Search for "Matt Hardy" returned 231 results

47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide

60 min
osmo-gmr: What's up with sat-phones ?
Piecing together the missing bits

58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting

44 min
Replication Prohibited
3D printed key attacks

63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows

62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!

21 min
Nerds touching grass
Let’s start a bio-hackspace-revolution

60 min
Toniebox Reverse Engineering
Eine Musikbox für Kinder, Maker und Hacker

29 min
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
The untold story of what really happened, how it was…

57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics

55 min
3D Casting Aluminum
Too Much Fun with Microwaves

58 min
Operation Triangulation
What You Get When Attack iPhones of Researchers

66 min
31C3 Keynote
A New Dawn

25 min
Regulating Autonomous Weapons
The time travelling android isn’t even our biggest problem

55 min
SigOver + alpha
Signal overshadowing attack on LTE and its applications

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

40 min