Threat Models Courses
0xdade via YouTube Your Security Tools Are Just a Stop-Gap to Secure DevOps
LASCON via YouTube The Sounds of the Phones - Dangers of Zero-Effort Second Factor Login Based on Ambient Audio
Association for Computing Machinery (ACM) via YouTube The Misuse of Android Unix Domain Sockets and Security Implications
Association for Computing Machinery (ACM) via YouTube Measuring Cybersecurity Effectiveness in a Threat-Based World
RSA Conference via YouTube How Geopolitical Change Affects Computer Security and Privacy for Vulnerable Populations
USENIX Enigma Conference via YouTube Horcrux Encrypted Messaging
media.ccc.de via YouTube More than Smart Speakers - Security and Privacy Perceptions of Smart Home Personal Assistants
USENIX via YouTube IoT Skimmer - Energy Market Manipulation through High-Wattage IoT Botnets
Black Hat via YouTube BadTunnel - How Do I Get Big Brother Power?
Black Hat via YouTube