Search for "sECuRE" returned 715 results

56 min
How not to use OAuth
New security recommendations for OAuth

62 min
Kyber and Post-Quantum Crypto
How does it work?

56 min
Semestertickets ohne Überwachung
How I reverse engineered your public transport app

58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…

61 min
Damn Vulnerable Chemical Process
Exploitation in a new media

60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…

42 min
Citzens or subjects? The battle to control our bodies, speech and communications
A call to action to defend our ePrivacy and eliminate…

41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs

46 min