2021-11-10 | Drammer Flip Feng Shui goes mobile by Victor van der Veen | 45:29 | 0 | |
|
2021-11-10 | Closing Keynote Icebergs in Android Security Privacy by Sudhi Herle | 32:24 | 5 | |
|
2021-11-10 | Android's Privacy Posture by Dinesh Venkatesan and Aditi Bhatnagar | 48:56 | 1 | |
|
2021-11-10 | Android Security Symposium 2020 Live Tuesday | 4:19:56 | 1 | |
|
2021-11-10 | Android Security Symposium 2020 Live Monday | 5:16:21 | 2 | |
|
2021-11-10 | Android Debug Bridge by Gabriel Cirlig | 36:18 | 28 | |
|
2021-11-10 | Android compiler fingerprinting by Tim Strazzere | 45:39 | 18 | |
|
2021-11-10 | An introduction to Android application security testing by Nikolay Elenkov | 1:12:54 | 13 | |
|
2021-11-10 | 50 Ways to Leak Your Data by Serge Egelman | 39:30 | 7 | |
|
2021-11-10 | Playing with your code a new approach to avoid potential hackers from by Hugues Thiebeauld | 34:11 | 4 | |
|
2021-11-09 | The quest for usable security by N Asokan | 1:01:40 | 8 | |
|
2021-11-09 | Secure elements for you and me A model for programmable secure by Alexandra Dmitrienko | 26:57 | 4 | |
|
2021-11-09 | Secure copy protection for mobile apps by Nils T Kannengiesser YouTube | 26:24 | 5 | |
|
2021-11-09 | Mobile threats incident handling by Yonas Leguesse | 44:17 | 2 | |
|
2021-11-09 | Lessons from the trenches An inside look at Android security by Nick Kralevich | 45:02 | 10 | |
|
2021-11-09 | Improving mobile security with forensics, app analysis and big data by Andrew Hoog | 1:00:51 | 2 | |
|
2021-11-09 | Human factors in anonymous mobile communication by Svenja Schröder | 22:16 | 3 | |
|
2021-11-09 | How Google killed two factor authentication by Victor van der Veen | 44:37 | 1 | |
|
2021-11-09 | Exploit mitigation at the native level for RISC based devices by Matthias Neugschwandtner | 39:59 | 0 | |
|
2021-11-09 | Continuous risk aware multi modal authentication by Rainhard D Findling and Muhammad Muaaz | 24:49 | 1 | |
|
2021-11-09 | Assessing Android applications using command line fu by Pau Oliva Fora | 46:01 | 6 | |
|
2021-11-09 | Android security architecture by Nikolay Elenkov | 58:54 | 46 | |
|
2021-11-09 | Android and trusted execution environments by Jan Erik Ekberg | 34:32 | 48 | |
|
2021-11-09 | An infestation of dragons Exploring vulnerabilities in by Josh Thomas and Charles Holmes | 53:31 | 0 | |
|
2021-11-09 | Viral Vulnerability Disclosure Casey Ellis | 30:57 | 0 | |
|
2021-11-09 | Switches get Root Canals Reid Wightman | 27:27 | 5 | |
|
2021-11-09 | Satellaview Reverse Engineering LuigiBlood | 29:22 | 12 | |
|
2021-11-09 | Rapid Prototyping Chaos MG | 31:16 | 0 | |
|
2021-11-09 | Owning the cloud through SSRF and PDF Generators Nahamsec | 29:19 | 19 | |
|
2021-11-09 | Outbreak Containment Closing Ceremonies | 18:25 | 0 | |
|
2021-11-09 | Modern Linux Heap Exploitation Dr Silvio Cesare | 28:37 | 50 | |
|
2021-11-09 | Mainframe Hacker Society Panel | 59:30 | 10 | |
|
