're showing off a simple 7-line Python script that will prevent...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 14

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=KM-DHeGwlvc Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by 0xdade
movies

eye 24

favorite 0

comment 0

Subtitle: Testing EDR Capabilities As organizations deploy EDR (Endpoint Detection & Response) solutions, it becomes imperative that these solutions are tested. The efficacy of these products depends on their correct configuration and deployment. In order to conduct these tests, we have developed a free Open Source framework called the Atomic Red Team. Designed to provide teams with small discrete tests. We want these test to be vendor agnostic, and representative of actual adversary...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, EDR, endpoint detection...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 44

favorite 1

comment 0

We discuss how to fight cybercrime at the Security Analyst Summit 2014 http://sas.kaspersky.com/ Source: https://www.youtube.com/watch?v=1vTR6JVKT38 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2014, infosecurity, cybersecurity
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 28

favorite 1

comment 0

Many of us use mobile devices to view, write and send corporate e-mails, and some of us publish the corporate email address in social networks such as LinkedIn. While travelling, we also use public Wi-Fi, which is sometimes not encrypted. Users should realize that by doing these things their mobile devices can become entry points for targeted cyberattacks organized against the company. In his presentation, Costin Raiu, Director of the Global Research and Analysis Team of Kaspersky Lab, details...
Topics: Youtube, video, Science & Technology, cyberattacks, targeted attacks, IT threats, corporate IT...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 34

favorite 1

comment 0

Nowadays, targeted attacks are an extremely serious threat to the security of small, medium or large enterprises. A successful targeted attack can seriously damage a company's intellectual property, confidential information and reputation. Targeted attacks generally follow predefined strategies and one of the possible vectors is to attack via a mobile device. Attacking a mobile device using ZeuS (ZitMo) can be considered a prototype method for carrying out targeted attacks via smartphones, and...
Topics: Youtube, video, Science & Technology, Ryan Naraine, Kaspersky Lab, Denis Maslennikov, targeted...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 50

favorite 0

comment 0

Matthew Olsen, President, Business Development, IronNet Cybersecurity, Inc. Terrorist groups, like ISIS and al-Qaida, are looking to build their capabilities to carry out cyberattacks. What is the nature of this threat, how is it growing and how should we respond? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=kuN0Zdo9EHU Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Critical Infrastructure, Threat...
How to Test a Wireless Network Card for Kali Linux Compatibility Full Tutorial: http://bit.ly/MmAndPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux doesn't work with all wireless network adapters on the market. Aside from chipset compatibility, one needs their adapter to be able to be put into monitor mode as well as perform packet injection. Today, we'll guide you through the selection process and show you how to test for these features...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by SecurityFWD
movies

eye 91

favorite 0

comment 0

The Wi-Fi deauther is a cheap and easy tool designed by Stefan Kremser to scan and attack Wi-Fi devices. Watch Stefan and I troubleshoot the advanced new features of the latest deauther release! Source: https://www.youtube.com/watch?v=I0N2KpwGETI Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, deauther, securityFWD, spacehuhn, wifi hacking, Stefan...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 15

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=j98SmERmvUw Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by The Tor Project
movies

eye 30

favorite 0

comment 0

Isabela Bagueros, Executive Director of the Tor Project, thanks you for your support and help taking back the internet. Download Tor Browser to protect your privacy and freedom online: https://torproject.org Donate to help keep Tor strong for millions of people around the world: https://donate.torproject.org Source: https://www.youtube.com/watch?v=Wy1cib8kzhE Uploader: The Tor Project
Topics: Youtube, video, Nonprofits & Activism, Tor, Tor Browser, privacy, digital rights, internet...
Hacking and InfoSec stuff
by The Tor Project
movies

