Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
11,357 results
From small business to large enterprise, VOIP phones can be found on nearly every desk. But how secure are they? What if your ...
78,250 views
4 years ago
You've seen plenty of talks on exploiting, escalating, and exfiltrating the magical world of Google Cloud (GCP), but what about its ...
6,976 views
2 years ago
You are interested in wireless hacking but have no idea where to start? In this talk you will learn about the current state of ...
6,408 views
3 years ago
Hello, my name is BWL-X8620, and I'm a SOHO router. For many years my fellow SOHO routers and I were victims of endless ...
36,049 views
1 year ago
The most profound change in radio technology in 100 years is happening now. Radios are transforming from the spaghetti of ...
18,841 views
Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems ...
169,065 views
7 years ago
In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...
1,067,590 views
The first critical component to any attack is an entry point. As we lock down firewalls and routers, it can be easy to overlook the ...
31,993 views
Useful tips on firmware reverse engineering I wish I had known earlier. Follow my journey of learning how to reverse engineer by ...
4,237 views
The Shadytel cabal had an unprecedented opportunity to legally uplink to and use a vacant transponder slot on a geostationary ...
2,589 views
We take a scenic tour through the origins of the UK train ticket, from the original BR specification in the 1980s through to modern ...
3,052 views
PULL OVER! No, it is a cardigan, but thanks for noticing! After getting a nasty speeding ticket, OG SecKC HA/KC/ER hevnsnt ...
603,847 views
An embarrassingly long time ago, Another Maker sent me a Sonoff Basic WIFI controlled switching module. Today I'm finally ...
9,390 views
Apple's AirTags enable tracking of personal belongings. They are the most recent and cheapest device interacting with the Apple ...
28,859 views
This presentation is based on a cautionary tale I often tell students in statistics classes. It is about malpractices such as p-hacking ...
1,127 views
The CAN bus is a traditional communication standard used (not only) in automotive to allow different components to talk to each ...
14,392 views
9 months ago
GNU poke is a new interactive editor for binary data. Not limited to editing basic entities such as bits and bytes, it provides a ...
1,888 views
With insecure low frequency RFID access control badges still in use at businesses around the world and high frequency NFC ...
21,317 views
8 years ago
Hacking SourceLair - Getting pygit2 to work.
578 views
5 years ago
In recent years, the use of internet-connected devices has become more prevalent in the healthcare sector, particularly as a ...
1,734 views