Latest Security Videos |
|
Showing 'Latest Security Videos' from 11 to 20 |
|
IPFS As A Distributed Alternative To Logs Collection - Fabio Nigi 17th Mar 2020 [12 months ago] from DeepSec We want access to as much logs as possible. Historically the approach is to replicate logs to a central location. The cost of storage is the bottleneck on Siem solution, hard to be maintained at scale, leading to reduce the amount of information... |
How To Create A Botnet Of GSM-devices - Aleksandr Kolchanov 17th Mar 2020 [12 months ago] from DeepSec GSM-devices become more popular. Users can set them up fast, use them without landline internet and Wi-Fi, and control them remotely. But now they are also an interesting target for hackers. Usually, GSM-devices have a menu for calls (IVR... |
Extracting A 19-Year-Old Code Execution From WinRAR - Nadav Grossman 17th Mar 2020 [12 months ago] from DeepSec |
Emoji, How Do They Even Work And How They Break Security - MacLemon 17th Mar 2020 [12 months ago] from DeepSec Emoji are used everywhere these days and cannot be retracted from our daily communication. But how do the work and where did Emoji originate from? Join this talk and learn about their security relevance and the semiotics in the 21st century.... |
Demystifying Hardware Security Modules - How To Protect Keys In Hardware - Michael Walser 17th Mar 2020 [12 months ago] from DeepSec A secure crypto-algorithm is based on the fact that only the key needs to be kept secret, not the algorithm itself. The key is of high value and must be protected. In this talk we will have a look at how to protect keys and why a dedicated... |
Comparing GnuPG With Signal Is Like Comparing Apples With Smart Light Bulbs_Hans Freitag 17th Mar 2020 [12 months ago] from DeepSec GnuPG is not designed to be used only in E-Mail, it plays an important role in securing all sorts of mission critical data. In this talk I will show you applications of GnuPG that are not E-Mail or Instant Messaging. Hans Freitag: Born... |
500000 Recalled Pacemakers, 2 Billion $ Stock Value Loss – The Story Behind - Tobias Zillner 17th Mar 2020 [12 months ago] from DeepSec During an independent security assessment of several pacemaker vendors multiple lethal and highly critical vulnerabilities were found. Based on previous experience with one specific vendor a new way of monetising vulnerabilities has been... |
30 CVEs In 30 Days - Eran Shimony 17th Mar 2020 [12 months ago] from DeepSec In recent years, the most effective way to discover new vulnerabilities is considered to be fuzzing. We will present a complementary approach to fuzzing. By using this method, which is quite easy, we managed to get over 30 CVEs across multiple... |
Security Analytics And Zero Trust - How Do We Tackle That? - Holger Arends 17th Mar 2020 [12 months ago] from DeepSec With the current trends towards zero trust networks, deployment of billions of IoT devices, interconnection of critical infrastructure to the cloud, well-organised threat agents, and the rise of fully autonomous systems, both the control... |
DeepSec2019_Keynote 17th Mar 2020 [12 months ago] from DeepSec Information security is too often seen as a highly technical field in computer science, and one where the more technical someone is, the more right they are likely to be. But security is part of systems of life, that not only include computers... |
|
« Newer 1 2 3 4 5 6 7 8 9 10 Older » |
|