Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
46,500 results
Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...
151,202 views
4 months ago
In December 2021, some ISPs in Russia started blocking Tor's website, along with protocol-level (DPI) and network-level (IP ...
78,348 views
3 years ago
Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...
293,035 views
1 year ago
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
16,245 views
2 years ago
SQL injections seem to be a solved problem; databases even have built-in support for prepared statements, leaving no room for ...
18,674 views
AI is transforming social engineering. Using tools like ChatGPT, Gemini, and Copilot, attackers can make phishing and vishing ...
63,552 views
What are the consequences if an adversary compromises the surveillance cameras of thousands of leading Western ...
20,947 views
5 months ago
For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...
191,100 views
Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...
131,972 views
Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ...
108,722 views
In 2018, a secure communications app called Anom started to gain popularity among organized criminals. Soon, top tier drug ...
1,706,814 views
Imagine your home modem as a loaded gun aimed at global security. Our research exposes critical vulnerabilities in ISP-supplied ...
21,286 views
The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly ...
504,102 views
Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept ...
726,708 views
How much more paranoid are you now than you were four years ago? Warrantless surveillance and large-scale data confiscation ...
528,162 views
10 years ago
On December 25th, 2021, I discovered that my modem had been hacked after a strange IP address replayed my traffic. I began ...
98,963 views
What if you could use Wireshark on the connection between your cellphone and the tower it's connected to? In this talk we present ...
40,072 views
Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ...
421,510 views
Have you ever wondered how those little boxes that you tap your card to open doors work? What are they reading on the card?
53,220 views
Bug bounty is an intricate game between the bug hunter, the clients, and the intermediary. Like any game, it can be hacked.
83,373 views