Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Reviewed
Creator
Hacking and InfoSec stuff
Aug 20, 2022 Null Byte
movies

eye 328

favorite 2

comment 1

Kody's Twitter: https://twitter.com/KodyKinzie Use of Wi-Fi is incredibly widespread in 2017. In the city of Los Angeles alone, there are hundreds of thousands of wireless networks, many of which touch critical infrastructure. Kody Kinzie is a CS student researching Wi-Fi security, and the tactics people use to hack it. He explains the tactics currently used to break or bypass the technology that makes Wi-Fi secure, and the motivations behind groups who hack Wi-Fi in 2017. For more, check out:...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, People & Blogs, wifi, hacking, lindset, null byte, nullbyte, pasadena computer...
Hacking and InfoSec stuff
Aug 19, 2022 Ethereum
movies

eye 129

favorite 1

comment 1

3 minute explanation of Ethereum by inventor Vitalik Buterin. Ethereum is a platform that makes it possible for any developer to write and distribute next-generation decentralized applications. Borrowing the concept of distributed consensus and cryptographic proof that makes cryptocurrencies such as Bitcoin so effective in trustless payments, Ethereum extends the use of these technologies to trustless agreements. This allows developers to easily build innovative new products on a censorship and...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, ethereum, smart contracts
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 1

Android applications are becoming more and more obfuscated to prevent reverse engineering. The purpose of this talk is to present dynamic binary instrumentation techniques that can help reverse engineers to deal with obfuscated codes... By: Romain Thomas Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#dynamic-binary-instrumentation-techniques-to-address-native-code-obfuscation-18309 Source: https://www.youtube.com/watch?v=MRku-2fW42w Uploader:...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
Jun 1, 2019 Privacy International
movies

eye 107

favorite 1

comment 1

لمزيد من المعلومات عن الحق في الخصوصية، برجاء الدخول على privacyinternational.org Source: https://www.youtube.com/watch?v=sjhvauht71A Uploader: Privacy International
favoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
Hacking and InfoSec stuff
Sep 22, 2017 Zcash
movies

eye 33

favorite 0

comment 1

The fourth episode of the Zcash Show & Tell series will feature two Zcash Company engineers Ariel Gabizon and Jay Graber who have been working on an implementation of XCAT (cross-chain atomic trades) between Zcash and Bitcoin. Atomic cross-chain trading is a concept that has been floating around in the cryptocurrency space for a while now and the work Zcash Company has been doing on XCAT is shaping up to be the first implementation for trades with ZEC and BTC (and eventually ETH). Each Show...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, zcash, xcat, cryptocurrencies, trading, decentralized,...
Hacking and InfoSec stuff
Sep 22, 2017 aantonop
movies

eye 631

favorite 1

comment 1

This is the first part of a talk which took place on February 22nd 2017 at the inaugural Bloktex Conference pre-event, hosted at Technology Park in Kuala Lumpur, Malaysia: https://antonopoulos.com/event/kualalumpur/ RELATED: A collection of my talks on Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTthcG265_FYSaV24hFScvC0 A collection of Q&A on various topics in Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTsHvzevl9BAUlfsfwFfU7aP Andreas M. Antonopoulos is a...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money
In this video we take a look at some of the various tools you can use in conjunction with the under door tool to improve the capabilities and expand applicat... Source: https://www.youtube.com/watch?v=yrNysJgDSo0 Uploader: TheNotSoCivilEngr
Topics: Youtube, video, lock, lockpicking, pentesting, physical penetration testing, picking, lock picking,...
The talk about the secrets of modern yacht security by Stephan Gerling from Rosen Group on Industrial Cybersecurity Conference 2019. #KasperskyLab #KICS #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=_OIZ8cnSoQI Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, ICSSecurity, ICSCybersecurity, KICS, Industrial,...
Defcon 18 Source: https://www.youtube.com/watch?v=YDW7kobM6Ik Uploader: killab66661
Topics: Youtube, video, Education, Defcon, 18
The real cost of security work and professional intelligence goes beyond dollars. It is measured in family life, relationships, and mental and physical well-being. The divorce rate is as high among intelligence professionals as it is among medical professionals, for good reason – how can relationships be based on openness and trust when one’s primary commitments make truth-telling and disclosure impossible? We might as well begin our discussion with reality. Choosing unreality instead means...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 51

