Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 61 to 70
25th Dec 2018 [2 years ago] from DeepSec
Androids accessibility API was designed to assist users with disabilities, or temporarily preoccupied users unable to interact with a device, e.g., while driving a car. Nowadays, many Android apps rely on the accessibility API for other...
Efail And Other Failures With Encryption And E-Mail
21st Dec 2018 [2 years ago] from DeepSec
The Efail bug against encrypted e-mails showed a variety of problems with the interaction of outdated cryptography and HTML e-mails. This talk will give an overview of the flaws that led to Efail and some other fun attacks that followed...
ROOTS - Kernel-Assisted Debugging Of Linux Applications
19th Dec 2018 [2 years ago] from DeepSec
On Linux, most---if not all---debuggers use the ptrace debugging API to control their target processes. However, ptrace proves unsatisfactory for many malware analysis and reverse engineering tasks: So-called split-personality malware often...
ROOTS - Library And Function Identification By Optimized Pattern Matching On Compressed Databases
19th Dec 2018 [2 years ago] from DeepSec
The goal of library and function identification is to find the original library and function to a given machine-code snippet. These snippets commonly arise from penetration tests attacking a remote executable, static malware analysis or...
ROOTS 2018 - The Swift Language From A Reverse Engineering Perspective
19th Dec 2018 [2 years ago] from DeepSec
Over the last decade, mobile devices have taken over the consumer market for computer hardware. Almost all these mobile devices run either Android or iOS as their operating systems. In 2014, Apple introduced the Swift programming language...
Attacks On Mobile Operators
19th Dec 2018 [2 years ago] from DeepSec
"Id like to talk about telecom security. My research contains information about security of mobile operators: classic and new (or very rare) attack vectors and vulnerabilities. This presentation will consist of three main parts: First,...
ROOTS_Keynote: Automatic Exploitation - The DARPA Cyber Grand Challenge, What Came After, And What Is Next
19th Dec 2018 [2 years ago] from DeepSec
The automatic exploitation of vulnerabilities has long been a holy grail for software security. However, even manual exploitation by experienced security analysts and researchers has become ever more challenging due to the increased complexity...
Black Hat Arsenal Asia 2019 CFT Open
2nd Nov 2018 [2 years ago] from ToolsWatch
The Black Hat Arsenal team will be back in Singapore with the very same goal: give hackers security researchers the opportunity to demo their newest and latest code. The Arsenal tool demo area...[[ This is a content summary only. Visit...
Black Hat Arsenal Europe 2018 Lineup Announced
26th Sep 2018 [2 years ago] from ToolsWatch
After days of reviewing the hundreds of submitted tools, ToolsWatch and Black Hat teams selected 50 tools. They will be demonstrated over 2 days the 5th and 6th of December 2018 at the Excel London...[[ This is a content summary only. Visit...
HITB Armory – Call For Tools Is OPEN! (Dubai, UAE)
11th Sep 2018 [2 years ago] from ToolsWatch
Were pleased to announce the first ever HackInTheBox Armory! The HITB Armory is where you can showcase your security tools to the world. You will get 30 minutes to present your tools onstage,...[[ This is a content summary only. Visit my...
« Newer 2 3 4 5 6 7 8 9 10 11 Older »