Search for "75" returned 3170 results

SCADA StrangeLove 2
41 min

SCADA StrangeLove 2

We already know

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

History and implications of DRM
32 min

History and implications of DRM

From tractors to Web standards

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
31 min

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Why is my vacuum as powerful as my smartphone?

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.
31 min

GIFs: Tod eines Mediums. Und sein Leben nach dem Tod.

Wie es kommt, dass technischer Fortschritt den Nutzern…

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

libusb: Maintainer fail
30 min

libusb: Maintainer fail

How I failed to run an open source project

Security Nightmares
101 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.

Die Sprache der Populisten
59 min

Die Sprache der Populisten

Wie politische "Gewissheiten" sprachlich konstruiert werden

Wifibroadcast
42 min

Wifibroadcast

How to convert standard wifi dongles into digital broadcast…

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Living Drones
31 min

Living Drones

From war pigeons in 1914 to cyborg moths in 2014