favorite 0

comment 0

Richard Thieme - Social Engineering at Def Con: Games Hackers Play Social Engineering at Def Con: Games Hackers Play DefCon has changed dramatically from Def Con 1 - when sixty real hackers met in face-time for the first time to Def Con 8 when thousands crowd into a hotel for a hacking "event scene." Richard Thieme has been called a "shrewd observer of hacker attitudes and behaviors" and sometimes he is. You be the judge. In this talk he reviews *very subjectively* the way...
Topics: Youtube, video, Science & Technology
Source: https://www.youtube.com/watch?v=ExPDcrlaZWA Uploader: Georgia Weidman
Topics: Youtube, video, Education
How to Remotely Access Devices with the Libssh Vulnerability Full Tutorial: http://bit.ly/libsshFLAW Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The libssh authentication bypass discovered in an October 2018 exploit left thousands of devices on the internet vulnerable. We'll explain how it works and how to test if a device is vulnerable to it using a combination of pentesting tools such as Nmap, libssh-scanner, and libSSH-Authentication-Bypass....
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 30

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=OkZXMYLAUek Uploader: Georgia Weidman
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 110

favorite 0

comment 0

How to Destroy a Laptop with Top Secrets How did GCHQ do it to the Guardian's copy of Snowden's files? In the summer of 2013, Guardian employees destroyed computers storing top secret documents from Snowden, on instruction and supervision from GCHQ. With access to the destroyed pieces, we investigated what GCHQ's instructions were and what we can learn from it about securely eradicating data on a machine. While the initial disclosures by Edward Snowden revealed how US authorities are conducting...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Jaime Blasco, AlienVault A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=UVYnVELzJk4 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
- RSA Conference
movies

eye 34

favorite 1

comment 0

Ted Schlein, General Partner, Kleiner Perkins Nathaniel Gleicher, Head of Cyber Security, Facebook Del Harvey, Vice President, Trust and Safety, Twitter Robert Joyce, Senior Advisor, National Security Agency Peter Warren Singer, Strategist, New America The internet promised all an equal voice in public discourse, but bots and rogue advertising are being used to manipulate public opinion, critically threatening public dialog. Globally, nation states, partisan agencies and political parties have...
Topics: RSAC, RSA2019, RSA
Дмитрий Бестужев, руководитель латиноамериканского исследовательского центра «Лаборатории Касперского», рассказывает о португалоязычной киберпреступной группе, создавшей бутик таргетированных атак "Посейдон". Join the summit https://sas.kaspersky.com/ Undergo a training led by the best cybersecurity...
Topics: Youtube, video, Science & Technology, thesas2016, kaspersky lab, cybersecurity
Hacking and InfoSec stuff
movies

eye 79

favorite 0

comment 0

Sean Gallagher, Steve Ragan, and Paul Wagenseil Infosec researchers, experts, and hackers in general have a…fraught relationship with media, ranging from exploitive to adversarial. Recent episodes, including the doxxing of Marcus Hutchins by UK media and sensational coverage of his arrest, don’t help, nor do broadcast media reports that are often factually incorrect or even damaging to the security of those who take the reports as gospel. And researchers looking to get out word to the...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, guide to the media
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 21

favorite 1

comment 0

The best international conference, best international researchers – this is SAS :) We speak YOUR language – the language of IT Security :) Join the summit https://sas.kaspersky.com/ Undergo a training led by the best cybersecurity experts https://sas.kaspersky.com/#trainings Join our discussion on Twitter #TheSAS2016 Source: https://www.youtube.com/watch?v=iIDvBsrYQA0 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
- The Tor Project
movies

eye 30

favorite 0

comment 0

State of the Onion 2020 Topic: Integration Presenter: Alex Færøy https://blog.torproject.org/state-of-the-onion-2020 Resist the surveillance pandemic, support Tor: https://donate.torproject.org The Tor Project is building usable free software to fight surveillance and censorship across the globe. In this talk we'll give an update on what we got up to during 2020, what happened in the wider Tor ecosystem, and what lies ahead of us. Source: https://www.youtube.com/watch?v=cCnqMzI1xtY Uploader:...
Topics: Youtube, video, Entertainment
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

Ted Claypoole, Partner, Womble Bond Dickinson Natalie Pierce, Shareholder, Littler Mendelson P.C. Stephen Wu, Shareholder, Silicon Valley Law Group Companies that develop, sell or even just operate AI applications and robots are vulnerable to liability for causing accidents, data breaches and other possible system-wide disasters. This talk will explain how the behavior of neural networks and machine learning can cause vulnerabilities and open companies to litigation. The panelists will cover...
Topics: RSAC, RSA2019, RSA
In this talk, Andreas looks at the design principles, metaphors and words used in bitcoin and how they relate to the user experience. Source: https://www.youtube.com/watch?v=Ur037LYsb8M Uploader: aantonop Upload date: 2016-02-03
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks, design, UX, user...
Hacking and InfoSec stuff
movies

eye 55

favorite 0

comment 0

In this video we start a new series called "Overt Entry" where we take a look at some not-so subtle methods for gaining access. Source: https://www.youtube.com/watch?v=VoHnfOKQ-Dg Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
- The Tor Project
movies

eye 33

favorite 0

comment 0

Isabela Bagueros, Executive Director of the Tor Project, thanks you for your support and help taking back the internet. Download Tor Browser to protect your privacy and freedom online: https://torproject.org Donate to help keep Tor strong for millions of people around the world: https://donate.torproject.org Source: https://www.youtube.com/watch?v=Wy1cib8kzhE Uploader: The Tor Project
Topics: Youtube, video, Nonprofits & Activism, Tor, Tor Browser, privacy, digital rights, internet...
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 37

favorite 0

comment 0

Koldo Valle Garcia, Elecnor Group; Lorenzo Martinez, Securízame A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=acUnNQ-AuJY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
We have identified serious security weaknesses in chipsets used by a significant number of Wi-Fi capable devices. Specifically, we discovered that FullMAC Wi-Fi chipsets by Broadcom/Cypress – and possibly other manufacturers – are vulnerable to encrypting packets in a WPA2-protected network with an all-zero encryption key... By: Robert Lipovsky & Stefan Svorencik Full Abstract & Presentation Materials:...
Topics: Youtube, video, Travel & Events
Are US Cyber Deterrence Operations Suppressing or Inciting Attacks? CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Jason Healey and Neil Jenkins, Columbia University and Cyber Threat Alliance Recording Sponsored by RiskIQ It is now the policy of the United States to use offensive cyber operations to force adversaries to stop or reduce their attacks. Critics believe such counteroffensive activity may only inflame adversaries, seeing the new U.S. actions as aggressive themselves,...
Topics: Youtube, video, People & Blogs, CYBERWARCON
After the shockwaves triggered by the Brexit referendum and the election of Donald Trump, media outlets desperately looked for explanations. Previously unknown researchers offered a saving straw: Automated accounts on social media had influenced the public opinion on a massive scale. This theory was widely spread by research institutions, the media, and even government officials, but taking a closer look at the research behind it shows that the whole social bots theory has absolutely no basis....
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 77

