Events for tag "Hacking"

Mobile phone call encryption
69 min

Mobile phone call encryption

Encrypting (GSM) mobile phone calls over VPN with an…

Antiforensik
32 min

Antiforensik

Einführung in das Thema Antiforensik am Beispiel eines…

Benutze Krake mit Gerät
60 min

Benutze Krake mit Gerät

Programmierbare Logik für Deinen Hardware…

PyPy - the new Python implementation on the block
61 min

PyPy - the new Python implementation on the block

Language/VM R&D, whole program type inference, translation…

Deceiving Authorship Detection
59 min

Deceiving Authorship Detection

Tools to Maintain Anonymity Through Writing Style & Current…

I/O Capture Treiber Framework
83 min

I/O Capture Treiber Framework

Maßgeschneiderte Geräte-Filtertreiber auf Knopfdruck

Building an Open Source PKI using OpenXPKI
54 min

Building an Open Source PKI using OpenXPKI

Take a lot of Perl, add some OpenSSL, sprinkle it with a…

Security Nightmares 2008
90 min

Security Nightmares 2008

Oder: worüber wir nächstes Jahr lachen werden

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…

Black Ops Of TCP/IP 2005.5
60 min

Black Ops Of TCP/IP 2005.5

New Explorations: Large Graphs, Larger Threats

Security Nightmares 2007
72 min

Security Nightmares 2007

Oder: worüber wir nächstes Jahr lachen werden

Analog Computing
39 min

Analog Computing

High performance/low power computing based on the analog…

Hopalong Casualty
45 min

Hopalong Casualty

On automated video analysis of human behaviour

Unusual Web Bugs
44 min

Unusual Web Bugs

A Web Hacker's Bag O' Tricks

Men who stare at bits
44 min

Men who stare at bits

Die abenteuerliche Analyse des Datenformats eines real…

The Realtime Podcast
61 min

The Realtime Podcast

Everything you need to know about Podcasting

Practical RFID Attacks
65 min

Practical RFID Attacks

writing, sniffing & emulating 13.56MHz RFID tags with…

OpenPCD / OpenPICC
79 min

OpenPCD / OpenPICC

Free RFID reader and emulator

The engineering part of social engineering
52 min

The engineering part of social engineering

Why just lying your way in won't get you anywhere

Playstation Portable Cracking
34 min

Playstation Portable Cracking

How In The End We Got It All!

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

EFI Rootkits
51 min

EFI Rootkits

Abusing your Firmware to backdoor the kernel

Bluetooth Hacking - The State of The Art
93 min

Bluetooth Hacking - The State of The Art

A roundup and live demonstrations of all currently known…

Machine-to-machine (M2M) security
45 min

Machine-to-machine (M2M) security

When physical security depends on IT security

Writing better code (in Dylan)
59 min

Writing better code (in Dylan)

Fast development of object-oriented functional programs

Cuckoo Sandbox - malware beware
55 min

Cuckoo Sandbox - malware beware

Open Source Dynamic Malware Analysis

How to (really) forget your secret crypto key
34 min

How to (really) forget your secret crypto key

What you always wanted to know about Flash memory - but…

TV-B-Gone
61 min

TV-B-Gone

Better Living Through Inventing

Introducing Osmo-GMR
55 min

Introducing Osmo-GMR

Building a sniffer for the GMR satphones

A collection of random things
46 min

A collection of random things

Look what I found under the carpet

Dynamic Malware Analysis on Android Phones
44 min

Dynamic Malware Analysis on Android Phones

Presentation of the DyAnA Framework (Dynamic Android…

Fuzzing
107 min

Fuzzing

Breaking software in an automated fashion

10GE monitoring live!
59 min

10GE monitoring live!

