Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
48,551 results
A demystification of the exploit development lifecycle There's a certain allure to zero-day exploits. At the apex of the security ...
36,138 views
5 years ago
A long way to a vibrant future With great pleasure comes great responsibility. A responsibility, which is not taken enough into ...
20,974 views
Hacking your network likes it's 1980 again We all know what FAX is, and for some strange reason most of us need to use it from ...
25,413 views
Up and to the right: All the statistics about this event you could wish for 35C3 is run by teams of volunteers. In this event, they will ...
5,227 views
Enabling students over example-driven teaching Teaching beginners how to program is often hard. We love building programs, ...
5,153 views
Explaining in detail just how those little COM files infected and played with us back in the day It is now 27 years since MS-DOS 5.0 ...
10,911 views
Voicemail systems can be compromised by leveraging old weaknesses and top of current technology. The impact goes way ...
4,201 views
The world is finally catching on to the urgency of deploying post-quantum cryptography: cryptography designed to survive attacks ...
8,082 views
An Artificial Intelligence Perspective on the Soul Artificial Intelligence gives us a uniquely fascinating and clear perspective at the ...
74,292 views
An explanation of Inter-Net and everyday protocols This Foundations talk explains the systems and protocols that make up the ...
4,266 views
Answers & practical guidelines for engineers. The last years, we all have felt the impact of applying technologies like machine ...
782 views
A way to fix lazy eye? We mostly see with the mind, and the mind is flexible. For the four hundred million people with amblyopia ...
3,755 views
Hacking the most secure handheld console Since its release in 2012, the PlayStation Vita has remained one of the most secure ...
17,308 views
The classic spy movie hacking sequence: The spy inserts a magic smart card provided by the agency technicians into the enemy's ...
8,865 views
Hardware implants in the supply-chain Hardware implants and supply chain attacks have been in the news recently, but how ...
39,983 views
TCP/IP basics TCP/IP is the most widely used protocol on the Internet for transmitting data. But how does it work in detail? This talk ...
4,981 views
From doodle to manufacture: how I make mechanically complicated PCBs. When a electrical device needs to be a piece of art or ...
4,005 views
UEFI rootkits have been researched and discussed heavily in the past few years, but sparse evidence has been presented of real ...
3,415 views
Why It's Both Better and Worse Than We can Imagine The Chinese Social Credit System (SCS) has been discussed a lot in ...
17,982 views
On art, AI, hormones hacking and other prospects of a post-human world What's been good, exciting, spooky and challenging in ...
1,593 views