Search for "ari" returned 5011 results

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Machine-to-machine (M2M) security
45 min

Machine-to-machine (M2M) security

When physical security depends on IT security

Imagine the Future of Money
77 min

Imagine the Future of Money

Economic transformations, hacker culture and why we should…

Zombie Apocalypse vs. International Health Regulations
42 min

Zombie Apocalypse vs. International Health Regulations

Introducing a very important piece of international law and…

Blackberry: call to arms, some provided
53 min

Blackberry: call to arms, some provided

Teach yourself upper management in 22 days

There's Gold in Them Circuit Boards
65 min

There's Gold in Them Circuit Boards

Why E-Waste Recycling Is Smart and How To Make It Smarter

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

SearchWing
45 min

SearchWing

Open source drones for Search & Rescue

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used