eye 20

favorite 0

comment 0

Nick Mathewson, one of the co-founders of the Tor Project, thanks Tor supporters for their help taking back the internet. Download Tor Browser: https://torproject.org Donate to help keep Tor strong: https://donate.torproject.org Source: https://www.youtube.com/watch?v=7F4iolobR_4 Uploader: The Tor Project
Topics: Youtube, video, Nonprofits & Activism, fundraising, privacy, digital rights, internet, tor, tor...
Hacking and InfoSec stuff
by The Tor Project
movies

eye 24

favorite 0

comment 0

Stephanie Whited thanks Tor supporters for their help disrupting the surveillance economy and taking back the internet with Tor. Download Tor Browser for protection against tracking, surveillance, and censorship online: https://torproject.org Donate to help keep Tor strong for millions of people worldwide: https://donate.torproject.org Source: https://www.youtube.com/watch?v=ZWhtotDBrqg Uploader: The Tor Project
Topics: Youtube, video, Nonprofits & Activism, privacy, tor, tor network, tor browser, surveillance...
Hacking and InfoSec stuff
by 0xdade
movies

eye 53

favorite 0

comment 0

Note: The audio cuts out at 5:42 and doesn't pick up again until 10:32. It's like this in the source material. Sorry for the inconvenience. We don’t need a Cyber Moonshot; we’ve got enough already. Computing technology is enabling multiple concurrent revolutions, in biotechnology, manufacturing, robotics, AI, and literal rocket engineering. These are our Moonshots, fueled by governments, companies, and tinkerers, powering the growth engine of the global economy and reshaping society. Our...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 22

favorite 0

comment 0

Chris Soghoian, Principal Technologies and Senior Policy Analyst with the American Civil Liberties Union, describes the crisis of security on mobile devices and pinpoints the flaws of providers' limited security updates. Source: https://www.youtube.com/watch?v=89YekDwMfqA Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 67

favorite 0

comment 0

After the shockwaves triggered by the Brexit referendum and the election of Donald Trump, media outlets desperately looked for explanations. Previously unknown researchers offered a saving straw: Automated accounts on social media had influenced the public opinion on a massive scale. This theory was widely spread by research institutions, the media, and even government officials, but taking a closer look at the research behind it shows that the whole social bots theory has absolutely no basis....
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 28

favorite 0

comment 0

Discussions of autonomy and self-driving cars focus so much on the tangible artifact -- the car itself -- but so much more will change *beyond* the car... from public infrastructure, the automotive value chain, and energy, to finance (including insurance), the justice system, and yes, shopping too. But how and when do we think this will actually happen? Frank Chen (head of research, deal, and investing at Andreessen Horowitz), considers these questions and use cases in this set of videos, which...
Topics: Youtube, video, Science & Technology, self-driving cars, autonomous cars, technology shifts
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 16

favorite 0

comment 0

Sergey Golovanov, Sergey Lozhkin, Kaspersky Lab; Peter Zinn, NHTCU A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 background music by Depeche Mode "Personal Jesus" Source: https://www.youtube.com/watch?v=utaPZn-CxXU Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Sergey Golovanov Sergey Lozhkin NHTCU Peter Zinn...
Hacking and InfoSec stuff
movies

eye 19

favorite 0

comment 0

Come see how the NOC has been adjusted, adapted, and reinvented as the industry, and the potential threats have changed over the years... By: Bart Stump & Neil Wyler (Grifter) Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#the-black-hat-noc-greatest-hits-and-holycows-21675 Source: https://www.youtube.com/watch?v=RQj0Eyb71HU Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by RSA Conference
movies

eye 207

favorite 0

comment 0

Uri Rivner, Head of Cyber Strategy, BioCatch Blockchain has huge potential in finance and trade—but a Bitcoin-less Blockchain is an open invitation to fraud and identity theft. Why are blockchains so exposed? What can be done to protect them? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=UJBMerQ3kJA Uploader: RSA Conference Upload date: 2017-02-15
Topics: Youtube, video, Science & Technology, Authentication, Supply Chain, Identity Theft, Identity...
Hacking and InfoSec stuff
movies

