3
3.0
Jul 12, 2019
07/19
by
Palmer, Michael, 1933-
texts
eye 3
favorite 0
comment 0
107 p. 22 cm
Topic: European Security Conference
17
17
movies
eye 17
favorite 0
comment 0
Topics: germany, munich security conference
Source: Antenna
5
5.0
movies
eye 5
favorite 0
comment 0
Topics: europe, munich security conference, ankara
Source: Antenna
332
332
movies
eye 332
favorite 0
comment 0
Simos Xenitellis - Event-driven system security vulnerabilities, an overview and demonstration The event-driven model is used to implement software systems like graphical user interfaces (GUIs). An example of such a GUI is Microsoft Windows which we examine in detail. In an event-driven system, applications communicate with each other and with the system through events. While in Windows NT/2000/XP/2003 there is memory protection between applications belonging to different users, there is no...
Topics: hack, security, vulnerabilities, security conference, security professional
14
14
movies
eye 14
favorite 0
comment 0
Topics: germany, berlin, pyongyang, munich security conference, cologne
Source: Antenna
For more information visit: http://bit.ly/shmooc14 To download the video visit: http://bit.ly/shmooc14_down Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl Speaker: Bruce Schneier Edward Snowden has given us an unprecedented window into the NSA's surveillance activities. Drawing from both the Snowden documents and revelations from previous whistleblowers, I will describe the sorts of surveillance the NSA does and how it does it. The emphasis is on the technical capabilities of the NSA, not...
Topics: Youtube, video, Science & Technology, Shmoocon, security conference
319
319
movies
eye 319
favorite 0
comment 0
HITBSecConf2003 Panel Discussion A panel discussion comprising (left to right): * HD Moore * Shreeraj Shah * Adam Gowdiak (LSD) * Job De Haas * Kol. Hussin (NISER/MyCERT) * Nitesh Dhanjani * Dr. Dinesh Nair * Shamsul Jafni (MCMC)
Topics: hack, security, vulnerabilities, security conference, security professional
68
68
movies
eye 68
favorite 0
comment 0
Topics: china, sarah kelly, beijing, munich security conference
Source: Antenna
951
951
movies
eye 951
favorite 0
comment 0
Dinesh Nair - From Script Kiddies to Security Consultants Frequently, the press has misrepresented hackers, crackers and script kiddies. There is a lot of myth and aura about practitioners of computer and network security. This presentation traces the journey of one such individual as he progresses from playing with the public switched telephone system to the TCP/IP networks of today, and the mobile and 3G networks of tomorrow.
Topics: security, hack, vulnerabilities, security conference, security professional
Speaker: RICHARD THIEME THIEMEWORKS Thieme's keynote at DEF CON 4 for a few hundred people was "Hacking as Practice for Trans-planetary Life in the 21st Century." Mudge recently said, "Some of us knew what you meant, and some of us thought you were nuts." That's likely to be the response to this talk too. Thieme addresses what he said 17 cons ago, why it was true, and illuminates some likely futures for hacking and hackers, anonymous 2.0.1, and the gray space of the noir...
Topics: Youtube, video, Science & Technology, DEFCON, security conference
17
17
movies
eye 17
favorite 0
comment 0
Topics: germany, west, berlin, porsche, munich security conference
Source: Antenna
1,577
1.6K
movies
eye 1,577
favorite 0
comment 0
Roberto Preatoni (Zone-H) and Fabio Ghioni Asymmetric Warfare and Interception Revealed (presentation material in zip)
Topics: hack, security, warfare, interception, security conference, security professional
2,097
2.1K
movies
eye 2,097
favorite 0
comment 0
Last Stage of Delirium (LSD) - Security Myths The presentation will discuss various security myths that are still common in the security community. The talk will be strongly based upon history and experiences of the LSD Research Group and most well known projects and events the group participated in. Using the specific case studies, impact of several dangerous security myths related to specific technologies or a general approach to security problems will be presented. Finally, the holistic view...
Topics: security, hack, vulnerability, myth, security professional, security conference
249
249
movies
eye 249
favorite 0
comment 0
Wong Chun Meng - The Value of Computer Forensics Incident Response (IR) Handling is a hot topic among many organizations these days. Many IT managers in this part of the region are beginning to realize the inevitability of their critical mission systems being compromised. It's a matter of time. Computer forensics is a component of IR whereby it involves an investigation process to determine what has occurred when a system was compromised. (presentation material in zip)
Topics: hac, security, forensics, vulnerabilites, security conference, security professional
579
579
movies
eye 579
favorite 0
comment 0
Shreeraj Shah - Defending Web Applications: Strategies, methods and practices Web applications can not be defended by firewall or any other security products. Web application defense strategies require secure coding at application level, knowing your application and protecting them by human intelligence. Knowing your application can lead to profiling your web assets in logical way. Profiling web assets provides better picture of various possible attacks set. Knowing entire attack set greatly...
