Search for "19" returned 4472 results

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

WarGames in memory
56 min

WarGames in memory

what is the winning move?

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Superheroes Still Need Phoneboxes
62 min

Superheroes Still Need Phoneboxes

The art of making a free phonebox and the culture of…