favorite 1

comment 0

Richard Thieme - Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence https://www.defcon.org/images/defcon-19/dc-19-presentations/Thieme/DEFCON-19-Thieme-Staring-into-the-Abyss-WP.pdf Nothing is harder to see than things we believe so deeply we don't even see them. This is certainly true in the "security space," in which our narratives are self-referential, bounded by mutual self-interest, and characterized by a heavy dose of group-think....
Topics: Youtube, video, Science & Technology, 2011, Hacker, dc19, DEF CON, Def Con, Las Vegas, DEFCON,...
The first episode of the Zcash Show & Tell series will feature David Mercer aka radix42 who is has taken on an immense amount of work to port the Zcash client to Mac (already released) and Windows (up-and-coming)! You can find his work on github here: https://github.com/radix42 Each Show & Tell will be a 15-20 minute presentation by an outstanding community member (including ZcashCo employees from time to time) showcasing a project they've been working on. There will be 10 or 15 minutes...
Topics: Youtube, video, Science & Technology, zcash, cryptocurrency, bitcoin, cryptography,...
Reconstructing narratives transparency in the service of justice Surveillance, cryptography, terrorism, malware, economic espionage, assassination, interventions, intelligence services, political prisoners, policing, transparency, justice and you. Structural processes and roles are designed to create specific outcomes for groups. Externally facing narratives are often only one of many and they seek to create specific outcomes by shaping discourse. We will cover a wide range of popular...
Topics: Youtube, video, Education, 31c3, CCC, Chaos Computer Club, Lecture, Narrative (Profession),...
Hacking and InfoSec stuff
movies

eye 27

favorite 0

comment 0

The acquisition of money or sensitive information is the main motivation behind all modern cyber-attacks. During the last few years, the number of attacks has increased to such an extent that today we face a situation in which black markets, with a fully developed underground economy, are present in almost every nation in the world. Source: https://www.youtube.com/watch?v=1IkoDLLN0MU Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Kaspersky Lab, Lab Matters, Underground Economy, Black...
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 17

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=1pBXxZkdq9E Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 26

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=F28GpaNZ06c Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
- The Tor Project
movies

eye 22

favorite 0

comment 0

State of the Onion 2020 Topic: The Guardian Project Presenter: Nathan Freitas https://blog.torproject.org/state-of-the-onion-2020 Resist the surveillance pandemic, support Tor: https://donate.torproject.org The Tor Project is building usable free software to fight surveillance and censorship across the globe. In this talk we'll give an update on what we got up to during 2020, what happened in the wider Tor ecosystem, and what lies ahead of us. Source: https://www.youtube.com/watch?v=F1ddl6XMnQU...
Topics: Youtube, video, Entertainment
Hacking and InfoSec stuff
movies

eye 59

favorite 0

comment 0

Subtitle: A Decade of Evasive Malware Attack and Defense In this presentation we take a look at over a decade of research into the cat-and-mouse game of evasive malware vs. automated malware analysis systems. While the challenge of evasive malware is well known, few have ever comprehensively looked at the problem. We survey almost two hundred scholarly works, industry presentations, and studies of malware in the wild over the past decade to understand how we got to where we are today, and where...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, malware
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

More videos and information here: https://privacyinternational.org Support PI here: https://privacyinternational.org/donate Source: https://www.youtube.com/watch?v=NMxR2_hM2Oc Uploader: Privacy International
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 14

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=Nk5Rtha54LQ Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

The U.S. spent $2.6 trillion on healthcare in 2010; this is expected to double by 2020. Why so expensive? And why has healthcare been so resistant to the innovations that could bring costs down; why is it still so time-consuming and difficult to bring effective solutions to market? By enabling a more powerful understanding of biology, tech is literally "rewriting" how the healthcare industry discovers, tests, and brings new medicines to market... and ultimately, to patients. In this...
Topics: Youtube, video, Science & Technology, healthcare, disruption, innovation
Hacking and InfoSec stuff
movies

eye 71

favorite 0

comment 0

American Fuzzy Lop (AFL) revolutionized fuzzing. It’s easily the best thing out there for quickly performing cutting-edge automated vulnerability analysis on command line applications. But what about the situations where accessing the logic you want to fuzz via command line isn’t so simple? For example, maybe you want to fuzz a parsing function from an embedded system that receives input via an analog RF front-end. Sometimes you can write a test harness, but what if you could just emulate...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, afl-unicorn
Hacking and InfoSec stuff
- Ethereum Foundation
movies

