Search for "AKO" returned 1178 results
63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…
49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
53 min
Million Dollar Dissidents and the Rest of Us
Uncovering Nation-State Mobile Espionage in the Wild
59 min
Towards General Purpose Reconfigurable Computing on Novena
FPGAs for Everybody with Novena
54 min
Kernel Tracing With eBPF
Unlocking God Mode on Linux
61 min
Holography of Wi-Fi radiation
Can we see the stray radiation of wireless devices? And…
58 min
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
Reporting on the secret trial of Chelsea Manning
61 min
Damn Vulnerable Chemical Process
Exploitation in a new media
51 min
The GNU Name System
A Decentralized PKI For Social Movements
46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database
56 min
Viva la Vita Vida
Hacking the most secure handheld console
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
55 min
White-Box Cryptography
Survey
58 min
Paypals War on Terror
A Historical Re-Enactment of the PayPal14
60 min