eye 28

favorite 0

comment 0

In 2011, we saw a sudden increase in the abilities of computer vision systems brought about by academic researchers in deep learning. Today, Peter Norvig explains, we see continued progress in those fields, but the most exciting aspect is the diversity of applications in fields far astray from the original breakthrough areas, as well as the diversity of the people making these applications. Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter:...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 26

favorite 0

comment 0

How can brands evolve in an internet-native world? The answer may lie in the case study of BuzzFeed’s Tasty food network, a global media brand that evolved by breaking all the rules: focusing on building a viral brand first, and then figuring out distribution and channel second. But what else can we learn about the process of innovation -- and experimentation cycles -- here (including physical products)? And does brand loyalty still exist? In this short talk delivered at the annual a16z...
Topics: Youtube, video, Science & Technology, brand, social, digital, CMOs, viral marketing, design,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 22

favorite 0

comment 0

Zulfikar Ramzan, Ph.D., Chief Technology Officer, RSA Whitfield Diffie, Cryptographer and Security Expert, Cryptomathic Shafi Goldwasser, Director, Simons Institute for the Theory of Computing Paul Kocher, Independent Tal Rabin, Distinguished Researcher and the Manager of the Cryptographic Research Group, IBM Research Ronald Rivest, Professor, Massachusetts Institute of Technology Humans have been using cryptographic techniques since the dawn of time to safeguard their data and achieve...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
by aantonop
movies

eye 20

favorite 0

comment 0

This talk took place on December 3rd 2016 at the Coinscrum {MiniCon}, hosted by Imperial College in London, England: https://www.meetup.com/coinscrum/events/235709468/ Want to hear more about Bitcoin and open blockchains? Follow on Twitter: @aantonop Visit my website: https://antonopoulos.com/ Source: https://www.youtube.com/watch?v=Bu5Mtvy97-4 Uploader: aantonop Upload date: 2016-12-10
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 248

favorite 3

comment 0

The early days of the web provided an outlet for people who wanted to explore ghosts, vampires, werewolves, and other scary things. This program looks at several such sites. Guests include Lady Carolin (Carrie Carolin) who runs cascade.net, a portal for Gothic sites and links to sites dealing with magic, haunted houses, halloween, the paranormal and the occult. Vinnie Corella and Phil Simon show off their site, stepcross.com and the game Bad Mojo in which you go through life as a cockroach....
Topics: Youtube, video, Howto & Style, cdc, cult, dead, cow, dark, side, web, carrie, carolin, goddess,...
Hacking and InfoSec stuff
by aantonop
movies

eye 40

favorite 0

comment 0

Trust without centralization, digital cash without identity, and the currency commons beyond corporations. In this talk, Andreas clarifies what "trustless" means and explains why we should avoid departing from a realm where people can pay people without intermediaries imposing their political choices into every transaction. He also argues that cashlessness represents a fundamental shift in the relationship between people and money, people and the state, people and corporations. This...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money, finance,...
Hacking and InfoSec stuff
by a16z
movies

eye 55

favorite 0

comment 0

I'm going to take you out to the edge to show you what the future looks like." So begins a16z partner Peter Levine as he takes us on a "crazy" tour of the history and future of cloud computing -- from the constant turns between centralized to distributed computing, and even to his "Forrest Gump rule" of investing in these shifts. But... how can we say cloud computing is coming to an "end" when it hasn't even really started yet?? Because the edge -- where...
Topics: Youtube, video, Science & Technology, #cloud computing, #datacenters, #networking, #sensors,...
Hacking and InfoSec stuff
by a16z
movies

eye 51

favorite 0

comment 0

In his now annual state-of-innovation talk at the a16z Summit in November 2018, Andreessen Horowitz’ Benedict Evans walks through where we are now in software eating the world... and how things may continue to change over the next 10 years. What's the state of not just "the world of tech", but tech in the world? The access story is now coming to an end, observes Evans, but the use story is just beginning: Most of the people are now online, but most of the money is still not. If we...
Topics: Youtube, video, Science & Technology, innovation, technology, ecommerce, machine learning, a16z...
Hacking and InfoSec stuff
movies

