Hackers of CypherCon

  • :
  • : 52
  • : 2
  • Prime Video
  • Documentary

:

.

1
1x1
Hacking, Phreaking & Juvenile Delinquency
Episode overview
In a time when tinkering with technology was a guarantee for ridicule and torment, a small group of curious explorers were connecting to computer systems, traversing the telephone .. show full overview
1x2
Hacking a Better Tomorrow with Ben Heck
Episode overview
A self-taught hacker, modder and maker Benjamin Heckendorn - better known as Ben Heck is host of element14's The Ben Heck Show, a weekly web series in which Ben tackles fun and .. show full overview
1x3
Forensics When You're Broke with Phil Cochran
Episode overview
Exploring the forensic methodology and tasks using free open source software. We won't be focusing on what tools are available, the focus of the presentation is explaining the .. show full overview
1x4
Hack in the Day with Brad Swanson
Episode overview
This talk will be about hacking/phreaking in the late 1980's, early 1990's, and what the scene was like back then compared to today. What was considered cutting edge back then has either .. show full overview
1x5
Developer Friendly Cryptography with Brice Williams
Episode overview
Brice Williams will look at some common cryptography usage errors and why popular libraries often fall short. He will also discuss nuances such as backwards compatibility, FIPS 140-2 .. show full overview
1x6
Hacking Academia with Anita Nikolich
Episode overview
Anita will present some ideas about how three communities with different incentives, yet the same goals, can work together to shorten the time to discovery and overcome many of the obstacles that impeded progress in the sciences centuries earlier.
1x7
Attacking Wireless Devices Using SDR with Caleb Madrigal
Episode overview
In this talk, we'll be exploring how wireless communication works. We'll capture digital data live (with Software-Defined Radio [SDR]), and see how the actual bits are transmitted. From .. show full overview
1x8
SOAR: Operating at Attacker Speed with Brian Genz & Ben Zimmerman
Episode overview
Security Orchestration, Automation and Response (SOAR) enables defenders to operate at attacker speed by codifying detection and response expertise into automation playbooks. We will .. show full overview
1x9
When Developers Fail to Secure with David Bryan
Episode overview
David has found some pretty stupid security mistakes. Blatantly overlooked controls, or flat out lazy system admins. David will show real-world examples of misuse & abuse, and improper .. show full overview
1x10
What the Fungi? How to Grow Your Own Nootropics with Eric Zimmermann
Episode overview
Learn how mushrooms are medicinal and doing some amazing things like fighting cancer, boosting immunity, improving cognition, etc. In this presentation learn which compounds mushrooms .. show full overview
1x11
Text Mining: Reading Between the Lines with John Platais
Episode overview
"Read between the lines" usually refers to one's ability to infer hidden meaning from text. This talk will look at the tools and efforts needed for "Text Mining". Using data mining .. show full overview
1x12
SAEDY - Subversion & Espionage Directed Against You with Judy Towers
Episode overview
Espionage is the practice of secretly gathering information about a foreign government or a competing industry, with the objective of placing one's own government or corporation at a .. show full overview
1x13
The Arms Race with Ken Grigas
Episode overview
United States military veteran Ken Grigas talks about his time in service during the "Cold War" between the Unites States and U.S.S.R.
1x14
Alice in ICSLand with Lesley Carhart & Mark Stacey
Episode overview
The past decade has made it clear that threats of cyber attacks on Industrial Control Systems (ICS) is real, and poses a fundamental risk to our way of life. The demand of ICS security .. show full overview
1x15
How to "Theoretically" Kill a Continent with Michelle Meas
Episode overview
The human body is terrifyingly vulnerable. With the rise of novel gene-editing techniques and our increasing knowledge of genomics, we are forced to confront the idea of a microscopic .. show full overview
1x16
Embedding Security with Mike Kavka
Episode overview
Sequestered, cordoned off, separated, even out of touch. These words have been used by plenty of non-infosec folks. From Dev teams to Admins, Sales people and more, we get looked at as .. show full overview
1x17
Handshakes & Hashes, Plucking Passwords from Thin Air with Robert Reif and Shannon Fritz
Episode overview
New developments in Hashcat have brought some new WiFi attack techniques to light. We've taken concepts from classic WiFi attacks, added a little special sauce, and created a whole new .. show full overview
1x18
Hidden in Plain Sight, Steganography & Digital Watermarking with Ryan Fox
Episode overview
Steganography is the practice of hiding a message "in plain sight" inside an image, video, sound, text, or file. The practice goes back centuries, and in recent years has seen a rise in .. show full overview
1x19
An Interdisciplinary View of Risk, Applications for Security with Susan Lincke
Episode overview
In 2016, 791,820,040 data records were breached in the United States, which averages two breaches per American. France, Canada and Taiwan also encountered breaches above or near their .. show full overview
1x20
Hack Dumberly Not Smarterer with Tim Medin
Episode overview
Tim Medin discuss the dumbest red team tricks and hacks encountered over the years. We are going to take the A out of APT, because so few attackers really need to use advanced .. show full overview
1x21
Crypt-Oh No with Zach Grace
Episode overview
Even when the right crypto primitives are chosen, subtle programming mistakes can lead to issues with the efficacy of the encryption. This presentation is aimed at helping developers .. show full overview