Search for "sap"
prev
next
62 min
Evolve your hack into robust software!
50 min
What went wrong, how the Internet reacted, what we can…
61 min
How drones, IMSI Catchers, and cameras are shaping our…
60 min
...or why adding BTLE to a device sometimes isn't smart at…
60 min
How advanced threat actors learn and change with innovation…
45 min
Open source drones for Search & Rescue
58 min
CITL: Quantitative, Comparable Software Risk Reporting
63 min
Everything we know about NSA spying
60 min
The potential for payment system abuse
26 min
How technology is used to subvert and circumvent…
38 min
from apple to schnaps -- a complete diy-toolchain
56 min
Hacking the most secure handheld console
34 min
Extending capability-based security models to achieve…
prev
next