CypherCon VideoCast Episode 2 InfoSec Oasis The First Hacker Conference in Virtual Reality C

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=tnUE4HbtRC4



Duration: 58:33
2 views
0


CypherCon - VideoCast Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CypherCon
CypherCon is Wisconsin’s largest annual hacker conference based in Milwaukee, Wisconsin. Topics include Hacking, Information Security, Privacy, Cryptography, Forensics, and other Security oriented topics.
The event aims to lead, convene, and connect local and neighboring hacker and information security friends for an open discussion on strong cryptography, become advocacy outlet for privacy, and strive for the betterment of education of the general public in a diligent, loyal, honest manner, and not knowingly be part of any illegal or improper activities. We will accomplish this by being the interchange of knowledge and ideas, advancing the industry forward, while never forgetting our cultural hacker past.

Years 1-5 has been about immediacy & living in the moment.

Years 6-10 is about chooses one can make in life.
The conference format allows for specialized areas called villages, interesting talks, informal discussions, socializing, challenges, contests, and competitions. Technology and hacking is the primary purpose of the con but recommend divination into other related topics. Some like hacking the badge, some like capture the flag, some like the presentation topics.




Other Videos By All Hacking Cons


2022-04-17Off Shore Development and Outsourcing Information Security in Plato's Cave DeepSec 2010
2022-04-17Mobile VoIP Steganography From Framework to Implementation DeepSec 2010
2022-04-17Mobile privacy Tor on the iPhone and other unusual devices DeepSec 2010
2022-04-17The Future of Social Engineering DeepSec 2010
2022-04-17Targeted DOS Attack and various fun with GSM Um DeepSec 2010
2022-04-17Remote Binary Planting An Overlooked Vulnerability Affair DeepSec 2010
2022-04-17Recent advances in IPv6 Insecurities DeepSec 2010
2022-04-17Payload already inside data re use for ROP exploits DeepSec 2010
2022-04-17Passwords in the wild What kind of passwords do people use, and how do we crack them DeepSec 20
2022-04-17OsmocomBB A tool for GSM protocol level security analysis of GSM networks DeepSec 2010
2022-04-15CypherCon VideoCast Episode 2 InfoSec Oasis The First Hacker Conference in Virtual Reality C
2022-04-15CypherCon VideoCast Episode 1 Michelle Meas discusses COVID 19 with Host Kyle Puckhaber Cypher
2022-04-15CypherCon VideoCast Episode 12 Hacking the Financial System CypherCon VideoCast
2022-04-15CypherCon VideoCast Episode 11 Gods Art CypherCon VideoCast
2022-04-15CypherCon VideoCast Episode 10 Pentesting Business CypherCon VideoCast
2022-04-15CypherCon VideoCast Episode 9 What’s Hackable CypherCon VideoCast
2022-04-15CypherCon VideoCast Episode 8 Journey of an InfoSec Warrior CypherCon VideoCast
2022-04-15Web 2 0 Application Kung Fu Securing Ajax & Web Services DeepSec 2007
2022-04-15The Three Faces of CSRF DeepSec 2007
2022-04-15Flash Security Basics DeepSec 2007
2022-04-15Economics of Information Security DeepSec 2007



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering