Learning Notebook - David Rostcheck
Public View
Learning Event ID | Subject [F] | Topic | Program [F] | Length | Institution [F] | Presenter [F] | Format | Recorded Date | Completed Date | Actions |
5910 | Security | GrapheneOS - the greatest mobile OS of all time. Common usability misconceptions debunked! | Independent Studies in Security | 15:23:00 | YouTube | Louis Rossman | Video Lecture | 2022-09-22 | 2024-04-28 | details |
5888 | Security | Understanding the Linux Backdoor: Implications for Open Source [When Penguins Cry] | Independent Studies in Security | 00:10:06 | YouTube | Dave's Garage | Video Lecture | 2024-04-04 | 2024-04-13 | details |
5885 | Security | Dave explains the new backdoor in SSH. | Independent Studies in Security | 00:10:06 | YouTube | Low Level Learning | Video Lecture | 2024-04-04 | 2024-04-13 | details |
5861 | Security | new linux exploit is absolutely insane | Independent Studies in Security | 00:08:28 | YouTube | Low Level Learning | Video Lecture | 2024-03-28 | 2024-03-31 | details |
5857 | Security | OWASP top 10 for LLLs | Security for LLMs | 00:05:00 | OWASP.org | OWASP.org | Article | 2024-02-10 | 2024-03-29 | details |
5856 | Security | A Security Primer for Generative AI: The Generative AI Security Scoping Matrix | Security for LLMs | 00:25:00 | Amazon Web Services | Jason Garman | Article | 2024-01-28 | 2024-03-29 | details |
5172 | Security | Gray Hat C# | Independent Studies in Security | 02:00:00 | No Starch Press | Brandon Perry | Book | 2017-07-01 | 2022-06-29 | details |
5133 | Security | Amazon accuses customer of racism & shuts down their smart home - enough cloud junk!! | Independent Studies in Security | 00:09:16 | YouTube | Louis Rossman | Video Lecture | 2022-06-12 | 2022-06-12 | details |
4970 | Security | This Makes Hacking Too Easy - Flipper Zero | Independent Studies in Security | 00:12:11 | YouTube | Linus Tech Tips | Video Lecture | 2022-04-09 | 2022-04-19 | details |
4663 | Security | Encrypting File Data with Amazon Elastic File System: AWS Whitepaper | AWS Certified Solutions Architect - Professional | 00:20:00 | Amazon Web Services | Darryl S. Osborne, Joseph Travaglini, Peter Buonora, Siva Rajamani | Article | 2022-04-06 | 2022-12-14 | details |
4662 | Security | Security best practices for AWS Key Management Service | AWS Certified Solutions Architect - Professional | 00:20:00 | Amazon Web Services | Amazon Web Services | Article | 2022-11-22 | 2022-12-14 | details |
4153 | Security | Test restoring from a seed phrase | Independent Studies in Blockchain Security | 00:45:00 | David Rostcheck | David Rostcheck | Lab | 2022-03-06 | 2022-03-06 | details |
4152 | Security | Metamask wallet security tips – How to protect your Metamask accounts? | Independent Studies in Blockchain Security | 00:15:00 | CoinGuides.org | coinguides | Article | 2022-01-19 | 2022-03-03 | details |
4145 | Security | Lab: Create and store secrets w/ AWS Secrets Manager | Independent Studies in Blockchain Security | 00:40:00 | David Rostcheck | David Rostcheck | Lab | 2022-03-03 | 2022-03-03 | details |
4144 | Security | Crypto wallets security as seen by security engineers | Independent Studies in Blockchain Security | 00:20:00 | Cossack Labs | Julia Potapenko, Artur Hil, Anastasiia Voitova | Article | 2021-12-14 | 2022-03-05 | details |
4143 | Security | "Schneier's Law" | Independent Studies in Blockchain Security | 00:08:00 | Schneier on Security | Bruce Schneier | Article | 2011-04-15 | 2022-03-05 | details |
4142 | Security | Why Keystone implemented Shamir Backups | Independent Studies in Blockchain Security | 00:06:00 | Keystone | Patrick Kim | Article | 2021-06-30 | 2022-03-05 | details |
4141 | Security | Self-Destruct Mechanism’s Unique Defense Against Side-Channel Attacks | Independent Studies in Blockchain Security | 00:04:00 | Keystone | Patrick Kim | Article | 2021-06-22 | 2022-03-05 | details |
4139 | Security | Recovery Phrase Horror Stories | Independent Studies in Blockchain Security | 00:08:00 | Keystone | Patrick Kim | Article | 2021-07-21 | 2022-03-05 | details |
4138 | Security | OWASP Secure Coding Practices Quick Reference Guide | Independent Studies in Security | 00:12:00 | OWASP | OWASP | Article | 2010-01-01 | 2022-03-05 | details |
4101 | Security | The Woes of Distributed Consensus | Blockchain Basics | 00:10:00 | Medium | Gala Games | Article | 2021-12-23 | 2022-02-16 | details |
4053 | Security | SHA: Secure Hashing Algorithm - Computerphile | Blockchain Basics | 00:10:20 | YouTube | Computerphile | Video Lecture | 2018-04-11 | 2022-01-29 | details |
3999 | Security | Using AWS security services to protect against, detect, and respond to the Log4j vulnerability | Independent Studies in Security | 00:15:00 | AWS Security Blog | Marshall Jones, Syed Shareef | Article | 2021-12-21 | 2021-12-23 | details |
3997 | Security | Log4J & JNDI Exploit: Why So Bad? - Computerphile | Independent Studies in Security | 00:26:30 | YouTube | FreakyVidsDaily | Video Lecture | 2021-12-22 | 2021-12-22 | details |
3932 | Security | 1.8 Gigapixed Argus-IS: World's highest resolution video surveillance platform by DARPA | AWS Certified Solutions Architect - Professional | 00:04:40 | YouTube | FreakyVidsDaily | Video Lecture | 2013-01-27 | 2021-11-14 | details |
3856 | Security | Deploying defense in depth using AWS Managed Rules for AWS WAF (part 2) | AWS Certified Solutions Architect - Professional | 00:05:00 | AWS Security Blog | Daniel Stuart | Article | 2020-09-02 | 2021-10-01 | details |
3855 | Security | Defense in depth using AWS Managed Rules for AWS WAF (part 1) | AWS Certified Solutions Architect - Professional | 00:20:00 | AWS Security Blog | Daniel Stuart | Article | 2020-09-02 | 2021-10-01 | details |
3844 | Security | AWS Key Management Service Best Practices | AWS Certified Solutions Architect - Professional | 01:00:00 | Amazon Web Services | Matthew Bretan, Sree Pisharody, Ken Beer, Brian Wagner, Eugene Yu, Michael St.Onge, Balaji Palanisamy, Jonathan Rault, Reef Dsouza, Paco Hope | Article | 2017-04-01 | 2021-10-02 | details |
3825 | Security | "Secret" Agent Exposes Azure Customers To Unauthorized Code Execution (OMIGOD exploit) | Independent Studies in Security | 00:10:00 | Wiz.io | Nir Ohfeld | Article | 2021-09-14 | 2021-09-17 | details |
3795 | Security | Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer | Independent Studies in Security | 00:10:00 | Ars Technica | Dan Goodin | Article | 2019-09-28 | 2021-09-06 | details |
3780 | Security | Hidden Radios in Home Devices (IOT)! The next Cyberthreat | Independent Studies in Security | 00:24:48 | YouTube | Rob Braxman Tech | Video Lecture | 2021-07-01 | 2021-08-21 | details |
3778 | Security | Section 12: Wrap Up | The Complete Cyber Security Course : Network Security! | 00:30:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-08-21 | details |
3777 | Security | Section 11: Passwords and Authentication Methods | The Complete Cyber Security Course : Network Security! | 01:43:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-08-21 | details |
3775 | Security | Section 10: Browser Security and Tracking Prevention | The Complete Cyber Security Course : Network Security! | 02:48:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-08-01 | details |
3764 | Security | Section 9: Search Engines and Privacy | The Complete Cyber Security Course : Network Security! | 00:41:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-08-01 | details |
3763 | Security | Section 8: How We Are Tracked Online | The Complete Cyber Security Course : Network Security! | 00:45:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-07-25 | details |
3762 | Security | Section 7: Network Monitoring for Threats | The Complete Cyber Security Course : Network Security! | 01:05:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-06-15 | details |
3761 | Security | Section 6: Wireless and Wi-Fi Security | The Complete Cyber Security Course : Network Security! | 00:48:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-06-02 | details |
3760 | Security | Section 5: Network Attacks, Architecture and Isolation | The Complete Cyber Security Course : Network Security! | 00:33:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-05-27 | details |
3759 | Security | Section 4: Firewalls | The Complete Cyber Security Course : Network Security! | 02:03:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-05-24 | details |
3689 | Security | Breaking Into a Smart Home With A Laser | Independent Studies in Security | 00:18:56 | YouTube | Smarter Every Day | Article | 2019-12-26 | 2021-06-11 | details |
3685 | Security | Verifying Signatures | Independent Studies in Security | 00:25:00 | qubes-os.org | qubes-os.org | Article | 2021-06-11 | 2021-06-11 | details |
3684 | Security | Installation security - Qubes OS | Independent Studies in Security | 00:10:00 | qubes-os.org | qubes-os.org | Article | 2021-06-11 | 2021-06-11 | details |
3677 | Security | Lab: Explore exploit databases | The Complete Cyber Security Course : Network Security! | 01:00:00 | Station X | David Rostcheck | Lab | 2021-06-11 | 2021-06-11 | details |
3676 | Security | Lab: Explore home router configuration | The Complete Cyber Security Course : Network Security! | 02:00:00 | Station X | David Rostcheck | Lab | 2021-06-11 | 2021-06-11 | details |
3675 | Security | Lab: Explore Macbook network interfaces | The Complete Cyber Security Course : Network Security! | 01:30:00 | Station X | David Rostcheck | Lab | 2021-06-11 | 2021-06-11 | details |
3670 | Security | The Next Chapter: From the Endpoint to the Cloud | Independent Studies in Security | 00:02:00 | qubes-os.org | Joanna Rutkowska | Video Lecture | 2018-10-25 | 2021-06-11 | details |
3626 | Security | Section 3: Routers - Port and Vulnerability scanning | The Complete Cyber Security Course : Network Security! | 01:02:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-05-19 | details |
3625 | Security | Section 2: Goals and Learning Objectives - Volume 2 | The Complete Cyber Security Course : Network Security! | 00:03:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-05-19 | details |
3624 | Security | Section 1: Introduction | The Complete Cyber Security Course : Network Security! | 00:25:00 | Station X | Nathan House | Video Lecture | 2021-05-19 | 2021-05-19 | details |
3604 | Security | Ethical Hacking Tutorial For Beginners | Cybersecurity Training | Edureka | Cybersecurity Rewind - 3 | Edureka Cyber Security Course | 00:39:25 | YouTube | edureka! | Article | 2021-01-06 | 2021-05-11 | details |
3506 | Security | ZeroNet | Independent Studies in Security | 00:10:00 | ZeroNet | ZeroNet | Article | 2021-02-08 | 2021-02-08 | details |
3428 | Security | Antrim Michigan Forensics Report | 2020 U.S. Election Fraud Investigations | 00:15:00 | Allied Security Operations Group | Russell James Ramsland Jr. | Article | 2020-12-13 | 2020-12-04 | details |
3418 | Security | Hardware Root of Trust | Rambus Blogs | 00:10:00 | Rambus | Rambus Press | Article | 2019-09-10 | 2020-12-09 | details |
3248 | Security | Enterprise Survival Guide forRansomware Attacks | SANS Reading Room | 00:10:00 | SANS | Shafqat Mehmoon | Article | 2016-04-30 | 2020-02-13 | details |
3237 | Security | Security Benefits of the EC2 Nitro Architecture | re:Inforce 2019 | 00:19:39 | Amazon Web Services | Mark Ryland, Brandon West | Video Lecture | 2019-07-01 | 2020-04-09 | details |
3236 | Security | Malicious Component Found On Server Motherboards Supplied To Numerous Companies | Hackaday | 00:03:00 | Hackaday | Inderpreet Singh, Mike Szczys | Article | 2018-10-08 | 2020-04-08 | details |
3235 | Security | What happened with SuperMicro | Hackaday | 00:05:00 | Hackaday | Bob Baddeley | Article | 2018-12-30 | 2020-04-08 | details |
3234 | Security | Modchips of the State | Chaos Communications Congress | 00:36:52 | 2 Sigma | Trammell Hudson | Video Lecture | 2018-12-30 | 2020-04-08 | details |
3233 | Security | Setting the Record Straight on Bloomberg BusinessWeek’s Erroneous Article | AWS Security Blog | 00:05:00 | Amazon Web Services | Stephen Schmidt | Article | 2018-10-04 | 2020-04-08 | details |
3232 | Security | The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies | Bloomberg Businessweek | 00:10:00 | Bloomberg Businessweek | Jordan Robertson, Michael Riley | Article | 2018-10-04 | 2020-04-08 | details |
3144 | Security | How to Automatically Tag Amazon EC2 Resources in Response to API Events | AWS Security Blog | 00:10:00 | Amazon Web Services | Alessandro Martini | Article | 2016-05-16 | 2020-02-07 | details |
3143 | Security | How to Create a Policy That Whitelists Access to Sensitive Amazon S3 Buckets | AWS Security Blog | 00:05:00 | Amazon Web Services | Matt Breton | Article | 2015-09-14 | 2020-02-07 | details |
3138 | Security | Amazon Detective | AWS Training Talks | 00:45:00 | Amazon Web Services | Kim Zetter | Article | 2020-02-05 | 2020-02-05 | details |
2956 | Security | DARPA Is Building a $10 Million, Open Source, Secure Voting System | Motherboard | 00:10:00 | VICE | Kim Zetter | Article | 2019-05-14 | 2019-08-04 | details |
2848 | Security | Digital IDs offer security, simplicity in a post-Equifax world | SecureID News | 00:05:00 | SecureID News | SecureID News | Article | 2018-01-26 | 2018-01-29 | details |
2803 | Security | Cybersecurity Awareness Training | Toyota Onboarding | 01:40:00 | SANS | SANS | Video Lecture | 2017-10-10 | 2017-10-10 | details |
2763 | Security | BouncyCastle .NET Crypto Library | Project Mercurio | 00:10:00 | The Legion of the Bouncy Castle | The Legion of the Bouncy Castle | Article | 2017-08-23 | 2017-08-23 | details |
2759 | Security | Sailfish OS | Independent Studies in Security | 00:07:00 | Jolia | Wikipedia | Article | 2017-08-23 | 2017-08-23 | details |
2549 | Security | Key management best practices | Independent Studies in Security | 00:15:00 | Qubes | Wikipedia | Article | 2016-12-23 | 2016-12-23 | details |
2543 | Security | High Orbit Ion Cannon | Independent Studies in Security | 00:05:00 | Wikipedia | Wikipedia | Article | 2016-11-05 | 2016-11-05 | details |
2542 | Security | Low Orbit Ion Cannon | Independent Studies in Security | 00:05:00 | Wikipedia | Wikipedia | Article | 2016-11-05 | 2016-11-05 | details |
2528 | Security | Even a single computer can take down large servers using BlackNurse attack | Independent Studies in Security | 00:06:00 | TheHackerNews.com | Swati Khandelwal | Article | 2016-11-13 | 2016-11-27 | details |
2527 | Security | Linux root shell by pressing enter for 70 seconds | Independent Studies in Security | 00:02:00 | TheHackerNews.com | Swati Khandelwal | Article | 2016-11-27 | 2016-11-27 | details |
2526 | Security | Your headphones can spy on you - even if you have disabled microphone | Independent Studies in Security | 00:02:00 | TheHackerNews.com | Swati Khandelwal | Article | 2016-11-27 | 2016-11-27 | details |
