Search for "LAC team" returned 725 results

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Methodisch inkorrekt!
113 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 33C3

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Infrastructure of a migratory bird
41 min

Infrastructure of a migratory bird

Technology and autonomy in more-than-human networks

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

SCADA StrangeLove 2
41 min

SCADA StrangeLove 2

We already know

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Surveilling the surveillers
53 min

Surveilling the surveillers

About military RF communication surveillance and other…

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online