Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 21 to 30
Still Secure. We Empower What We Harden Because We Can Conceal - Yury Chemerkin
11th Feb 2020 [9 months ago] from DeepSec
The Launch of Windows 10 has brought many controversial discussions around the privacy factor of collecting and transmitting user data to Microsoft and its partners. But Microsoft was not the first, Apple did it many years ago and there...
Setting Up An Opensource Threat Detection Program - Lance Buttars
11th Feb 2020 [9 months ago] from DeepSec
Through the use of event detection monitoring and do it yourself monitoring techniques on a Linux Apache PHP MySQL stack, I will demonstrate how you can create different alarms and reporting surfaces that alert you when your application...
SD-WAN Secure Communications Design And Vulnerabilities - Denis Kolegov
11th Feb 2020 [9 months ago] from DeepSec
In this talk, we describe most common classes of design flaws and vulnerabilities in SD-WAN secure communication mechanisms, and disclose a set of reported and already patched vulnerabilities in popular SD-WAN products. We present the new...
Saving Private Brian - Michael Burke
11th Feb 2020 [9 months ago] from DeepSec
This talk will be given as the story of Brian, an aid worker operating in a hostile third country. When hes stopped going in at the border he had his iPhone taken from him and then returned to him 15 minutes later. Now he cant be sure if...
S.C.A.R.E. - Static Code Analysis Recognition Evasion - Andreas Wiegenstein
11th Feb 2020 [9 months ago] from DeepSec
Companies increasingly rely on static code analysis tools in order to scan (their) (custom) code for security risks. But can they really rely on the results? The typical SCA tool is designed to detect security issues in code that were created...
Practical Security Awareness - Lessons Learnt And Best Practices - Stefan Schumacher
5th Feb 2020 [9 months ago] from DeepSec
This talk will show lessons learnt from awareness campaigns I ran in several organisations. The focus lies on the instructional design of staff training to motivate the staff, enable them to work with complexity and helping them to transfer...
Overcoming The Limitations Of TLS Fingerprinting For Malware Detection - Blake Anderson
5th Feb 2020 [9 months ago] from DeepSec
TLS fingerprinting maps data contained within the TLS ClientHello to a set of possible applications or TLS libraries such as Chrome 74.0 or OpenSSL 1.1.0k. We have developed a system that continuously fuses endpoint and network data from...
Once Upon A Time In The West - A Story On DNS Attacks - Valentina Palacin, Ruth Esmeralda Barbacil
5th Feb 2020 [9 months ago] from DeepSec
Just like in Old West movies, we are going through a land riddled with well-known gunmen: OceanLotus, DNSpionage and OilRig, who roam at ease, while the security cowboys sleep. This presentation will uncover the toolset and techniques used...
CVE In The Hook – Monthly Vulnerability Review (January 2020 Issue)
5th Feb 2020 [9 months ago] from ToolsWatch
Every day, new common vulnerabilities and exploits are publicly exposed. While this brings these flaws to the public’s attention and allows users to patch them, it also alerts potential attackers to...[[ This is a content summary only....
New Tales Of Wireless Input Devices - Matthias Deeg
5th Feb 2020 [9 months ago] from DeepSec
In our talk, we will present new security tales of wireless mice, keyboards, and presenters using 2.4 GHz radio communication that we have collected over the last two years. In 2016, we published the results of our research project "Of...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »