Search for "Marek" returned 365 results

36 min
Apple's iPhone 15: Under the C
Hardware hacking tooling for the new iPhone generation

60 min
Inside the Fake Like Factories
How thousands of Facebook, You Tube and Instagram pages…

44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers

31 min
Make the Internet Neutral Again
Let's put the new EU Net Neutrality rules to work

17 min
c3 MorningShow
Tag 4

60 min
Beyond your cable modem
How not to do DOCSIS networks

53 min
Self-cannibalizing AI
Artistic Strategies to expose generative text-to-image…

48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…

38 min
Place & route on silicon
A gentle introduction to place & route algorithms for…

34 min
Ling - High level system programming
modular and precise resource management

60 min
HAL - The Open-Source Hardware Analyzer
A dive into the foundations of hardware reverse engineering…

44 min
So you're interested in social engineering?
The very first steps

26 min
Der 33 Jahrerückblick
Technology and Politics in Congress Talks, from 1984 to now

49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics

42 min