Search for "Leah" returned 1493 results

A deep dive into the world of DOS viruses
38 min

A deep dive into the world of DOS viruses

Explaining in detail just how those little COM files…

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…

The Universe Is, Like, Seriously Huge
32 min

The Universe Is, Like, Seriously Huge

Stuff in Space Is Far Away – but How Do We Know?

Sysadmins of the world, unite!
31 min

Sysadmins of the world, unite!

a call to resistance

Iridium Update
56 min

Iridium Update

more than just pagers

Gone in 60 Milliseconds
33 min

Gone in 60 Milliseconds

Intrusion and Exfiltration in Server-less Architectures

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Fuzzing the phone in the iPhone
55 min

Fuzzing the phone in the iPhone

D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!