Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 11 to 20
IPFS As A Distributed Alternative To Logs Collection - Fabio Nigi
17th Mar 2020 [12 months ago] from DeepSec
We want access to as much logs as possible. Historically the approach is to replicate logs to a central location. The cost of storage is the bottleneck on Siem solution, hard to be maintained at scale, leading to reduce the amount of information...
How To Create A Botnet Of GSM-devices - Aleksandr Kolchanov
17th Mar 2020 [12 months ago] from DeepSec
GSM-devices become more popular. Users can set them up fast, use them without landline internet and Wi-Fi, and control them remotely. But now they are also an interesting target for hackers. Usually, GSM-devices have a menu for calls (IVR...
Extracting A 19-Year-Old Code Execution From WinRAR - Nadav Grossman
17th Mar 2020 [12 months ago] from DeepSec
Half a billion users worldwide use WinRAR for creating and extracting archives. This usually is assumed to be a safe procedure, however, we found a critical vulnerability that results in RCE by simply using WinRAR to extract an archive....
Emoji, How Do They Even Work And How They Break Security - MacLemon
17th Mar 2020 [12 months ago] from DeepSec
Emoji are used everywhere these days and cannot be retracted from our daily communication. But how do the work and where did Emoji originate from? Join this talk and learn about their security relevance and the semiotics in the 21st century....
Demystifying Hardware Security Modules - How To Protect Keys In Hardware - Michael Walser
17th Mar 2020 [12 months ago] from DeepSec
A secure crypto-algorithm is based on the fact that only the key needs to be kept secret, not the algorithm itself. The key is of high value and must be protected. In this talk we will have a look at how to protect keys and why a dedicated...
Comparing GnuPG With Signal Is Like Comparing Apples With Smart Light Bulbs_Hans Freitag
17th Mar 2020 [12 months ago] from DeepSec
GnuPG is not designed to be used only in E-Mail, it plays an important role in securing all sorts of mission critical data. In this talk I will show you applications of GnuPG that are not E-Mail or Instant Messaging. Hans Freitag: Born...
500000 Recalled Pacemakers, 2 Billion $ Stock Value Loss – The Story Behind - Tobias Zillner
17th Mar 2020 [12 months ago] from DeepSec
During an independent security assessment of several pacemaker vendors multiple lethal and highly critical vulnerabilities were found. Based on previous experience with one specific vendor a new way of monetising vulnerabilities has been...
30 CVEs In 30 Days - Eran Shimony
17th Mar 2020 [12 months ago] from DeepSec
In recent years, the most effective way to discover new vulnerabilities is considered to be fuzzing. We will present a complementary approach to fuzzing. By using this method, which is quite easy, we managed to get over 30 CVEs across multiple...
Security Analytics And Zero Trust - How Do We Tackle That? - Holger Arends
17th Mar 2020 [12 months ago] from DeepSec
With the current trends towards zero trust networks, deployment of billions of IoT devices, interconnection of critical infrastructure to the cloud, well-organised threat agents, and the rise of fully autonomous systems, both the control...
DeepSec2019_Keynote
17th Mar 2020 [12 months ago] from DeepSec
Information security is too often seen as a highly technical field in computer science, and one where the more technical someone is, the more right they are likely to be. But security is part of systems of life, that not only include computers...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »