Video
Fighting Cybercrime in Europe
10th episode of “On the front line” — a programme by the Euronews channel, this time on the subject of…
Read More »Defcon 21 – Privacy In DSRC Connected Vehicles
Description: To date, remote vehicle communications such as OnStar have provided little in the way of privacy. The planned DSRC system…
Read More »Defcon 21 – Phantom Network Surveillance UAV / Drone
Description: DARPA, 2011, sponsored a contest named UAVForge which challenged teams to build a prototype unmanned aerial vehicle (UAV). Mission: “UAV…
Read More »Defcon 21 – Safety of Tor Network Look at Network Diversity, Relay Operators & Malicious Relays
Description: Rumor has it that the Tor network is a CIA honeypot, that all relays are malicious, and that only bad…
Read More »CrimeWatch – Money Mule
Beware of giving your personal particulars such identity card and bank account numbers to strangers. See how the officers from…
Read More »Network security threats explained: Websites
Sophos security expert James Lyne explains the mistakes that are made when creating websites, leaving them open for hacking.
Read More »Defcon 21 – A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It
Description: Since the publication of the cold boot attack on software disk encryption 5 years ago, there has been little progress…
Read More »Defcon 21 – Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Description: Google TV is intended to bring the Android operating system out of the mobile environment and into consumers’ living rooms.…
Read More »Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support cloud-based…
Read More »