eye 72

favorite 0

comment 0

Presentation Slides Download: https://ethereumfoundation.org/devcon/?session=zcash-private-transactions-on-a-public-blockchain Devcon2: Zcash + Ethereum = ❤ Speaker: Zooko Wilcox This presentation focuses on how Zcash uses zero-knowledge proofs to add private transactions to a public blockchain, and how Zcash and Ethereum will grow together. Zcash is a new cryptocurrency that provides private transactions — the sender’s and receiver’s addresses are not publicly visible in the...
Topics: Youtube, video, Science & Technology, blockchain, smart contracts, distributed ledger, zcash,...
False Leaks" - A Network Lens on Cyber-Enabled Information Operations CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Camille François, Graphika Recording Sponsored by RiskIQ This talk presents our work mapping the social media dissemination networks around a series of “False Leaks” incidents in the recent years, where information obtained by cyber attacks (primarily phishing) are later disseminated, inorganically amplified and presented as “leaks”. It analyzes the...
Topics: Youtube, video, People & Blogs, CYBERWARCON
We talked about EMP Weapons, Stalkers & Home Security, Deviant's covert Pie, Cars, Guns, Infosec Buzzwords, The Darknet, and Bad Risk Management. Featuring @... Source: https://www.youtube.com/watch?v=gNJYDSY4KBk Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
- RSA Conference
movies

eye 53

favorite 0

comment 0

Matthew Olsen, President, Business Development, IronNet Cybersecurity, Inc. Terrorist groups, like ISIS and al-Qaida, are looking to build their capabilities to carry out cyberattacks. What is the nature of this threat, how is it growing and how should we respond? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=kuN0Zdo9EHU Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Critical Infrastructure, Threat...
Hacking and InfoSec stuff
movies

eye 31

favorite 0

comment 0

Dr. Edward Amoroso, CEO, TAG Cyber Practitioners from the FBI, financial services, telecommunications and technology sectors share real-world case studies of how cyber-risk became business risk, and how those threats were mitigated. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=mYHiKKtvQco Uploader: RSA Conference Upload date: 2017-02-17
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Case Studies, Security Operations,...
Hacking and InfoSec stuff
- TROOPERScon
movies

eye 55

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=mqioXYpyYhM Uploader: TROOPERScon
Topics: Youtube, video, Education, TR16, TROOPERS16, ERNW, Conference, Talks, Heidelberg, Print Media...
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 18

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=-pWrij0YhGo Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly Instagram: https://www.instagram.com/oreillymedia LinkedIn: https://www.linkedin.com/company-beta/8459/ Source: https://www.youtube.com/watch?v=4ZulHySMC6Y Uploader: O'Reilly
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 36

favorite 0

comment 0

This April. Best security experts defend the digital frontier at #TheSAS2017. Find more info and register at http://sas.kaspersky.com. Twitter @KasperskySAS Get access to the unique videos of the presentations given at #TheSAS2016: https://kas.pr/Y1X6 #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=4vss3UzSx2Q Uploader: Kaspersky Lab
Topics: Youtube, video, Entertainment, #TheSAS2017, kaspersky lab, it-security, cybersecurity, conference
Hacking and InfoSec stuff
movies

eye 45

favorite 1

comment 0

Fueling the Revolution Personal production of bio-fuels Bio-fuels from waste can be part of the solution to stabilize climate change, but inaction by governments and industry means such fuels are not readily available. This talk will outline work being done to solve this problem at a personal level, by producing open source designs for equipment for local production of bio-fuels. Bio-fuels are better for the environment and a key way we could be reducing CO2 emissions. However in many countries...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Hacking and InfoSec stuff
movies

eye 31

favorite 0

comment 0

GreyEnergy: Beyond BlackEnergy and NotPetya CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Robert Lipovsky and Anton Cherepanov, ESET Recording Sponsored by RiskIQ In this talk, we’ll uncover connections between several APT groups that have been terrorizing critical infrastructure in Ukraine in the past few years but have, in some cases, been active in other countries as well. The main focus of the talk will be the introduction of GreyEnergy – a malware framework which has...
Topics: Youtube, video, People & Blogs, CYBERWARCON
We discuss The Attempted Tesla hack, Failed Spies, North Korea's New Ransomware, Bad Infosec Advice, The Great TP Shortage, Nightmare Interview Candidates, A... Source: https://www.youtube.com/watch?v=925KLD69iII Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
movies

