Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
11,536 results
From small business to large enterprise, VOIP phones can be found on nearly every desk. But how secure are they? What if your ...
85,205 views
5 years ago
Input sanitization issues will always exist, although it's surprising at how we're still seeing amateur mistakes being made on ...
14,366 views
Friday, July 12, 2024: 1:00 pm (Tobin 201/202): Some people consider ham radio operators to be the original hackers. In this talk ...
563 views
2 months ago
You've seen plenty of talks on exploiting, escalating, and exfiltrating the magical world of Google Cloud (GCP), but what about its ...
7,198 views
3 years ago
An embarrassingly long time ago, Another Maker sent me a Sonoff Basic WIFI controlled switching module. Today I'm finally ...
10,582 views
Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...
1,489 views
2 years ago
Durant cette conférence, nous explorerons les faiblesses des systèmes de satellites et les méthodes pour les exploiter.
7,800 views
3 months ago
PULL OVER! No, it is a cardigan, but thanks for noticing! After getting a nasty speeding ticket, OG SecKC HA/KC/ER hevnsnt ...
647,700 views
20-30x more efficient than hot composing ? New method to heat up the house and greenhouse for free. Welcome to ...
15 views
10 hours ago
TrackingPoint is an Austin startup known for making precision-guided firearms. These firearms ship with a tightly integrated ...
9,946 views
9 years ago
This is a recording of Jonko's (project lead @haroohie) panel at Retro World Expo in August of 2023 in which he discusses ROM ...
2,819 views
1 year ago
Introduced in 2012, Secure Boot - the OG trust in boot - has become a foundational rock in modern computing and is used by ...
1,925 views
Bluetooth Low Energy (BLE) has seen widespread product adoption and a renewed interest from a security community whose ...
1,381 views
4 years ago
The Russia-Ukraine war has seen a lot of computer hacking, on both sides, by nations, haxor collectives, and random citizens, ...
53,028 views
In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...
1,071,670 views
BLE devices are now all the rage. What makes a purpose built tracking device like the AirTag all that different from the majority of ...
33,491 views
We take a scenic tour through the origins of the UK train ticket, from the original BR specification in the 1980s through to modern ...
3,362 views
In this talk, we will introduce the most comprehensive offensive VoIP security tool ever developed, Mr.SIP (comprehensive ...
6,041 views
Jonko explains how to get started with ROM hacking games for the purpose of translating them by recounting how he hacked the ...
15,787 views
We conducted a research to assess the current security of NFC payment readers that are present in most of the major ATM brands ...
112,527 views