Topics: hack, web, security, vulnerabilities, security conference, security professional
512
512
movies
eye 512
favorite 0
comment 0
Suresh Ramasamy (TimeDotCom) Cryptography Demystified
Topics: hack, security, vulnerabilities, cryptography, security conference, security professional
280
280
movies
eye 280
favorite 0
comment 0
Sukdev Singh (ISS) Protecting Your Business From Phishing and Internet Attacks (persentation material in zip)
Topics: hack, security, vulnerabilities, phishing, security conference, security professional
4,730
4.7K
movies
eye 4,730
favorite 0
comment 0
Yerra Ravi Kiran Raju - New Generation Frauds Security is not the issue of devices, its the issue of people. Many credit card companies/banks are changing their panorama of e-transactions such as upgrading Traditional Magnetic Strip to Smart chip based authentication or dual authentication, unfortunately every change has a counter effect like New Generation Cloning (Smart Card Cloning). This presentation will discuss the new generation frauds such as credit card cloning, smartcard cloning,...
Topics: fraud, hack, security, vulnerabilities, security conference, security professional
664
664
movies
eye 664
favorite 0
comment 0
SK Chong (Scan Associates) Windows Local Kernel Exploitation (presentation material in zip)
Topics: hack, security, vulnerabilities, windows, kernel, security conference, security professional
1,104
1.1K
movies
eye 1,104
favorite 0
comment 0
Toh Swee Hoe (MCMC) Information Network Security Issues in the Communications and Multimedia Industry (presentation material in zip)
Topics: hack, security, vulnerabilities, network, multimedia, security conference, security professional
22
22
movies
eye 22
favorite 0
comment 0
Topics: china, boeing, facebook, berlin, google, munich security conference, dubai
Source: Antenna
60
60
movies
eye 60
favorite 0
comment 0
Topics: germany, iran, africa, ben, chicago, munich security conference, europe
Source: Antenna
856
856
movies
eye 856
favorite 0
comment 0
Meling Mudin - Putting the Eye on IDS Nowadays, a lot of organizations are deploying Intrusion Detection Systems (IDSes) as part of their security infrastructure. In Malaysia, we have seen IDS deployments in the public sector, and also private sector. However, there are a few questions that are always asked by these organizations when deploying IDSes: What is in it for my organization? Unlike other security devices such as firewalls and VPNs, organizations do not see the immediate value of...
Topics: IDS, intrusion, vulnerabilities, security, hack, security conference, security professional
220
220
movies
eye 220
favorite 0
comment 0
HITBSecConf2004 Panel Discussion
Topics: security, hack, vulnerabilites, panel discussion, security conference, security professional
1,644
1.6K
movies
eye 1,644
favorite 2
comment 0
Nitesh Dhanjani - Hacking with Linux Kernel Modules LKMs allow users to write code in the kernel space. Therefore, it becomes extremely easy to use LKMs to perform System Call Interception in order to perform tricks such as: Hide files and processes, trojanize executables, write shell backdoors, and much more. These are the tricks used by authors of most malicious backdoors. Hopefully, this knowledge will allow individuals that have been infected by such backdoors to understand how they work,...
Topics: linux, kernel, hack, security, vulnerabilities, security conference, security professional
2,471
2.5K
movies
eye 2,471
favorite 0
comment 0
Job De Haas - Hacking software and hardware in a PDA/GSM Device The computer world is getting mobile and connected at faster and faster rates. The latest developments are the integration of mobile phones and PDA's connected with WiFi and GPRS. This presentation shows some means of hacking such a device both at the software and hardware level. As an example the XDA (also known as T-mobile PDA, Qtek or Siemens SX 45 ) is used. Internal aspects of the ARM based PocketPC Phone Edition is also...
Topics: security, hack, vulnerabilities, wireless, GSM, PDA, security conference, security professional
17
17
movies
eye 17
favorite 0
comment 0
Topics: shaka, cologne, red bulls, hamburg, munich security conference, munich, hamburg
Source: Antenna
21
21
movies
eye 21
favorite 0
comment 0
Democratic participants in the House-Senate Conference Committee on Homeland Security spoke to the press after the committee's first meeting. Rep. Nita Lowey (D-NY), the House Appropriations Committee chair, said she was "cautiously optimistic" about the conference committee's potential to produce legislation that would include seven smaller spending bills, including one for the Homeland Security Department. The Democrats said they were willing to devote money toward border security...
Topics: Democrats Speak to Reporters After Homeland Security Conference, Television Program
Source: Comcast Cable
10
10.0
movies
eye 10
favorite 0
comment 0
Topics: germany, berlin, munich security conference, amazon, afghanistan, europe, trump, facebook
Source: Antenna
20
20
movies
eye 20
favorite 0
comment 0
Topics: africa, zimbabwe, germany, nigeria, munich security conference, google, iraq, syria
Source: Antenna
370
370
movies
eye 370
favorite 0
comment 0
Shaheezul (Pandir Harris) - IDS over IPV6 IDS - intrusion detetction system IPV6 - newer IP protocol (versus IPV4) part of research with a local university (presentation material in zip)
Topics: IDS, intrusion, IPV6, security, hack, vulnerabilities, security conference, security professional
20
20
movies
eye 20
favorite 0
comment 0
Topics: africa, munich, south sudan, germany, munich security conference, kenya, roman polanski
Source: Antenna
280
280
movies
eye 280
favorite 0
comment 0
Teo Sze Siong Stealth Virus Design Thru Breeding Concept (Non Polymorphic) (presentation material in zip)
Topics: hack, worm, security, vulnerabilities, windows, virus, stealth, security conference, security...
