Home
Search results “Nsa crypto challenge android games”
GHIDRA | Reverse Engineering a PWN Challenge
 
01:29:48
Hang with our community on Discord! https://discord.gg/Kgtnfw4 If you would like to support me, please like, comment & subscribe, and check me out on Patreon: https://patreon.com/johnhammond010 E-mail: [email protected] PayPal: http://paypal.me/johnhammond010 GitHub: https://github.com/JohnHammond Site: http://www.johnhammond.org Twitter: https://twitter.com/_johnhammond
Views: 12361 John Hammond
Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
 
13:29
In this video we will look at reverse engineering and hacking the firmware encryption used on Moxa industrial control gateways using Ghidra. Links: Twitter: https://twitter.com/ghidraninja Moxa W2150A: https://www.moxa.com/en/products/industrial-edge-connectivity/serial-device-servers/wireless-device-servers/nport-w2150a-w2250a-series AES ECB: https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_(ECB)
Views: 7270 Ghidra Ninja
Living in the Shadow of the Shadow Brokers - SANS DFIR Summit 2018
 
31:20
Most people know the Shadow Brokers leaked (supposedly) stolen NSA cyber tools, which lead to some of the most significant cyber security incidents of 2017. But in addition to targeting NSA, the Shadow Brokers have also targeted a few individuals in our community. Hear about the history of the Shadow Brokers and the implications of their actions for infosec and DFIR from one of the group’s targets. Have something you absolutely wanted to know about this great spy vs. spy saga, but were afraid to ask? This is your chance! Jake Williams (@MalwareJake), Senior Instructor, SANS Institute When a complex cyber attack put a private equity investment of more than $700 million on hold, the stakes couldn't have been higher. But that's exactly the kind of challenge that motivates Jake Williams, a computer science and information security expert, U.S. Army veteran, certified SANS instructor and co-author of FOR526: Memory Forensics In-Depth and FOR578: Cyber Threat Intelligence. To help mitigate the attack, Jake plied his information security expertise, discovered that not one but three different attackers had compromised the firm's network, and went about countering their moves. Jake relishes the idea of meeting adversaries on the cyber battlefield. "I went into this field because I wanted a challenge," he says. "Infosec is like a game of chess to me. The attacker plays their moves and you play yours." Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer than 20 people annually. "I am immensely proud of the things I've accomplished," Jake says. "I'm positive the world is a safer place because of my work." Today, Jake runs a successful Infosec consultancy. He's been involved in high-profile public sector cases including the malware analysis for the 2015 cyber attack on the Ukraine power grid. He's also tackled a variety of cases in the private sector. In one, Jake discovered attackers compromising a custom service the client had distributed to all its endpoints. Leveraging experience and insight with advanced persistent threats helped Jake "think like the attacker" and determine the attacker's likely hiding spots.
Code-breaking for kids: Cryptoy app 'just PR move by GCHQ'
 
01:09
Welcome the Cryptoy. It's an app to teach children how to encrypt data. GCHQ has launched the app to encourage childern to engage in science. Investigative journalist Tony Gosling thinks the agency is trying to improve it's reputation that was severely undermined by Snowden's revelations. RT LIVE http://rt.com/on-air Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday Like us on Facebook http://www.facebook.com/RTnews Follow us on Twitter http://twitter.com/RT_com Follow us on Instagram http://instagram.com/rt Follow us on Google+ http://plus.google.com/+RT Listen to us on Soundcloud: https://soundcloud.com/rttv RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.
Views: 6444 RT
Hack All The Things: 20 Devices in 45 Minutes
 
48:50
When we heard Hack All The Things, we took it as a challenge. So at DEF CON this year we're doing exactly that, we're hacking everything. We've taken all of our previous experience exploiting embedded devices and used it to bring you a presentation filled with more exploits than ever before™. This presentation will feature exploits for over 20 devices including but not limited to TVs, baby monitors, media streamers, network cameras, home automation devices, and VoIP gateways. Gain root on your devices, run unsigned kernels; it's your hardware, it's internet connected, and it's horribly insecure. More info at: http://Exploitee.rs Follow us at: @Exploiteers
Views: 954461 The Exploiteers
Free Cryptocurrency Course: Learn Everything You Need to Know About Cryptocurrencies Today!
 