eye 16

favorite 1

comment 0

The HTTP Alternative Services header (Alt-Svc, RFC 7838) was introduced in 2013 by seasoned developers with good intentions in a bid to streamline load balancing, protocol optimizations, and client segmentation... By: David Starobinski, Trishita Tiwari & Ari Trachtenberg Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#the-evil-alt-ego-abusing-http-alternative-services-18822 Source: https://www.youtube.com/watch?v=u-PVpQ2xr-I Uploader: Black...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by Black Hat
movies

eye 77

favorite 1

comment 0

Spy-cams have increased. In this talk, we will introduce the structure and work principle of spy cameras, and several effective ways to find all the cameras... By: Shupeng Gao & Ye Zhang Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#the-evil-of-spy-camera-18821 Source: https://www.youtube.com/watch?v=hF1u2YYVSII Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 26

favorite 0

comment 0

Kaspersky Lab's CTO, Nikolay Grebennikov, joins Ryan Naraine to discuss the evolution of anti-malware software. Grebennikov talks about the changing face of the malicious threat facing desktop users and the additional components added to Kaspersky's anti-malware products to move beyond signature-based detection of threats. He goes into detail about heuristics and emulation, behavior-based detection and newer proactive technologies to handle real-time malware detection. Source:...
Topics: Youtube, video, Science & Technology, anti-malware, software, evolution, malicious threat,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 35

favorite 0

comment 0

Susan Hennessey, Senior Fellow, Governance Studies, The Brookings Institution, Executive Editor, Lawfare Christopher A. Wray, Director, Federal Bureau of Investigation FBI Director Christopher Wray will discuss how the FBI’s unique position as the lead domestic US law enforcement and intelligence agency is central to US government efforts to counter criminal and national security cyberthreats to the United States and its citizens. Director Wray will participate in a fireside chat-style...
Topics: RSAC, RSA2019, RSA
A former CISO, a future CISO, and a hacker walk into a bar… a profound realization over cocktails: no kid dreams of being a CISO – nor should they. So we hatched a plan – send a Terminator unit back to the 90s and eliminate the role we know today, to save all humanity. We suck at robots and hot tub time machines are creepy so we settled on a Firetalk. As global spending on infosec is projected to eclipse $1 Trillion in the next 5 years, the failure rate will be near 100%. After 20+ years...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
Hacking and InfoSec stuff
movies

eye 47

favorite 0

comment 0

Alan Paller, Research Director and Founder, SANS Institute Heather Mahalik, Director of Forensics Engineering at ManTech and Mobile Forensics Course Director, SANS Institute Ed Skoudis, Instructor, SANS Institute Johannes Ullrich, Dean of Research, SANS Technology Institute Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing features the three people best positioned to provide answers...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
by 0xdade
movies

eye 31

favorite 0

comment 0

Subtitle: A Cipher in Arlington National Cemetery Elonka Dunin, known for her website on the World’s Most Famous Unsolved Codes, discovered a cipher on one of the tombstones in Arlington National Cemetery. Not just any tombstone, it’s that of William and Elizebeth Friedman, two giants in the fields of cryptanalysis. In fact, William Friedman created the terms of cryptanalysis, and also of “index of coincidence”. Elizebeth, who had taught William about cryptography in the first place,...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, friedman tombstone
Hacking and InfoSec stuff
by RSA Conference
movies

eye 40

favorite 1

comment 0

J. Trevor Hughes, President and CEO, International Association of Privacy Professionals This session will explore the changing privacy policy landscape and what is next for technology and privacy. Understanding how one affects the other is of critical importance to ensure the industry stays compliant while still allowing innovation. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=AunBy3jI-FQ Uploader: RSA Conference Upload date: 2017-02-21
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac
Hacking and InfoSec stuff
by RSA Conference
movies

