Search for "sECuRE" returned 735 results

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

Lifting the Fog on Red Star OS
60 min

Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's…

Iridium Update
56 min

Iridium Update

more than just pagers

Hacking the World
26 min

Hacking the World

The struggle for security for all.

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

The Tor Network
62 min

The Tor Network

We're living in interesting times

Console Hacking 2016
53 min

Console Hacking 2016

PS4: PC Master Race

»Hard Drive Punch«
25 min

»Hard Drive Punch«

Destroying data as a performative act

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Advanced Hexagon Diag
66 min

Advanced Hexagon Diag

Harnessing diagnostics for baseband vulnerability research