How to find that special one out of millions

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

Tor and China
87 min

Tor and China

Design of a blocking-resistant anonymity system

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

The Future of Virtualization
55 min

The Future of Virtualization

The "anyOS" paradigm and its implications through…

Vertex Hacking
48 min

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
56 min

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

a dump of simple tools for embedded analysis at many layers

Defense is not dead
64 min

Defense is not dead

Why we will have more secure computers - tomorrow

Secure Code
57 min

Secure Code

Why developing Secure Software is like playing Marble…

Crouching Powerpoint, Hidden Trojan
53 min

Crouching Powerpoint, Hidden Trojan

An analysis of targeted attacks from 2005 to 2007

hpfriends: real-time social data-sharing
48 min

hpfriends: real-time social data-sharing

publish-subscribe feeds + trust relationship network

String Oriented Programming
47 min

String Oriented Programming

Circumventing ASLR, DEP, and Other Guards

From Ring Zero to UID Zero
42 min

From Ring Zero to UID Zero

A couple of stories about kernel exploiting

OMG WTF PDF
57 min

OMG WTF PDF

What you didn't know about Acrobat

Your Disaster/Crisis/Revolution just got Pwned
45 min

Your Disaster/Crisis/Revolution just got Pwned

Telecomix and Geeks without Bounds on Security and Crisis…

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

The blackbox in your phone
58 min

The blackbox in your phone

Some details about SIM cards

Transcending Places
48 min

Transcending Places

Programming With Values

Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
64 min

Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand

Untersuchung eines Austauschsystems für hochsensible…

An Introduction to Traffic Analysis
60 min

An Introduction to Traffic Analysis

Attacks, Defences and Public Policy Issues...

Introduction to matrix programming: trance codes
45 min

Introduction to matrix programming: trance codes

How to recognize trance coded communication patterns

Hacking MFPs
57 min

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

NOC Review
34 min

NOC Review

NOC Review about the Camp 2011 and the 28C3

Ooops I hacked my PBX
28 min

Ooops I hacked my PBX

Why auditing proprietary protocols matters

Console Hacking 2006
50 min

Console Hacking 2006

Xbox 360, Playstation 3, Wii

The Hidden Nemesis
47 min

The Hidden Nemesis

Backdooring Embedded Controllers

Cybernetics for the Masses
39 min

Cybernetics for the Masses

implants, sensory extension and silicon - all for you!

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Honeypot Forensics
117 min

Honeypot Forensics

No stone unturned or: logs, what logs?

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Der Staatstrojaner
128 min

Der Staatstrojaner

Vom braunen Briefumschlag bis zur Publikation

One Token to Rule Them All
48 min

One Token to Rule Them All

Post-Exploitation Fun in Windows Environments

I know who you clicked last summer
52 min

I know who you clicked last summer

A swiss army knife for automatic social investigation

Let's tear down these walls
46 min

Let's tear down these walls

"Mit Links" die Mauern Sozialer Netzwerke überwinden.

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…

Towards the first Free Software GSM Phone
56 min

Towards the first Free Software GSM Phone

Reverse Engineering the Motorola EZX (A768,A780,E680)…

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

Hacking SCADA
57 min

Hacking SCADA

how to own critical infrastructures

The DRM Of Pacman
31 min

The DRM Of Pacman

Copy protection schemes of way back then and how they…

Physical Security
58 min

Physical Security

The Good, the Bad and the Ugly

Security Nightmares 2006
64 min

Security Nightmares 2006

Oder: worüber wir nächstes Jahr lachen werden

Playing with the GSM RF Interface
47 min

Playing with the GSM RF Interface

Doing tricks with a mobile phone

Implementation of MITM Attack on HDCP-Secured Links
45 min

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP…

Hacking the iPhone
58 min

Hacking the iPhone

Pwning Apple's Mobile Internet Device

Passive covert channels in the Linux kernel
115 min

Passive covert channels in the Linux kernel

Implementation and detection of kernel based backdoors and…

Defending the Poor
71 min

Defending the Poor

Preventing Flash Exploits

ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

Signal Intelligence und Electronic Warfare
46 min

Signal Intelligence und Electronic Warfare

Wie man nach Hause telefoniert, ohne von einer Rakete…

"Haste ma'n netblock?"
32 min

"Haste ma'n netblock?"

