hacking
-
Documentary
NDR Interview with Edward Snowden (ENGLISH VIDEO)
Here you can watch the interview with Edward Snowden and the German Television channel NDR. This exclusive interview with Edward…
Read More » Computer Security Basics
In this video, you will learn about “Computer Security Basics” which provided in English language.
Read More »Understanding Botnet in Details
Blackhat 2012 EUROPE – Workshop: Understanding Botnets By Building One Financial botnets are a major threat to the global Financial…
Read More »(EC3) Opening of the European Cybercrime Centre at Europol
The opening of the European Cybercrime Centre (EC3) marks a significant shift from how the EU has been addressing cybercrime…
Read More »Defcon 21 – A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It
Description: Since the publication of the cold boot attack on software disk encryption 5 years ago, there has been little progress…
Read More »Defcon 21 – Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Description: Google TV is intended to bring the Android operating system out of the mobile environment and into consumers’ living rooms.…
Read More »Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support cloud-based…
Read More »Defcon 21 – ACL Steganography – Permissions to Hide Your Porn
Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field of…
Read More »Defcon 21 – Backdoors, Government Hacking and The Next Crypto Wars
Description: The FBI claims it is going dark. Encryption technologies have finally been deployed by software companies, and critically, enabled by…
Read More »Defcon 21 – From Nukes to Cyber— Alternative Approaches for Proactive Defense and Mission Assurance
Description: In typical military operations, the advantage goes to the offense because the initiator controls the timing and is able…
Read More »Defcon 21 – The Politics of Privacy and Technology: Fighting an Uphill Battle
Description: In the past few decades the world has been dramatically transformed by technology. People have significantly evolved in how…
Read More »Defcon 21 – Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Description: The greatest danger to free speech on the Internet today is filtering of traffic using protocol fingerprinting. Protocols such…
Read More »Defcon 21 – A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It
Description: Since the publication of the cold boot attack on software disk encryption 5 years ago, there has been little…
Read More »Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support…
Read More »Defcon 21 – ACL Steganography – Permissions to Hide Your Porn
Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field…
Read More »