2021-11-09 | haha v8 engine go brrrrr Syed Faraz Abrar | 59:18 | 12 | |
|
2021-11-09 | Emulating IoT firmware en masse with Docker & QEMU Ilya | 57:48 | 78 | |
|
2021-11-09 | Code that gets you pwns'd Snyff | 25:43 | 0 | |
|
2021-11-09 | Adventures in Binary Golf netspooky | 24:49 | 18 | | Binary Golf
|
2021-11-09 | Statistics Lie Except About Passwords Jeremy Druin | 38:26 | 7 | |
|
2021-11-09 | Practical OSINT Tools of the trade Tom Moore | 48:07 | 67 | |
|
2021-11-09 | Potentially unnecessary and unwanted programs aka PUPs Josh Brunty | 46:46 | 5 | |
|
2021-11-09 | On Business Etiquette and Professionalism in the Workplace Tess Schrodinger | 1:01:22 | 4 | |
|
2021-11-09 | InfoSec by the Numbers Bill Gardner | 24:27 | 0 | |
|
2021-11-09 | I have this piece of paper now what Brandon Miller | 45:13 | 1 | |
|
2021-11-09 | How To Test A Security Awareness Program Matt Perry | 59:45 | 2 | Guide |
|
2021-11-09 | Disrupting the Killchain Amanda Berlin | 52:08 | 1 | |
|
2021-11-09 | Learning Cryptography by Doing it Wrong Jeremy Druin | 47:17 | 5 | |
|
2021-11-09 | I Survived Ransomware TWICE Matt Perry | 33:10 | 0 | |
|
2021-11-09 | Human Error and It's Impact on Your Infosec Program Mike Baker | 40:59 | 2 | |
|
2021-11-09 | How to Speak Cat Picture Resiliency The ability to make a business case for proactive i | 30:30 | 0 | Guide |
|
2021-11-09 | How Russia Hacked The Election Bill Gardner | 39:57 | 0 | |
|
2021-11-09 | The Attack Is Coming From Inside The Refrigerator Mark Boltz Robinson | 55:08 | 4 | |
|
2021-11-09 | OS X Forensics Brian Martin | 52:22 | 2 | |
|
2021-11-09 | Making Our Profession More Professional Bill Gardner | 35:14 | 0 | |
|
2021-11-09 | Hacking Web Apps Brent White and Tim Roberts | 44:57 | 0 | |
|
2021-11-09 | Minimalistic Physical Assessment Kit Tom Moore | 57:54 | 0 | |
|
2021-11-09 | Shooting Phish in a Barrel Amanda Berlin | 46:05 | 1 | |
|
2021-11-09 | Do You Want Educated Users Because This is How You Get Educated Users Tess Schrodinger | 1:00:28 | 0 | |
|
2021-11-09 | Don't blame that checklist for your crappy security program Branden Miller | 44:16 | 0 | |
|
2021-11-09 | Introducing Network Scout Defending the Soft Center of Your Network Somerville Jordan | 28:26 | 1 | |
|
2021-11-09 | INFOSEC Flash Forward Changing how we think Dave Kennedy | 55:35 | 1 | |
|
2021-11-09 | Examining Hacktivism Crime and Punishment in the Digital Age Gardner DeTardo Bora Richards | 48:26 | 4 | |
|
2021-11-09 | BREAKING in BAD I'm the one who doesn't knock Jayson Street | 1:18:29 | 4 | |
|
2021-11-09 | Quick Intro To Lock Picking Adrian Crenshaw | 50:50 | 2 | |
|
2021-11-09 | Quantum Computing 01100101 Tess Schrodinger | 46:35 | 1 | |
|
2021-11-09 | overview of darknets adrian crenshaw | 56:44 | 6 | |
|
2021-11-09 | mutillidae jeremy druin part2 | 34:17 | 7 | |
|
2021-11-09 | Mutillidae Jeremy Druin | 34:06 | 4 | |
|