eye 47

favorite 0

comment 0

Speakers: Whitfield Diffie | Moxie Marlinspike Come watch Whitfield Diffie and Moxie Marlinspike talk about certificate authorities, DNSSEC, SSL, dane, trust agility and whatever else they want to. Moderated by the Dark Tangent and with Q&A from the audience. For more information visit: http://bit.ly/defcon19_information To download the video visit: http://bit.ly/defcon19_videos Playlist Defcon 19: http://bit.ly/defcon19_playlist Source: https://www.youtube.com/watch?v=lt7uW6vDk00 Uploader:...
Topics: Youtube, video, Science & Technology, DEF, CON, 19, Hacking, Conference, Presentation, By,...
Hacking and InfoSec stuff
movies

eye 34

favorite 0

comment 0

Bitcoin Wednesday #22 Featuring Andreas Antonopoulos on 1 April 2015. The Bitcoin Expert gives a keynote about cryptocurrency, social and economic implications and future applications. After the keynote he does an extended Q&A session in which he answers questions asked of him by the Dutch government and the public at Bitcoin Wednesday. He also talks about the Bitcoin technology as well as his startup Third Key Solutions which was launched the day before. Source:...
Topics: Youtube, video, People & Blogs, Keynote, Q&A, Question And Answer, Bitcoin Wednesday, 1...
James Foster, CEO, ZeroFOX Avi Rubin, Professor, Johns Hopkins University Facebook is not to blame for nearly every country’s lack of guidance, regulation or legal precedent on how to secure their sovereignty from election meddling and hacking. This talk will show how nation-state adversaries are targeting election systems, election system supply chains, regional populations, elected officials and the democratic state.Learning Objectives:1: Understand the history of election hacking and how...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 16

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=X14bBJOfRCE Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 39

favorite 1

comment 0

This talk presents and examines cybercraft. Cybercraft is used to understand great power conflicts from a strategic level that includes the cyber domain, and operations within the cyber domain. Under this lens, the details of individual cyber operations are less interesting than how they are collectively advancing towards strategic objectives. This expands the understanding of cyber conflict beyond the constraints of CyberWar. Existing discussions of CyberWar are severely hampered by focusing...
Topics: Youtube, video, Science & Technology, cyberwar, cyber warfare, infowar, cybercraft, cyber...
Hacking and InfoSec stuff
movies

eye 37

favorite 0

comment 0

J. Salvatore Testa II discusses ScatterChat, a secure instant messaging client designed for non-technical users who require secure and anonymous communications, at 2600 magazine's HOPE Number Six conference in New York City. Features Javaman answering some questions and Grandmaster Ratte' hula-hooping. Source: https://www.youtube.com/watch?v=WX3RM87OXlc Uploader: cultdeadcow
Topics: Youtube, video, Howto & Style, scatterchat, hope, cult, of, the, dead, cow, cdc, hacktivismo,...
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

We're back! Here's what we've been up to, where we've been, and what we've changed to make sure we can keep bringing you great content! Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Thanks to a new policy banning instructional hacking, many of our videos started attracting unwanted attention. To fix this, we've been working on ways to keep bringing you the content you love, without getting banned from the platform. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 91

favorite 0

comment 0

In this video we will perform some live demos with the under door tool on door knobs, introducing some new tech as well as showing what goes right and what g... Source: https://www.youtube.com/watch?v=0Scq6DVkFD0 Uploader: TheNotSoCivilEngr
Topics: Youtube, video, lock, lockpicking, pentesting, physical penetration testing, picking, lock picking,...
A talk by Andreas M. Antonopoulos about how new technologies are initially built on old infrastructures until an "infrastructure inversion" happens and they replace the old infrastructure. Comparisons to the automobile, electricity and internet explain the concept and predict a similar future for bitcoin and financial infrastructure. Source: https://www.youtube.com/watch?v=5ca70mCCf2M Uploader: aantonop Upload date: 2016-04-04
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks, infrastructure,...
Hacking and InfoSec stuff
movies