19
19
movies
eye 19
favorite 0
comment 0
Topics: cologne, germany, europe, west, brazil, munich, munich security conference, cologne cathedral
Source: Antenna
42
42
movies
eye 42
favorite 0
comment 0
The CIA and George Washington University co-hosted an intelligence and national security conference. Speakers included former CIA directors, intelligence community and government officials, and private industry leaders. This portion featured a panel discussion about threats posed by biological weapons and biotechnology. Sponsor: George Washington University | Center for Cyber and Homeland Security
Topics: Intelligence and National Security Conference Panel on Biotechnology Threats, Television Program
Source: Comcast Cable
12
12
movies
eye 12
favorite 0
comment 0
Topics: africa, munich, germany, south sudan, kenya, south, munich security conference, west
Source: Antenna
292
292
movies
eye 292
favorite 0
comment 0
Anurana Saluja - Threats to Wireless Networks - War Driving Wireless networks have become one of the most interesting targets for hackers today. Organizations today are deploying wireless technology at a rapid rate, often without considering all security aspects. This rapid deployment is due, in part, to the low cost of the devices, ease of deployment, and the large productivity gains. The 1980s, saw "war dialing"--dialing phone numbers until an open modem is found--to access...
Topics: hack, security, vulnerability, war driving, wireless network, security conference, security...
29
29
movies
eye 29
favorite 0
comment 0
Topics: facebook, dresden, europe, lagos, france, mark zuckerberg, west, donald trump, munich security...
Source: Antenna
114
114
Oct 3, 2017
10/17
by
DEFCONConference
movies
eye 114
favorite 0
comment 0
Following recent security issues discovered in Android, Google made a number of changes to tighten security across its fragmented landscape. However, Google is not alone in the struggle to keep Android safe. Qualcomm, a supplier of 80% of the chipsets in the Android ecosystem, has almost as much effect on Android’s security as Google. With this in mind, we decided to examine Qualcomm’s code in Android devices. During our research, we found multiple privilege escalation vulnerabilities in...
Topics: Youtube, video, Science & Technology, DEF CON, DEFCON, DC24, DC-24, defcon security conference,...
18
18
movies
eye 18
favorite 0
comment 0
Topics: africa, munich, south sudan, kenya, germany, munich security conference, roman polanski, nairobi
Source: Antenna
22
22
movies
eye 22
favorite 0
comment 0
Topics: africa, south sudan, munich, germany, munich security conference, kenya, roman polanski, johnny
Source: Antenna
23
23
movies
eye 23
favorite 0
comment 0
Topics: germany, manchester city, syria, united nations, west, munich security conference, berlin, africa,...
Source: Antenna
Area41 Security Conference 2014: Ange Albertini & Gynvael Coldwind: Schizophrenic Files – A file that thinks it's many Source: https://www.youtube.com/watch?v=9Hm0obaDC58 Uploader: defconswitzerland
Topics: Youtube, video, Science & Technology, Area41, Security Conference, Ange Albertini, Gynvael...
15
15
movies
eye 15
favorite 0
comment 0
Topics: jesus, europe, berlin, west, munich, munich security conference, mexico, rio, michael, libya, brazil
Source: Antenna
19
19
movies
eye 19
favorite 0
comment 0
Topics: cologne, europe, germany, africa, munich security conference, brazil, carnival, beethoven, cologne...
Source: Antenna
19
19
movies
eye 19
favorite 0
comment 0
Topics: africa, west, senegal, johannesburg, biden, germany, sandra, islanders, munich security conference,...
Source: Antenna
25
25
movies
eye 25
favorite 0
comment 0
topics: Rising star of the year: chef Dirk Hoberg; A beautiful pair; A nature experience at high altitude; How to make a basket out of rope; Topsy-turvy world
Topics: austria, germany, dick, europe, lake constance, lake constance, munich security conference,...
Source: Antenna
16
16
movies
eye 16
favorite 0
comment 0
Topics: syria, west, nato, europe, china, trump, russia, iran, munich security conference, australia,...
Source: Antenna
19
19
movies
eye 19
favorite 0
comment 0
Topics: germany, russia, munich security conference, taliban, europe, nato, west, melinda, antarctica,...
Source: Antenna
14
14
movies
eye 14
favorite 0
comment 0
Topics: china, europe, facebook, west, taliban, pompei, terry, munich, zuckerberg, munich security...
Source: Antenna