Search for "W. Heck" returned 1261 results
59 min
Election Cybersecurity Progress Report
Will the U.S. be ready for 2020?
46 min
Writing secure software
using my blog as example
57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
52 min
DNGerousLINK
A Deep Dive into WhatsApp 0-Click Exploits on iOS and…
44 min
So you're interested in social engineering?
The very first steps
42 min
NEW IMPORTANT INSTRUCTIONS
Real-world exploits and mitigations in Large Language Model…
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
61 min
Nintendo Hacking 2016
Game Over
61 min
DevOps but for artworks in museums
A look into pipelines ending in museums and not in the cloud
39 min
ID Cards in China: Your Worst Nightmare
In China Your ID Card Knows Everything
43 min
Tractors, Rockets and the Internet in Belarus
How belarusian authoritarian regime is using technologies…
47 min
Android DDI
Dynamic Dalvik Instrumentation of Android Applications and…
59 min