video
Fighting Cybercrime in Europe
10th episode of “On the front line” — a programme by the Euronews channel, this time on the subject of…
Read More »CrimeWatch – Money Mule
Beware of giving your personal particulars such identity card and bank account numbers to strangers. See how the officers from…
Read More »Network security threats explained: Websites
Sophos security expert James Lyne explains the mistakes that are made when creating websites, leaving them open for hacking.
Read More »Defcon 21 – A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It
Description: Since the publication of the cold boot attack on software disk encryption 5 years ago, there has been little progress…
Read More »Defcon 21 – Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Description: Google TV is intended to bring the Android operating system out of the mobile environment and into consumers’ living rooms.…
Read More »Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support cloud-based…
Read More »Defcon 21 – ACL Steganography – Permissions to Hide Your Porn
Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field of…
Read More »Defcon 21 – Backdoors, Government Hacking and The Next Crypto Wars
Description: The FBI claims it is going dark. Encryption technologies have finally been deployed by software companies, and critically, enabled by…
Read More »Understanding Tor Project
Roger Dingledine and Jacob Appelbaum discuss contemporary Tor Network issues related to censorship, security, privacy and anonymity online.
Read More »Defcon 21 – From Nukes to Cyber— Alternative Approaches for Proactive Defense and Mission Assurance
Description: In typical military operations, the advantage goes to the offense because the initiator controls the timing and is able…
Read More »Defcon 21 – The Politics of Privacy and Technology: Fighting an Uphill Battle
Description: In the past few decades the world has been dramatically transformed by technology. People have significantly evolved in how…
Read More »Defcon 21 – Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Description: The greatest danger to free speech on the Internet today is filtering of traffic using protocol fingerprinting. Protocols such…
Read More »