Layer 8 based IP Address hijacking in the end of the days…

Hacking CCTV
56 min

Hacking CCTV

Watching the watchers, having fun with cctv cameras, making…

Automated Botnet Detection and Mitigation
53 min

Automated Botnet Detection and Mitigation

How to find, invade and kill botnets automated and…

How To Design A Decent User Interface
57 min

How To Design A Decent User Interface

Take a look at software from a user's point of view and…

Secure Network Server Programming on Unix
45 min

Secure Network Server Programming on Unix

Techniques and best practices to securely code your network…

Sovereign Keys
64 min

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

TCP Denial of Service Vulnerabilities
30 min

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

Hacking Data Retention
49 min

Hacking Data Retention

How bureaucrats fail to fight terror

Android Analysis Framework
55 min

Android Analysis Framework

dex reversing in deep

Inside the Mac OS X Kernel
42 min

Inside the Mac OS X Kernel

Debunking Mac OS Myths

Blackberry: call to arms, some provided
53 min

Blackberry: call to arms, some provided

Teach yourself upper management in 22 days

OnionCat – A Tor-based Anonymous VPN
44 min

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

Clickjacking und UI-Redressing
53 min

Clickjacking und UI-Redressing

Wie Hacker vorgehen und wie man sich schützen kann

How to find *anything* on the Web
85 min

How to find *anything* on the Web

Advanced internet searching strategies & "wizard seeking"…

Stealth malware - can good guys win?
78 min

Stealth malware - can good guys win?

Challenges in detecting system compromises and why we’re so…

SPAM Workshop
110 min

SPAM Workshop

SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…

Autodafé: An Act of Software Torture
38 min

Autodafé: An Act of Software Torture

Presentation of an innovative buffer overflow uncovering…

Collateral Damage
54 min

Collateral Damage

Consequences of Spam and Virus Filtering for the E-Mail…

Drohnen züchten
36 min

Drohnen züchten

UAVs und andere spannende Dinge

Finding the key in the haystack
50 min

Finding the key in the haystack

A practical guide to Differential Power Analysis

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

Java wird Groovy
50 min

Java wird Groovy

Eine Einführung in die neue, dynamische Sprache für das…

Finding and Preventing Buffer Overflows
45 min

Finding and Preventing Buffer Overflows

An overview of static and dynamic approaches

The Cell Processor
64 min

The Cell Processor

Computing of Tomorrow or Yesterday

Syscall proxying fun and applications
49 min

Syscall proxying fun and applications

Introduction to syscall proxying and applications for in…

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

Strong encryption of credit card information
51 min

Strong encryption of credit card information

Attacks on common failures when encrypting credit card…

Advanced microcontroller programming
51 min

Advanced microcontroller programming

Getting deeper into AVR programming

Old Skewl Hacking - InfraRed updated
49 min

Old Skewl Hacking - InfraRed updated

MMIrDA - Major Malfunction's InfraRed Discovery Application

C64-DTV Hacking
57 min

C64-DTV Hacking

Revisiting the legendary computer in a joystick

Ethernet mit Mikrocontrollern
49 min

Ethernet mit Mikrocontrollern

Wie funktioniert TCP mit 2kb RAM?

Building a Debugger
55 min

Building a Debugger

Open JTAG with Voltage Glitching

media.ccc.de
39 min

media.ccc.de

Das YouTube des CCC

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…

Vier Fäuste für ein Halleluja
54 min

Vier Fäuste für ein Halleluja

Geschichten aus dem API-und Protokollkrieg von zwei…

Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

The Kernel Accelerator Device
45 min

The Kernel Accelerator Device

Reconfigurable computing for the kernel

muXTCP
50 min

muXTCP

Writing your own flexible Userland TCP/IP Stack - Ninja…

Cryptographic key recovery from Linux memory dumps
65 min

Cryptographic key recovery from Linux memory dumps

Does dm-crypt and cryptoloop provide expected security when…

WarTracking
53 min

WarTracking

Satellite Tracking, harvesting and security

Know your compiler
53 min

Know your compiler

...and what the optimizer does so you don't have to

What you thought you knew about C
47 min

What you thought you knew about C

Impacts of undefined behaviour and other C oddities

Inside VMware
68 min

Inside VMware

How VMware, VirtualPC and Parallels actually work

Freedom from the web's monopolies
32 min

Freedom from the web's monopolies

A better architecture for the web, beneficial to both…

Fudging with Firmware
43 min

Fudging with Firmware

Firmware reverse-engineering tactics

Macro dragnets: Why trawl the river when you can do the whole ocean
60 min

Macro dragnets: Why trawl the river when you can do the whole ocean

What happens when data collection goes awry in the 21st…

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

SIP home gateways under fire
25 min

SIP home gateways under fire

Source routing attacks applied to SIP

Community mesh networking
54 min

Community mesh networking

Ubiquitous wireless mesh clouds with olsrd from olsr.org

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

Honeymonkeys
46 min

Honeymonkeys

Chasing hackers with a bunch of monkeys

Military intelligence for terrorists(tm)
52 min

Military intelligence for terrorists(tm)

A lamer's introduction to retrieving "sensitive"…

The Baseband Apocalypse
66 min

The Baseband Apocalypse

all your baseband are belong to us

Twisting timing in your favour
43 min

Twisting timing in your favour

Finding and exploiting concurrency issues in software

How to implement bignum arithmetic
47 min

How to implement bignum arithmetic

A short look at my pet project implementation

I See Airplanes!
51 min

I See Airplanes!

How to build your own radar system

Lawful Interception in VoIP networks
49 min

Lawful Interception in VoIP networks

Old Laws and New Technology the German Way

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

coreboot: Adding support for a system near you
70 min

coreboot: Adding support for a system near you

Working with the open source BIOS replacement and getting a…

The A5 Cracking Project
61 min

The A5 Cracking Project

Practical attacks on GSM using GNU Radio and FPGAs

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

802.11 Packets in Packets
57 min

802.11 Packets in Packets

A Standard-Compliant Exploit of Layer 1

"Die gesamte Technik ist sicher"
60 min

"Die gesamte Technik ist sicher"

Besitz und Wissen: Relay-Angriffe auf den neuen…

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

Einführung in Django
41 min

Einführung in Django

"The Web Framework for perfectionists with deadlines."

A Case Against C++
53 min

A Case Against C++

Why C++ is bad for the environment, causes global warming…

Hacking into TomTom Go
52 min

Hacking into TomTom Go

Reverse-Engineering des Embedded-Linux-Navigationssystems

Unlocking FileVault
54 min

Unlocking FileVault

An analysis of Apple's encrypted disk storage system

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

Mifare
59 min

Mifare

Little Security, Despite Obscurity

CR217 - Professional Hackers
119 min

CR217 - Professional Hackers

Ein Einblick in die Security-Industrie

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

Data Mining the Israeli Census
26 min

Data Mining the Israeli Census

Insights into a publicly available registry

Embedded device security nightmares
46 min

Embedded device security nightmares

An Introduction to the usual mistakes

Blackbox JTAG Reverse Engineering
56 min

Blackbox JTAG Reverse Engineering

Discovering what the hardware architects try to hide from…

GPS-Trackers
48 min

GPS-Trackers

How they track you when your mobile is switched off

DECT (part II)
61 min

DECT (part II)

What has changed in DECT security after one year

Security in the cardholder data processing?!
71 min

Security in the cardholder data processing?!

Experiences and lessons learned with the Payment Card…

Subverting AJAX
53 min

Subverting AJAX

Next generation vulnerabilities in 2.0 Web Applications

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Wireless Kernel Tweaking
63 min

Wireless Kernel Tweaking

or how B.A.T.M.A.N. learned to fly

Practical Mac OS X Insecurity
52 min

Practical Mac OS X Insecurity

Security Concepts, Problems, and Exploits on Your Mac

Desperate House-Hackers
56 min

Desperate House-Hackers

How to Hack the Pfandsystem

Inside Sputnik & OpenBeacon - Smart Dust for the Masses
46 min

Inside Sputnik & OpenBeacon - Smart Dust for the Masses

a hackers guide into homebrewn 2.4GHz hardware & peripherals

Datenvieh oder Daten-Fee
67 min

Datenvieh oder Daten-Fee

Welchen Wert haben Trackingdaten?

SDR, GSM/OpenBTS
52 min

SDR, GSM/OpenBTS

New RF technology - exciting for good guys, bad guys,…

Time is on my Side
61 min

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

Print Me If You Dare
63 min

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer…

Black Ops 2006 Viz Edition
55 min

Black Ops 2006 Viz Edition

Pixel Fuzzing and the Bioinformatic Bindiff

The Realtime thing
44 min

The Realtime thing

What the heck is realtime - and what to do with it

To be or I2P
50 min

To be or I2P

An introduction into anonymous communication with I2P

Can trains be hacked?
64 min

Can trains be hacked?