2525 | Security | Malicious JPG images on Facebook Messenger sending Locky ransomware | Independent Studies in Security | 00:02:00 | TheHackerNews.com | Swati Khandelwal | Article | 2016-11-27 | 2016-11-27 | details |
2488 | Security | Breaking Down Mirai: An IoT DDoS Botnet Analysis | Independent Studies in Security | 00:15:00 | Incapsula | Igal Zeifman, Dima Bekerman, Ben Herzberg | Article | 2016-10-27 | 2016-10-30 | details |
2481 | Security | AtomBombing: Brand New Code Injection for Windows | Independent Studies in Security | 00:10:00 | BreakingMalware.com | Tal Liberman | Article | 2016-10-27 | 2016-10-27 | details |
2356 | Security | The Missing Piece – Sophisticated OS X Backdoor Discovered | Independent Studies in Security | 00:03:00 | SecureList | Stefan Ortloff | Article | 2016-09-07 | 2016-09-08 | details |
2226 | Security | New AI security system cleverly combines machine learning and human intuition | Independent Studies in Security | 00:01:00 | TechRadar | Darren Allan | Article | 2016-04-19 | 2016-04-19 | details |
2183 | Security | The NSA's back door has given every US secret to our enemies | Independent Studies in Security | 00:10:00 | Business Insider | John McAfee | Article | 2016-02-26 | 2016-03-03 | details |
2181 | Security | HackingTeam Reborn: A Brief Analysis of an RCS Implant Installer | Independent Studies in Security | 00:15:00 | Objective-See | Patrick Wardle | Article | 2016-02-26 | 2016-03-01 | details |
2179 | Security | Exploiting SMM callout vulnerabilities in Lenovo firmware | Independent Studies in Security | 00:15:00 | My aimful life | Dmytro Oleksiuk aka Cr4sh | Article | 2016-02-24 | 2016-02-25 | details |
2155 | Security | How Artificial Immune Systems May Be the Future of Cybersecurity | Independent Studies in Security | 00:06:00 | SingularityHub | Shelly Fan | Article | 2015-12-27 | 2016-02-04 | details |
2066 | Security | How is NSA breaking so much crypto? | Independent Studies in Security | 00:02:00 | Freedom to Tinker | Alex Halderman and Nadia Heninger | Article | 2015-10-14 | 2015-10-15 | details |
2042 | Security | Pentagon takes an analog approach to securing the Internet of Things | Independent Studies in Security | 00:03:00 | Defense Systems | Kevin McCaney | Article | 2015-09-29 | 2015-09-29 | details |
1949 | Security | Highway to hack: why we’re just at the beginning of the auto-hacking era | Independent Studies in Security | 00:05:00 | arstechnica | Sean Gallagher | Article | 2015-08-23 | 2015-08-23 | details |
1915 | Security | A Trojan Seal | Independent Studies in Security | 00:06:00 | arstechnica | Ken Stanley | Article | 2010-04-01 | 2015-08-12 | details |
1914 | Security | How "omnipotent" hackers tied to NSA hid for 14 years - and were found at last | Independent Studies in Security | 00:12:00 | arstechnica | Dan Goodin | Article | 2015-02-16 | 2015-08-12 | details |
1883 | Security | DefCon Hackers Tell How They Cracked Brink's Safe in 60 Seconds | Independent Studies in Security | 00:05:00 | eWeek | Sean Michael Kerner | Article | 2015-07-27 | 2015-07-28 | details |
1799 | Security | How To Make A Secret Phone Call | Independent Studies in Security | 00:15:00 | FastCompany | DJ Pangburn | Article | 2015-04-03 | 2015-05-22 | details |
1747 | Security | Claims-Based Identity | Learning Machine Development | 00:05:00 | Wikipedia | Wikipedia | Article | 2015-04-01 | 2015-04-01 | details |
1739 | Security | Physical Attacks and Tamper Resistance | Independent Studies in Security | 00:20:00 | University of Connecticut ECE Department | Mohammad Tehranipoor | Article | 2012-12-25 | 2015-03-11 | details |
1717 | Security | Initialization Vector | Independent Studies in Security | 00:20:00 | Wikipedia | Wikipedia | Article | 2015-01-03 | 2015-01-03 | details |
1716 | Security | Block Cypher | Independent Studies in Security | 00:00:00 | Wikipedia | Wikipedia | Article | 2015-01-03 | 2015-01-03 | details |
