Search for "Wetter" returned 2428 results

No PoC? No Fix! - A sad Story about Bluetooth Security
43 min

No PoC? No Fix! - A sad Story about Bluetooth Security

It is just a broken memcpy in the Bluetooth stack. Do we…

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

Open Source Estrogen
58 min

Open Source Estrogen

From molecular colonization to molecular collaboration

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

The Mars Rover On-board Computer
43 min

The Mars Rover On-board Computer

How Curiosity's Onboard Computer works, and what you can…

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Structuring open hardware projects
33 min

Structuring open hardware projects

experiences from the “i3 Berlin” 3D printer project with…

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

The Ultimate Acorn Archimedes talk
58 min

The Ultimate Acorn Archimedes talk

Everything about the Archimedes computer (with zero…

HbbTV Security
45 min

HbbTV Security

OMG - my Smart TV got pr0wn3d

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

Are machines feminine?
60 min

Are machines feminine?

exploring the relations between design and perception of…

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

Hacking German Elections
63 min

Hacking German Elections

Insecure Electronic Vote Counting - How It Returned and Why…