Search for "tor" returned 9959 results

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

Objects as Software: The Coming Revolution
52 min

Objects as Software: The Coming Revolution

How RepRap and physical compilers will change the world as…

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

"Public Money? Public Code!"
14 min

"Public Money? Public Code!"

Europe's path to digital sovereignty!

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

Collapsing the European security architecture
58 min

Collapsing the European security architecture

More security-critical behaviour in Europe!

eVoting after Nedap and Digital Pen
65 min

eVoting after Nedap and Digital Pen

Why cryptography might not fix the issue of transparent…

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Algorithmic Music in a Box
51 min

Algorithmic Music in a Box

Doing music with microcontrollers

Datenpannen
52 min

Datenpannen

Forderungen nach dem Jahr der Datenverbrechen

Life is a Holodeck!
67 min

Life is a Holodeck!

An overview of holographic techniques

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones