CB15 InSecurity of Medical Devices by Florian Grunow

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=GWwKsNUjfCU



Duration: 1:00:44
7 views
0


CODE BLUE - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #BlueCode

https://codeblue.jp/

CODE BLUE is an international conference where the world's top class information security specialists gather to give cutting edge talks, and is a place for all participants to exchange information and interact beyond borders and languages.

CODE BLUE will be inviting well-known researchers from all over the world to share their latest findings, as well as discovering researchers in Japan and other Asian nations, and disseminating their findings and achievements to the world.

As technology and society move forward and IoT (Internet of Things) is becoming a reality, security is increasingly becoming an urgent issue. The Internet world also needs to gather researchers to collaborate and think together about ways to respond to emergency situations, and come up with possible solutions.

CODE BLUE aims to be a place where international connections and communities form and grow, and will contribute to a better Internet world by connecting people through CODE (technology), beyond and across the BLUE (oceans).

CODE BLUE is an international talks where the world's top class information security specialists gather to give cutting edge talks, and is a place for all participants to exchange information and interact beyond borders and languages.

CODE BLUE will be inviting well-known researchers from all over the world to share their latest findings, as well as discovering researchers in Japan and other Asian nations, and disseminating their findings and achievements to the world.

In the medical world, the phrase "CODE BLUE" means "emergency situation" and in some cases "relative staff need to gather in a designated area." As technology and society move forward and IoT (Internet of Things) is becoming a reality, security is increasingly becoming an urgent issue. The Internet world also needs to gather researchers to collaborate and think together about ways to respond to emergency situations, and come up with possible solutions.

CODE BLUE aims to be a place where international connections and communities form and grow, and will contribute to a better Internet world by connecting people through CODE (technology), beyond and across the BLUE (oceans).




Other Videos By All Hacking Cons


2022-01-23CB15 PANDEMONIUM Automated Identification of Cryptographic Algorithms by Yuma Kurogome
2022-01-23CB15 How South Korea Invests in Human Capital for Cyber Security by Seungjoo Gabriel Kim
2022-01-23CB15 Ninja Correlation of APT Binaries by Bhavna Soman
2022-01-23CB15 audio Threat Analysis of Windows 10 IoT Core by Naohide Waguri
2022-01-23CB15 audio Backdoor master key for MS Office by Shigeo Mitsunari & Yoshinori Takesako
2022-01-23CB15 Extortion and Cooperation in the Zero day Market by Alfonso De Gregorio
2022-01-23CB15 New immune system of information security from CHINA by Xiaodun Fang
2022-01-23CB15 audio Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa
2022-01-23CB15 Defeating Firefox by Muneaki Nishimura
2022-01-23CB15 Wireless security testing with attack by Keiichi Horiai
2022-01-23CB15 InSecurity of Medical Devices by Florian Grunow
2022-01-23CB15 Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik
2022-01-23CB15 The Only Way to Tell the Truth is in Fiction by Richard Thieme
2022-01-23CB15 An Abusive Relationship with AngularJS by Mario Heiderich
2022-01-23CB15 Making & Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio
2022-01-23CB15 Abusing Adobe Reader’s JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc
2022-01-23CB15 Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura
2022-01-23CB15 Keynote The Singularity is Near by Takuya Matsuda
2022-01-23CB15 A new exploitation method to bypass stack canaries by Yuki Koike
2022-01-23CB14 The active use and exploitation of Microsoft s Application Compatibility Framework
2022-01-23CB14 Takahiro Matsuki & Dennis Kengo Oka



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering