Search for "15" returned 4794 results
59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security
30 min
The Machine To Be Another
Exploring identity and empathy through neuroscience,…
60 min
Prediction and Control
Watching Algorithms
45 min
To Protect And Infect
The militarization of the Internet
59 min
Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
Ein Streifzug durch die Fehler in der Kryptografie
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…
62 min
Let's Encrypt
A Free Robotic Certificate Authority
60 min