eye 32

favorite 0

comment 0

Moderator: Brian Russell, Chair - Internet of Things (IoT) Working Group, Cloud Security Alliance A panel discussion with experts across industry verticals will look at the future of ransomware for the consumer devices, health care devices, connected and autonomous vehicles that make up the IoT. We will discuss exploitation methods and impacts that future ransomware will have on these connected devices and methods that industry can work together to combat the threat from becoming pervasive....
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, authentication, network...
Hacking and InfoSec stuff
movies

eye 40

favorite 0

comment 0

Eric Schmidt, Executive Chairman, Alphabet Inc. Security newsfeeds today are chock full of headlines about artificial intelligence and machine learning. A.I. sits at the epicenter of mankind’s quest for technological advancements. This poses some timely questions: how is this already being used to protect people today, and what can we expect in years to come? More broadly, how will it transform security and the way we use technology? Join us as Gideon Lewis-Kraus leads a candid conversation...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, eric schmidt, alphabet, rsac...
Hacking and InfoSec stuff
by Null Byte
movies

eye 50

favorite 0

comment 0

Earn $$. Learn What You Need to Get Certified (96% Off): https://nulb.app/cwlshop How to Get Started in 3D Printing Full Tutorial: https://nulb.app/x7fhv Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 169 Getting started with 3D printing is easy with printers like the Creality Ender 3 and other cheap open-source printers. Once you find other people's prints on the internet, you can try them out yourself, and then try...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
The real cost of security work and professional intelligence goes beyond dollars. It is measured in family life, relationships, and mental and physical well-being. The divorce rate is as high among intelligence professionals as it is among medical professionals, for good reason – how can relationships be based on openness and trust when one’s primary commitments make truth-telling and disclosure impossible? We might as well begin our discussion with reality. Choosing unreality instead means...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 19

favorite 0

comment 0

Instant apps have many advantages over normal apps, such as click-to-play and concise design, and they are becoming more and more popular. In this talk, we will dive into a common architecture of instant app framework, and demonstrate attack models for it... By: Hao Xing Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#the-inside-story-there-are-apps-in-apps-and-here-is-how-to-break-them-18380 Source: https://www.youtube.com/watch?v=-UndfqVJMf8...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
movies

eye 36

favorite 0

comment 0

Traditional banking services have fallen flat for an enormous segment of the population -- whether because they’re “unbanked,” or because the state of those services makes it even more expensive to be poor. Why are so many low-income populations -- both in the U.S. and around the world -- left behind? In this talk delivered at our most recent annual a16z Summit in November 2017, Angela Strange shares what’s happening and why; how we might address the problem; and where this creates...
Topics: Youtube, video, Science & Technology, fintech, financial services, payments
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 16

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=3gipxdJ22iM Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by The Tor Project
movies

eye 22

favorite 0

comment 0

The Tor community, network, and ecosystem are growing and evolving at a very fast pace - from new secure applications using Tor to deploying relays in public libraries around the world. Tor as a project, but first and foremost as a large community, is at the forefront of technical, social, economical, political, and cultural battles pertaining to anonymity and basic human rights. This talk will cover the state of Tor on all levels: organizational, community, and technical. Recent and upcoming...
Topics: Youtube, video, Science & Technology, Tor, ecosystem, Free and open source community, darknet,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 48

favorite 0

comment 0

David Jacoby, Senior Security Researcher, Nordics, Global Research & Analysis Team, discusses his increased concern over phone support scams in which individuals act as technical support for large companies to exhort money from unsuspecting users. Source: https://www.youtube.com/watch?v=D7_EJeenVTY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Kaspersky, David Jacoby, Security Analyst Summit,...
Hacking and InfoSec stuff
by GoogleTechTalks
movies

eye 57

favorite 1

comment 0

Google Tech Talks October 26, 2005 ABSTRACT Alex Martelli on the Python Object Model. Source: https://www.youtube.com/watch?v=VOzvpHoYQoo Uploader: GoogleTechTalks Upload date: 2008-09-09
Topics: Youtube, video, Science & Technology, google, techtalks, techtalk, engedu, talk, talks,...
Hacking and InfoSec stuff
movies