Die Technik der Eisenbahnsicherungsanlagen

WiFi Long Shots
52 min

WiFi Long Shots

Wireless connections of 20km and more

Atmel AVR für Dummies
46 min

Atmel AVR für Dummies

Was ist denn nun eigentlich so ein 'Interrupt'?

A not so smart card
47 min

A not so smart card

How bad security decisions can ruin a debit card design

Anonymous Data Broadcasting by Misuse of Satellite ISPs
43 min

Anonymous Data Broadcasting by Misuse of Satellite ISPs

An open-source project to develop a tool for broadband…

iOS application security
51 min

iOS application security

A look at the security of 3rd party iOS applications

FrozenCache
55 min

FrozenCache

Mitigating cold-boot attacks for Full-Disk-Encryption…

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

Router and Infrastructure Hacking
45 min

Router and Infrastructure Hacking

"First we take Manhattan, then we take Berlin..."

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

Tracker fahrn
75 min

Tracker fahrn

We Track Harder - We Track More! Take the pain out of…

Power gadgets with your own electricity
63 min

Power gadgets with your own electricity

escape the basement and make the sun work for you

Introduction to SecureShare
20 min

Introduction to SecureShare

A peer-to-peer, end-to-end encrypted social networking…

Peer-to-peer under the hood
47 min

Peer-to-peer under the hood

An in-depth look at p2p algorithmics

3G Investigations
52 min

3G Investigations

Scanning your GPRS/UMTS IP network for fun and profit

"Xbox" and "Xbox 360" Hacking
113 min

"Xbox" and "Xbox 360" Hacking

17 Mistakes Microsoft Made in the Xbox Security System &…

COMPLETE Hard Disk Encryption with FreeBSD
66 min

COMPLETE Hard Disk Encryption with FreeBSD

Learn how to effectively protect not only your data but…

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

Android Security
57 min

Android Security

bringing x86 fuckups to dalvik

Secure Instant Messaging
46 min

Secure Instant Messaging

Suppression of secure communications by governments

Virtuelle Sicherheit
63 min

Virtuelle Sicherheit

Mandatory Access Control und TPM in Xen

Software Reliability in Aerospace
57 min

Software Reliability in Aerospace

An overview on design and generation of safe and reliable…

Mehr Sicherheit für HostAP-WLANs
29 min

Mehr Sicherheit für HostAP-WLANs

WLANs mit Wi-Fi Protected Access (WPA) betreiben

Distributed FPGA Number Crunching For The Masses
56 min

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a…

The Ultimate Commodore 64 Talk
61 min

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

XMPP/Jabber
34 min

XMPP/Jabber

Introducing the 'lingua franca' of Instant Messaging

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

DC+, The Protocol
41 min

DC+, The Protocol

Technical defense against data retention law

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

A 10GE monitoring system
52 min

A 10GE monitoring system

Hacking a 10 Gigabit Intrusion detection and prevention…

VoIPhreaking
49 min

VoIPhreaking

Introduction to SIP Hacking

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

Project Sputnik
135 min

Project Sputnik

Realtime in-building location tracking at the 23C3

Jabber-Showcase
34 min

Jabber-Showcase

XMPP ist viel mehr als nur Instant Messaging

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

CSRF, the Intranet and You
61 min

CSRF, the Intranet and You

Causes, Attacks and Countermeasures

Making music with a C compiler
53 min

Making music with a C compiler

(also introducing libglitch)

Private investigations in searching
53 min

Private investigations in searching

How to find any book (and many other roadkills) on the…

Programming FPGAs with PSHDL
48 min

Programming FPGAs with PSHDL

Lets create the Arduino for FPGAs

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

secuBT
57 min

secuBT

Hacking the Hackers with User-Space Virtualization

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Faster PwninG Assured
60 min

Faster PwninG Assured

Hardware Hacks and Cracks with FPGAs

Void the warranty!
52 min

Void the warranty!

How to start analyzing blackboxes