Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 101 to 110
Black Hat Arsenal Asia 2018 Great Lineup
25th Jan 2018 [3 years ago] from ToolsWatch
After days of reviewing the hundreds of submitted tools, ToolsWatch and Black Hat teams selected 30 tools. They will be demonstrated over 2 days the 22nd and 23rd of March 2018 at the Marina Bay...[[ This is a content summary only. Visit...
DeepSec2017 - The Future Of The Internet
4th Jan 2018 [3 years ago] from DeepSec
Where are we headed with all our things as they become connected to the internet? Everything is already so vulnerable, but companies are building convenient products and services so fast without thinking about the security issues. This...
DeepSec2017 - Uncovering And Visualizing Botnet Infrastructure And Behavior
4th Jan 2018 [3 years ago] from DeepSec
How much information about a botnet can one find using a single IP address, domain name or indicator of compromise (IOC)? What kind of behavior can be determined when looking at attacker and victim infrastructure? In an attempt to discover...
DeepSec2017 - XFLTReaT: A New Dimension In Tunnelling
4th Jan 2018 [3 years ago] from DeepSec
This presentation will sum up how to do tunnelling with different protocols and will feature different perspectives in detail. For example, companies are fighting hard to block exfiltration from their network: They use http(s) proxies,...
DeepSec2017 - Lock, Stock And Two Smoking Apples - XNU Kernel Security
4th Jan 2018 [3 years ago] from DeepSec
This talk will aim to cover the research which has been undertaken following on from the Defcon presentation on MWRs platform agnostic kernel fuzzing, to automatically identify critical flaws within Apple macOS. It was observed that there...
ROOTS 2017 - Paying The Price For Disruption: A FinTech Allowed Account Takeover
4th Jan 2018 [3 years ago] from DeepSec
In this paper, we look at N26, a pan-European banking startup and the poster child for young FinTechs, to see how security is treated by startups that provide disruptive technologies in the financial sector. We find out that, in an area...
ROOTS 2017 - A Survey On Automated Dynamic Malware Analysis Evasion And Counter-Evasion: PC, Mobile, And Web
4th Jan 2018 [3 years ago] from DeepSec
Automated dynamic malware analysis systems are important in combating the proliferation of modern malware. Unfortunately, malware can often easily detect and evade these systems. Competition between malware authors and analysis system developers...
ROOTS 2017 - Enhancing Control Flow Graph Based Binary Function Identification
4th Jan 2018 [3 years ago] from DeepSec
Detection of binary functions in compiled code is a major stepping stone towards any advanced binary analysis technique. Nucleus [1] is a novel algorithm based on the idea of using the interprocedural control flow graph to detect function...
ROOTS 2017 - On The (In-)Security Of JavaScript Object Signing And Encryption
4th Jan 2018 [3 years ago] from DeepSec
JavaScript Object Notation (JSON) has evolved to the de-facto standard file format in the web used for application configuration, cross- and same-origin data exchange, as well as in Single Sign-On (SSO) protocols such as OpenID Connect....
ROOTS 2017 - Out-Of-Order Execution As A Cross-VM Side Channel And Other Applications
4th Jan 2018 [3 years ago] from DeepSec
Given the rise in popularity of cloud computing and platform-as-a-service, vulnerabilities, inherent to systems which share hardware resources, will become increasingly attractive targets to malicious software authors. In this paper, we...
« Newer 5 6 7 8 9 10 11 12 13 14 Older »