eye 14

favorite 0

comment 0

This talk took place on September 7th 2016 at CTRL Collective for the L.A. Bitcoin Meetup in Los Angeles, California: https://www.meetup.com/Los-Angeles-Bitcoin/events/233382525/ Centralized payments are a powerful force for centralization of the web, creating platforms for content and services that are centralized around a payment processor/aggregator. What happens when payments themselves become decentralized? The nexus of centralization dissolves and the content platforms can become...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Hacking and InfoSec stuff
movies

eye 204

favorite 1

comment 0

Emily Wilson, Director of Analysis, Terbium Labs The reality of the dark web goes against industry reports. Most of the dark web is legal, even ridiculous activity amidst drugs, fraud and other crimes. This session will look at the funny and absurd. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=sCaiWFyKVBY Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, data security, identity theft,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 35

favorite 0

comment 0

Dr. Christine Izuakor, Senior Manager – Global Security Strategy and Awareness, United Airlines Over time, we’ve learned that cybersecurity is about much more than technology and processes. Without an organizational culture that embraces cybersecurity, efforts to build security programs can be fleeting and ineffective. This has led to the rise of a critical new role—the cyber-culture hacker. Learn about what cyber-culture hackers do, and why you need one immediately.Learning Objectives:1:...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
by BlackOpsPro07
movies

eye 550

favorite 10

comment 0

This video shows how hacking came to be and the logic and what hacking really is. Hacking is not only negative actions but it is divided into 3 categories black hat- illegal (bad) grey hat- both legal and illegal helps the community but at times does things that are illegal and white hat- such as security firms or individuals hacking for the security of others (good) Source: https://www.youtube.com/watch?v=PUf1d-GuK0Q Uploader: BlackOpsPro07
Topics: Youtube, video, Education, Hacker, Hackers, Hacking, guide, How to Hack, History of hacking
Hacking and InfoSec stuff
movies

eye 39

favorite 0

comment 0

Moderator: Alan Paller, Research Director and Founder, SANS Institute Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing provides answers from the three people best positioned to know the answers: the head of the Internet Storm Center, the top hacker exploits expert/teacher in the US and the top expert on cyberattacks on industrial control systems....
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Keynote
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 47

favorite 0

comment 0

The end of 2010 was a rather bad time to be a spammer. Thanks to an industry-wide effort that included botnet takedowns and legal cases, we saw a dramatic shift in the way spammers used unsolicited e-mail to make money. In this Lab Matters webcast, Kaspersky Lab senior spam analyst Maria Namestnikova looks closely at the pharmaceutical spam operations and discusses how spammers are using affiliate programs and rebuilt botnets to recover from last year's crackdown. Source:...
Topics: Youtube, video, Science & Technology, spam, affiliate programs, rebuilt botnets, Ryan Naraine,...
Hacking and InfoSec stuff
by aantonop
movies

eye 70

favorite 0

comment 0

In this talk, Andreas recounts the history of Bitcoin and what it represents, building upon all the stories we've been told over the centuries about what "money" is, how we perceive its value, and why the old answers have changed as we adjust to this new world of digital peer-to-peer currencies. He also discusses global threats to economic stability and trust in the financial system, including demonetisation and wealth destruction through inflation. This talk took place at the JW...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, internet, money, India,...
Hacking and InfoSec stuff
movies

eye 218

favorite 0

comment 0

Recommended Tasks for a New Kali Linux Installation Full Tutorial: http://bit.ly/Kali10 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux is one of the best operating systems to use as a hacker. However, it doesn't come perfectly configured right out of the box. Today, we'll share our list of the top 10 things you should do after installing Kali Linux, on this episode of Cyber Weapons Lab. 1:28 - Install Git 2:40 - Configure Bash Aliases...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...