2021-11-09 | ISLET Isolated, Scalable, & Lightweight Environment for Training Jon Schipp | 43:25 | 1 | |
|
2021-10-12 | Help from the helpdesk Mick Douglas @bettersafetynet | 49:33 | 3 | |
|
2021-10-12 | Hackers in Unganda A Documentary Kickstarer Project Oncee | 2:52 | 0 | |
|
2021-10-12 | CCDC and Industry James L Siegel Jr WolfFlight | 32:37 | 0 | |
|
2021-10-12 | Can You Hear Me Now Leveraging Mobile Devices on Pentests Georgia Weidman | 53:41 | 2 | |
|
2021-10-12 | Building an Engaging and Effective Information Security Awareness and Training Program Bill Gardne | 1:00:29 | 0 | Guide |
|
2021-10-12 | Boring eForensic Science Items Brian Martin | 55:10 | 0 | |
|
2021-10-12 | Small Businesses Deserve Security Too Frank Hackett | 44:42 | 1 | |
|
2021-10-12 | RAWR Rapid Assessment of Web Resources @al14s and @c0ncealed | 1:05:28 | 1 | |
|
2021-10-12 | Network King Of The Hill NetKotH A hacker wargame for organizers who are lazy Adrian Crenshaw Iron | 30:10 | 6 | |
|
2021-10-12 | Malware Analysis Triage for n00bs Grecs @Grecs | 52:56 | 6 | |
|
2021-10-07 | Sprinting up the Pyramid of Pain Eric Loui | 19:59 | 3 | |
|
2021-10-07 | Profiling VIP Accounts Access Patterns Rod Soto, Joseph Zadeh, Xioadan Li | 21:43 | 4 | |
|
2021-10-07 | Practical Guide to Securing Kubernetes Dan Hubbard and James Condon | 54:56 | 11 | |
|
2021-10-07 | Pose a Threat Rob Ragan and Oscar Salazar | 34:21 | 0 | |
|
2021-10-07 | Phoenix Continued Greg Olmstead, Justin Borland | 30:19 | 1 | |
|
2021-10-07 | Welcome to ACoD 2019 | 17:42 | 1 | |
|
2021-10-07 | Using GreyNoise to Quantify Response Time Andrew Morris | 29:47 | 20 | |
|
2021-10-07 | Use a malware to catch a malware Arun Lakhotia | 34:26 | 3 | |
|
2021-10-07 | The NEW Cloud Ecosystem Jody Forness | 23:27 | 5 | |
|
2021-10-07 | The art of the windows kernel fuzz Guangming Liu | 22:22 | 9 | |
|
2021-10-07 | State of the Art of DNS Security Bill Woodcock | 27:49 | 9 | |
|
2021-10-07 | Effective Threat Hunting w Open Source Tools Eric Capuano | 30:12 | 70 | |
|
2021-10-07 | DNS IMAP Prepositioning Attacks Bill Woodcock | 37:40 | 255 | |
|
2021-10-07 | Creating Authoritative Nameserver Reputation John Bambenek | 23:00 | 0 | |
|
2021-10-07 | Correlating Observed Indicators with MISP Alan Czarnecki | 19:58 | 0 | |
|
2021-10-07 | Continuous and Automated Defense Sharma and Leres | 24:20 | 1 | |
|
2021-10-07 | Combined Tracks Day 1 Recap Sounil Yu, Ryan Moon | 15:09 | 2 | |
|
2021-10-07 | An Academic Exercise in Threat Intelligence Jesse Bowling | 41:53 | 1 | |
|
2021-10-07 | Philosophy Track Deploying the NIS Directive Janusz Urbanowicz | 28:09 | 3 | |
|
2021-10-07 | Operationalizing Cyber Threat Intelligence Xena Olsen | 19:21 | 2 | |
|
2021-10-07 | NIDS in a Portable Darta Center | 9:05 | 0 | |
|
2021-10-07 | Nearly Real Time Log Aggregation Using Lamda and Kinesis Adam Murphy | 22:48 | 2 | |
|
2021-10-07 | Monitoring our Minimum Viable Security Configuration Guillaume Ross | 22:13 | 9 | |
|