1715 | Security | Block Cypher Modes of Operation | Independent Studies in Security | 00:40:00 | Wikipedia | Wikipedia | Article | 2015-01-03 | 2015-01-03 | details |
1692 | Security | Researchers make BitTorrent anonymous and impossible to shut down | Independent Studies in Security | 00:10:00 | TorrentFreak | TorrentFreak | Article | 2014-12-18 | 2014-12-18 | details |
1667 | Security | DomainKeys Identified Mail (DKIM) | Learning Machine Development | 00:30:00 | Wikipedia | Wikipedia | Article | 2014-11-05 | 2014-11-05 | details |
1666 | Security | DNS-based Blackhole List (DNSBL) | Learning Machine Development | 00:30:00 | Wikipedia | Wikipedia | Article | 2014-11-05 | 2014-11-05 | details |
1665 | Security | Sender Policy Framework | Learning Machine Development | 00:30:00 | Wikipedia | Wikipedia | Article | 2014-11-05 | 2014-11-05 | details |
1653 | Security | The 1s and 0s behind cyber warfare | Independent Studies in Security | 00:16:45 | TED | Chris Domas | Video Lecture | 2013-10-01 | 2014-06-30 | details |
1643 | Security | Public key certificate | Independent Studies in Security | 00:10:00 | Wikipedia | Wikipedia | Article | 2014-05-27 | 2014-05-27 | details |
1640 | Security | The Future of Email Privacy | Independent Studies in Security | 00:21:00 | DarkMail | Ladar Levinson | Video Lecture | 2014-05-12 | 2014-05-27 | details |
1638 | Security | Zooko's Triangle | Independent Studies in Security | 00:15:00 | Wikipedia | Wikipedia | Article | 2014-03-04 | 2014-04-15 | details |
1632 | Security | New Frontiers in Cryptography | Independent Studies in Security | 00:21:00 | TrustyCon | New Frontiers in Cryptography | Video Lecture | 2014-02-27 | 2014-04-28 | details |
1566 | Security | Trusted Computing Tech and Government Implants | Independent Studies in Security | 00:27:58 | TrustyCon | Steve Weiss | Video Lecture | 2014-02-27 | 2014-03-28 | details |
1565 | Security | The strangeness of scale at Twitter | Independent Studies in Security | 00:09:19 | TED | Del Harvey | Video Lecture | 2014-03-21 | 2014-03-27 | details |
1564 | Security | Community Immunity | Independent Studies in Security | 00:18:45 | TrustyCon | Video Lecture | 2014-02-27 | 2014-03-23 | details | |
1563 | Security | The laws and ethics of trustworthy technology | Independent Studies in Security | 00:42:50 | TrustyCon | Christoper Segoia, Marsha Hoffman | Video Lecture | 2014-02-27 | 2014-03-23 | details |
1553 | Security | Joseph Menn Interviews Bruce Schneier | Independent Studies in Security | 00:40:40 | TrustyCon | Joseph Menn, Bruce Schneier | Video Lecture | 2014-02-27 | 2014-03-14 | details |
1552 | Security | Securing SecureDrop | Independent Studies in Security | 00:39:37 | TrustyCon | Garrett Robinson, Yong Zu | Video Lecture | 2014-02-27 | 2014-03-14 | details |
1550 | Security | The talk I was going to give at RSA 2014 | Independent Studies in Security | 00:48:39 | TrustyCon | Mikko Hypponen | Video Lecture | 2014-02-27 | 2014-03-09 | details |
1549 | Security | Opening Remarks - TrustyCon 2014 | Independent Studies in Security | 00:10:59 | TrustyCon | Alex, Raney Whiteman, Yong Zu | Video Lecture | 2014-02-27 | 2014-03-09 | details |
1548 | Security | Cross-Site Request Forgery | Independent Studies in Security | 00:10:00 | Wikipedia | Wikipedia | Article | 2014-02-20 | 2014-03-09 | details |
1542 | Security | VOIP: Skype architecture & complete call setup, Seminar 2 | Independent Studies in Security | 00:25:00 | Prateek Arora | Prateek Arora | Article | 2010-05-05 | 2014-02-06 | details |
1532 | Security | Personal banking apps leak info through phone | Independent Studies in Security | 00:10:00 | IOActive | Ariel Sanchez | Article | 2014-01-08 | 2014-01-11 | details |
1531 | Security | Flaws plague leading mobile banking apps | Independent Studies in Security | 00:00:05 | ThreatPost.com | Michael Mimoso | Article | 2014-01-10 | 2014-01-11 | details |
1530 | Security | Do you know who’s writing your software? If you’re using open-source, probably not | Independent Studies in Security | 00:10:00 | VentureBeat | Meghan Kelly | Article | 2014-01-09 | 2014-01-10 | details |
1529 | Security | Stuxnet's Secret Twin | Foreign Policy | 00:15:00 | Foreign Policy | Ralph Langner | Article | 2012-11-21 | 2014-01-05 | details |
1528 | Security | Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU | Independent Studies in Security | 00:10:00 | ExtremeTech | Sebastian Anthony | Article | 2013-12-18 | 2014-01-01 | details |
1527 | Security | RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis | Independent Studies in Security | 00:10:00 | Tel Aviv University | Daniel Genkin, Adi Shamir, Eran Tromer | Article | 2013-12-30 | 2014-01-01 | details |
1526 | Security | Complete Guide to How NSA Hacked Everything | Independent Studies in Security | 01:00:00 | ZeroHedge | Jacob Applebaum (@ioerror) | Article | 2013-12-30 | 2014-01-01 | details |
1525 | Security | iOS Application Insecurity | Independent Studies in Security | 00:45:00 | MDSec | Wikipedia | Article | 2012-05-02 | 2014-01-01 | details |
1524 | Security | Return-oriented programming | Independent Studies in Security | 00:15:00 | Wikipedia | Wikipedia | Article | 2013-08-17 | 2014-01-01 | details |
1520 | Security | Exploration and Exploitation of an SD Card | Independent Studies in Security | 01:00:10 | 30c3 | Team Kosagi | Video Lecture | 2013-12-29 | 2013-12-31 | details |
1519 | Security | On Hacking MicroSD Cards | Independent Studies in Security | 00:15:00 | Bunnie Studios | Team Kosagi | Article | 2013-12-29 | 2013-12-30 | details |
1517 | Security | To protect and infect: The militarization of the internet (part 2) | Independent Studies in Security | 01:02:15 | 30c3 | Jacob Applebaum (@ioerror) | Video Lecture | 2013-12-30 | 2013-12-31 | details |
1516 | Security | Ultrasound data transmission via a laptop | Independent Studies in Security | 00:03:09 | Anfractuosity | Anonymous | Video Lecture | 2013-12-10 | 2013-12-18 | details |
1515 | Security | Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks | USENIX Security '12 | 00:20:00 | USENIX | Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln | Article | 2012-08-10 | 2013-12-22 | details |
1511 | Security | Why privacy matters | TED Talks | 00:15:00 | TED | Alessandro Acquisti | Video Lecture | 2013-06-01 | 2013-10-22 | details |
1457 | Security | Position-Independent Code | Independent Studies in Security | 00:15:00 | Wikipedia | Wikipedia | Article | 2013-06-02 | 2013-07-22 | details |
1456 | Security | Buffer Overflow Protection | Independent Studies in Security | 00:15:00 | Wikipedia | Wikipedia | Article | 2013-05-20 | 2013-07-22 | details |
1350 | Security | The Athens Affair | 2012 Tech Refresh | 00:12:00 | IEEE | Vassilis Prevelakis, Diomidis Spinellis | Article | 2007-07-01 | 2012-11-26 | details |
1309 | Security | The drunken bishop: An analysis of the OpenSSH fingerprint visualization algorithm | 2012 Tech Refresh | 00:10:00 | OpenBSD.org | Dirk Loss, Tobias Limmer, Alexander von Gernler | Article | 2009-09-20 | 2012-09-11 | details |
1308 | Security | Fuzzy Fingerprinting: Attacking Vulnerabilities in the Human Brain | 2012 Tech Refresh | 00:10:00 | The Hacker Choice | Plasmoid | Article | 2003-10-25 | 2012-09-11 | details |
1307 | Security | Interlock Protocol | 2012 Tech Refresh | 00:10:00 | Wikipedia.org | Article | 2012-04-26 | 2012-09-11 | details |
Records: 136 | Total time: 67:50:28 |
Return to main screen