06:03:57
Want more? Enroll in the full course at: https://www.udemy.com/the-complete-cryptocurrency-course-more-than-5-courses-in-1/?couponCode=WB73018CCC Here are more details on the full 24 hour version of this Comprehensive COMPLETE Cryptocurrency Course! I guarantee that this is THE most thorough cryptocurrency course available ANYWHERE on the market - or your money back (30 day money back guarantee). This course and the many exercises in this course are for beginner or advanced users in any country! By an Award Winning MBA professor who is a top selling online business teacher, top selling author, former Goldman Sachs employee, Columbia MBA (finance major) and venture capitalist who has invested in and sat on the boards of cryptocurrency companies since 2013 and a hedge fund industry veteran and founder. He is also the author of the #1 best selling business course on Udemy. THIS COMPLETE CRYPTOCURRENCY COURSE is 5+ courses in 1! Cryptocurrency Investing Cryptocurrency Mining Cryptocurrency Wallets Cryptocurrency Exchanges Blockchain Creating a Diversified Portfolio & Much More! Also included in this course is a very comprehensive Excel spreadsheet that contains more than 30 Cryptocurrency exercises to help you learn everything you need to know about cryptocurrencies (whether you are a beginner or an advanced user). No prior cryptocurrency or finance or accounting or tech or Excel experience is required to take this course. We Will Cover More than 10 Cryptocurrencies in this Course (and how to buy & sell each one, what are the pros and cons of each one & how to mine each one): Bitcoin Ethereum Ripple Litecoin Monero Zcash Dash NEO Cardano Stellar ...and more (this course will constantly be updated with more cryptocurrencies) We Will Cover More than 5 Wallets in this Course (how to set one up, the pros & cons of all 5 wallet types and how to transfer money between them): QR Code Wallets Four USB Wallets (Trezor. Ledger Nano S, DigitalBitBox & KeepKey) Coinbase Electrum Blockchain ...and more (this course will constantly be updated with more wallets) We Will Cover the More than 5 Exchanges in this Course (how to transact with each one): GDAX Poloniex Kraken Bittrex Gemini Binance ...& more (this course will constantly be updated with more exchanges) Here Are Some More Topics That We Will Cover In This Course: The Future of Money & What is Blockchain? Introduction to 10+ Cryptocurrencies (Mining, Investing & Much More) Create an Investment Portfolio of Cryptocurrencies Understand What Makes a Great Cryptocurrency as A Great Long-Term Investment Introduction to 5+ Wallets to Use to Store Your Cryptocurrencies Introduction to 5+ Exchanges to Use to Buy or Sell Cryptocurrencies Introduction to Mining & Building a Mining PC from Scratch! Cryptocurrency Investment Framework (made in Excel) Watching out for Scams & Managing Risk What Are the Biggest Mistakes New Investors Make in Cryptocurrencies? How to Identify the Next Great Cryptocurrency (What to Look For & Watch Out For) When Should You Buy or Sell a Cryptocurrency? How Do You Read Charts & Look for Buy or Sell Signals What Makes a Great Wallet (What to Look For From Researching a Wallet) Introduction to ICOs + What Makes a Great ICO (What To Look For From Researching An ICO More than 100 Great Online Cryptocurrency Resources You can use the comprehensive Excel exercise document in this course on a Mac or on a PC (I recommend having Excel version 2013 or later in order to complete all of the cryptocurrency exercises in this course). This course and the included comprehensive Complete Cryptocurrency Excel dashboard exercise file is a roadmap for your personal & technical/finance cryptocurrency success. All of the tools you need to be successful with cryptocurrencies are included in this course & the entire course is based on real life Practical Knowledge and experience & not based on theory. Please click the take this course button so you can take your cryptocurrency skills to the next level. Requirements: No prior technology or cryptocurrency or finance or accounting or Excel experience is required to take this course. Please note that Excel 2013 (or a newer version) is recommended in order to complete some of the exercises in this course. The Excel exercises in this course work on the Windows and Mac versions of Excel. Who is the target audience? Anyone in ANY country interested in learning EVERYTHING about cryptocurrency can take this course as this 23+ hour COMPLETE course is 5+ courses in 1 (1: Investing, 2: Mining, 3: Wallets, 4: Blockchain , 5: Transacting, 6: Creating a Diversified Portfolio & Much More!) *** Again, I guarantee that this is THE most thorough cryptocurrency course available ANYWHERE on the market - or your money back (30 day money back guarantee). *** Enroll in the full course at: https://www.udemy.com/the-complete-cryptocurrency-course-more-than-5-courses-in-1/?couponCode=WB73018CCC Thanks, Chris Haroun
Earn Money from Data? Christian from OPIRIA Interview
 
