Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Talks Articles [9]

  • Confessions of A Cyber Spy Hunter

    With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, a company that is developing stealth cyber security technology so... continue reading
  • Defcon 23 - Looping Surveillance Cameras

    Introduction This project consists of the hardware and software necessary to hijack wired network communications. The hardware allows an attacker to splice into live network cabling without ever breaking the physical connection. This allows the traffic on the line to be passively tapped and examined... continue reading
  • [TED] Hackers: the Internet's immune system

    In this video from 2014, cybersecurity expert Keren Elazari explains how hackers force the world to evolve and improve. If you've never seen it before, take time to watch this video. Of course it's well known from us, but it's always interesting to see things from a global point of view. http://ww... continue reading
  • [TED] GPS Spoofing

    I was just browsing through articles when I happened to find this one. In this video of TED, Todd Humphreys talks about the near-future of geolocation when millimeter-accurate GPS "dots" will enable you to find pin-point locations, index-search your physical possessions ... or to track peo... continue reading
  • Defcon 21 - The Secret Life of SIM Cards

    So guys while going through some videos tumbled upon this one. Its really informative covering the aspect of SIM exploitation which has many dimensions and is often neglected by us. It gives an insight about the working, communication creation of a SIM programm. Done with some really easy code(only ... continue reading