Search for "big data"

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Gone in 60 Milliseconds
33 min

Gone in 60 Milliseconds

Intrusion and Exfiltration in Server-less Architectures

wallet.fail
61 min

wallet.fail

Hacking the most popular cryptocurrency hardware wallets

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

Internet of toilets
35 min

Internet of toilets

Trends in the sanitarian territory

Advanced Hexagon Diag
66 min

Advanced Hexagon Diag

Harnessing diagnostics for baseband vulnerability research

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Privacy and Consumer Markets
30 min

Privacy and Consumer Markets

Reversing the Surveillance Business Model

No PoC? No Fix! - A sad Story about Bluetooth Security
43 min

No PoC? No Fix! - A sad Story about Bluetooth Security

It is just a broken memcpy in the Bluetooth stack. Do we…

Hacking German Elections
63 min

Hacking German Elections

Insecure Electronic Vote Counting - How It Returned and Why…

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

The Tor Network
62 min

The Tor Network

We're living in interesting times

A deep dive into the world of DOS viruses
38 min

A deep dive into the world of DOS viruses

Explaining in detail just how those little COM files…

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild