Hacking Robots Before Skynet Lucas Apa

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=ZFCHvy6F9_0



Duration: 48:59
2 views
0


CONFidence - 2019
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CONFidence

http://confidenceconference.com/

Life is about making choices that eventually put us somewhere between ‘ordinary’ and ‘legendary’. We started CONFidence 17 years ago hoping it would eventually grow into one of the most valued events for security experts and enthusiasts worldwide.

Finally we can announce that CONFidence 2022 will be OFFLINE again! Let’s meet at the Krakow Aviation Museum with hackers, security experts, and IT specialists from different backgrounds and regions. Book June 6th - 7th and buy your ticket now so you don't miss the best conference!

It’s 2022 and CONFidence is proud to be ever more ambitious in spreading awareness about cyber threats among European IT sec specialists, developers, managers, bankers and governmental representatives.

One of our top priorities has always been to deliver practical, relevant, and diverse content across the different fields of IT security. Thanks to our cooperation with experts representing a great variety of backgrounds, as well as active, security-focused IT communities, we know what it takes to offer our attendees both highly technical and state-of-the-art expertise.

- practical presentations packed with case studies and hands-on experiences,
- great workshops allowing you to test newly-acquired skills,
- solutions immediately applicable to your professional routine
- discussions with international experts focused on recent events (covering burning questions and timely challenges).

The best of the best from all over the world come to CONFidence every year to share their knowledge
Get to know new problems and solutions in cybersec.
Finally you will be able to talk with everyone, discuss new technology and enjoy time with other participants.
Prepare yourself for a whole night of networking and fun.
It will allow you to apply for points necessary for an expert certificate in the field of ICT security.




Other Videos By All Hacking Cons


2022-01-27Attacking web servers via run time configuration Eldar Marcussen
2022-01-27Splunk bezpieczeństwo pracy użytkowników w Office 365 Jakub Goral
2022-01-27Linux Kernel Runtime Guard LKRG under the hood Adam pi3 Zabrocki
2022-01-27Spear phishing jak się bronić Case studies Borys Łącki
2022-01-27A 2018 practical guide to hacking RFID NFC Sławomir Jasek
2022-01-27Jailbreak dylematy hazardzisty w pentestach aplikacji iOS Wojciech Reguła
2022-01-27Security Awareness for VIPs Piece of cake or a tough nut to crack Piotr Peszko
2022-01-27Hunting for the secrets in a cloud forest Paweł Rzepa
2022-01-27Remote detection of low and medium interaction honeypots Julio C Fort
2022-01-27Invoke DOSfuscation Daniel Bohannon
2022-01-27Hacking Robots Before Skynet Lucas Apa
2022-01-27Intel ME Security keys Genealogy, Obfuscation Dmitry Sklyarov, Maxim Goryachy
2022-01-27XSS is dead We just don't get it Mario Heiderich
2022-01-27XSS in Google's application and bypassing CSP Michał Bentkowski
2022-01-27Hacking REST APIs 20 cases Michał Sajdak
2022-01-27Practical intelligence driven defense Igor Ivanov, Daniil Yugoslavskiy
2022-01-27Who and why should fear hardware trojans Adam Kostrzewa
2022-01-27Everything’s Connected aka Threat Intelligence 102 Marcin Siedlarz
2022-01-27V4GR4 Cyber Crime, Enlarged Koby Kilimnik
2022-01-27The new era of Digital Investigations past, present and future Selene Giupponi
2022-01-26The new era of Digital Investigations past, present and future Selene Giupponi



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering