Video

Security
14.11.2016 :: Views: 39 ::
Scientist implanted with RFID Chip gets computer virus Video

Video

Security
25.10.2016 :: Views: 49 ::
Explaining Dirty COW local root exploit Video

Tech Talk

Security
26.09.2016 :: Views: 45 ::
SyScan'15 Singapore Stegosploit - Hacking with Pictures Tech Talk

Video

Security
26.06.2016 :: Views: 93 ::
ADSL router hacking is easy Video

Ben Tedesco

Security
26.06.2016 :: Views: 92 ::
Finding an ATM Skimmer in Vienna Ben Tedesco

US Election

Security
11.05.2016 :: Views: 84 ::
Lee County Supervisor of Elections Server Security Issues US Election

knacken mit Tobias Schrödel

Security
05.01.2016 :: Views: 126 ::
Sichere Passwörter knacken mit Tobias Schrödel

Puts an End to Spying

Security
05.09.2015 :: Views: 185 ::
John McAfee's New Cognizant App Puts an End to Spying

Joe Collins

Security
23.08.2015 :: Views: 179 ::
Why Linux Is So Secure Joe Collins

Open Discussion

Security
23.08.2015 :: Views: 197 ::
Linux Security Open Discussion

exploring darknets Kyle Terry TEDxSalem

Security
31.05.2015 :: Views: 200 ::
The dark side of the web exploring darknets Kyle Terry TEDxSalem

DEFCON 20

Security
31.05.2015 :: Views: 239 ::
Rapid Blind SQL Injection DEFCON 20

Wikileaks

Security
22.09.2014 :: Views: 339 ::
Weaponised malware Wikileaks

DEFCON 20

Security
16.02.2014 :: Views: 385 ::
Can You Track Me Now DEFCON 20

DEF CON 21

Security
10.02.2014 :: Views: 801 ::
Alberto Garcia Illera and Javier Vazquez Vidal DEF CON 21

Through a PRISM

Security
08.01.2014 :: Views: 321 ::
Everything we know about NSA spying Through a PRISM

THE STATE OF SURVEILLANCE

Security
08.01.2014 :: Views: 357 ::
THE DATABASE NATION THE STATE OF SURVEILLANCE

30c3

Security
08.01.2014 :: Views: 382 ::
World War II Hackers 30c3

30c3

Security
08.01.2014 :: Views: 376 ::
Mobile network attack evolution 30c3

Hamburg

Security
08.01.2014 :: Views: 354 ::
Electronic Bank Robberies Hamburg

World

Security
30.05.2013 :: Views: 467 ::
Cyber Wars World