eye 31

favorite 0

comment 0

This February. Best security experts. Will make cyber-underground tremble. Watch SAS 2015 official trailer. #TheSAS2015 Find more info and register at http://sas.kaspersky.com. Source: https://www.youtube.com/watch?v=E1OnLn7amNw Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, SAS, Security analyst summit, cancun, Kaspersky Lab...
Hacking and InfoSec stuff
movies

eye 93

favorite 1

comment 0

EvilOSX Lets Hackers Hijack MacOS Machines Full Video: https://nulb.app/x47ch Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 096 (Recut - Partial Episode) While many people consider macOS (aka Mac OS X) computers to be more secure, some of its most prominent features make it all the more damaging when infiltrated by a skilled attacker. On this episode of Cyber Weapons Lab, we'll show you how a hacker or pentester could...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 37

favorite 0

comment 0

Michael Toecker, Context Industrial Security A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=dScvurCKMGQ Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 44

favorite 0

comment 0

Tizen is Samsung's newest OS for devices and considered by them as the operation system of everything, aiming to run on every device from simple IoT, mobile phones, televisions, and even vehicles. Today #Tizen could be found mostly in Samsung's newest televisions and on some mobile phones in certain markets. There are currently than 10 million Tizen devices in the world. Over the last few months, I observed that Samsung is laying the groundwork for a larger expansion of Tizen in the mobile...
Topics: Youtube, video, Science & Technology, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity,...
Hacking and InfoSec stuff
movies

eye 102

favorite 1

comment 0

Fluxion Can Be Used to Obtain Wi-Fi Passwords Full Video: https://nulb.app/x43re Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 092 (Recut - Partial Episode) There are several tools out there available to hackers and pentesters for hacking Wi-Fi networks. Many of them involve targeting the encryption in an attempt to crack the password. Others, however, bypass that entirely by employing a social engineering attack to get...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 16

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=pLSGki3T3CA Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 40

favorite 0

comment 0

by Evgeny Goncharov A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=-zxleTfmDYs Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Hacking and InfoSec stuff
movies

eye 26

favorite 1

comment 0

by Vasilios Hioureas A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=_5LchCX9PbA Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
In the newest edition of the Lab Matters webcast, founder and chief executive officer of Kaspersky Lab Eugene Kaspersky discusses the evolution of malware attacks -- from nuisance e-mail worms to well-organized, for-profit cyber-criminals taking control of millions of computers. In this Q&A with Ryan Naraine, Kaspersky talks about the different eras in malicious computer activity, from passive viruses to Internet worms to botnets and, now, a new era of cyber-warfare. Source:...
Topics: Youtube, video, Science & Technology, kaspersky, malware, stuxnet, viruses, trojan, spyware
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

Dr. Stefan Lüders, CERN A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=5FYPYu6-2y0 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 51

favorite 1

comment 0

Vitaly Kamluk, Principal Security Researcher, Global Research and Analysis Team (GReAT) shows a secret side of #YARA that many would think is not possible. #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=fbidgtOXvc0 Uploader: Kaspersky Lab
Topics: Youtube, video, Entertainment, SAS, Security Analyst Conference, Yara, KASPERSKY LAB, cyber...
How to Discreetly Sniff Data Packets with a Cheap Microcontroller Full Tutorial: http://bit.ly/Sniff8266 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Monitoring network traffic is an essential skill for a hacker. However the tools used can be a little conspicuous. On this episode of Cyber Weapons Lab, we'll show you how to use an ESP8266 to sniff data packets discreetly. Specifically, we'll be using a D1 Mini with a datalogger shield that has a...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 61

favorite 0

comment 0

The previous episode of “Introduction to Hashcat” proved to be quite popular, so my colleague Mike Peterson and I decided to create part two. In this episode, we’re going to perform a brief introduction of one of the new features available in Hashcat 4.0, cover an optional flag you may find especially useful, and lastly, look at the PRINCE attack and a variation of that attack dubbed PRINCEPTION. If you haven’t yet watched Introduction to Hashcat, it is recommended you do so prior to...
Topics: Youtube, video, Science & Technology, Hashcat, crack password, crack passwords, crack...