Video
Defcon 21 – ACL Steganography – Permissions to Hide Your Porn
Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field of…
Read More »Defcon 21 – Backdoors, Government Hacking and The Next Crypto Wars
Description: The FBI claims it is going dark. Encryption technologies have finally been deployed by software companies, and critically, enabled by…
Read More »Understanding Tor Project
Roger Dingledine and Jacob Appelbaum discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.
Read More »Defcon 21 – From Nukes to Cyber— Alternative Approaches for Proactive Defense and Mission Assurance
Description: In typical military operations, the advantage goes to the offense because the initiator controls the timing and is able…
Read More »Defcon 21 – The Politics of Privacy and Technology: Fighting an Uphill Battle
Description: In the past few decades the world has been dramatically transformed by technology. People have significantly evolved in how…
Read More »Defcon 21 – Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Description: The greatest danger to free speech on the Internet today is filtering of traffic using protocol fingerprinting. Protocols such…
Read More »Defcon 21 – A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It
Description: Since the publication of the cold boot attack on software disk encryption 5 years ago, there has been little…
Read More »Defcon 21 – Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Description: Google TV is intended to bring the Android operating system out of the mobile environment and into consumers’ living…
Read More »Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support…
Read More »Defcon 21 – ACL Steganography – Permissions to Hide Your Porn
Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field…
Read More »Defcon 21 – Torturing Open Government Systems for Fun, Profit and Time Travel
Description: “I’m from the government and I’m here to help you” takes on a sinister new meaning as jurisdictions around the…
Read More »DEFCON 21 – PROLIFERATION
Description: Ambassador Joseph DeTrani was named President of the Intelligence and National Security Alliance (INSA) on February 5, 2013. As President,…
Read More »-
LiveTechTalkShow – Hacking Your WebCam
សូមចុចលើ Use Original Player បើសិនជាអ្នកមើលមិនឃើញ នៅក្នុងយប់នេះ (ថ្ងៃទី ២៩ ខែធ្នូ ២០១៣) ក្រុមយើងខ្ញុំនឹងលើកយក “Hacking Your Webcam” មកធ្វើការ Live ផ្ទាល់ ចាប់ពីម៉ោង 9:30PM-11:00PM។ សូមរង់ចាំតាមដាន…
Read More » Network security threats explained: Advanced persistent threats
What exactly is an “advanced persistent threat” (APT)? Sophos security expert James Lyne breaks down this somewhat complicated and overused…
Read More »