25:16
Welcome to this sponsored interview with Christian from Opiria! The idea is that users can earn money from their data! We're discussing their project, team idea, challenges and technical solution. Write in the comments what you think about this project! https://opiria.io/static/docs/Opiria-PDATA-Whitepaper.pdf DISCLAIMER: This is NOT financial advice. This is just my opinions. I am not responsible for any investment decisions that you choose to make.
Views: 3577 Ivan on Tech
18. Private Browsing
 
01:20:13
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses privacy in the context of web browsers and web security. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 6695 MIT OpenCourseWare
DEF CON 22 - Dan Kaminsky - Secure Random by Default
 
01:38:53
Secure Random By Default Dan Kaminsky Chief Scientist, White Ops As a general rule in security, we have learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs -- insecure and default, and secure but obscure. Why not fix this? Why not make JavaScript and PHP and Java and Python and even libc rand() return strong entropy? What are the issues stopping us? Should we just shell back to /dev/urandom, or is there merit to userspace entropy gathering? How does fork() and virtualization impact the question? What of performance, and memory consumption, and headless machines? Turns out the above questions are not actually rhetorical. Just because a change might be a good idea doesn't mean it's a simple one. This will be a deep dive, but one that I believe will actually yield a fix for the repeated *real world* failures of random number generation systems. Dan Kaminsky has been a noted security researcher for over a decade, and has spent his career advising Fortune 500 companies such as Cisco, Avaya, and Microsoft.Dan spent three years working with Microsoft on their Vista, Server 2008, and Windows 7 releases. Dan is best known for his work finding a critical flaw in the Internet’s Domain Name System (DNS), and for leading what became the largest synchronized fix to the Internet’s infrastructure of all time. Of the seven Recovery Key Shareholders who possess the ability to restore the DNS root keys, Dan is the American representative. Dan is presently developing systems to reduce the cost and complexity of securing critical infrastructure.
Views: 45913 DEFCONConference
Best 4K TVs of 2018! Defcon 26: Hotel Room Searches, Voting Machines Hacked! Stop Google Tracking!
 
29:08
Stop Google Tracking Your Phone! Defcon 26: Voting Machines Hacked, New Hotel Room Searches in Vegas, Best TVs of 2018. ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆ 00:55 Vegas Now Searches Hotel Rooms Do you travel in Vegas? There are new security policies at many hotels, that, to quote ArsTechnica, “mandated room searches when staff had not had access to rooms for over 24 hours.“ It was scary. https://arstechnica.com/tech-policy/2018/08/security-theater-meets-def-con-as-room-searches-spark-controversy/ 06:12 Defcon 26: Lots of Security Flaws Announced Millions of Android devices have flaws baked into the firmware that allow for potential exploits, such as someone listening to your microphone, take screenshots, or locking your device. Medtronic fixed flaws in some of their pacemakers, but attackers can still remotely attack other models. If your company uses Apple's Device Enrollment Program (or Mobile Device Management), you want to run High Sierra 10.13.6 or higher, Trend Micro found two dozen vulnerabilities in Crestron devices, flaws in Square, SumUp, iZettle, and Paypal mobile credit card readers were publicized by Positive Technologies, they're pretty serious and vendors are working on them. https://www.wired.com/story/android-smartphones-vulnerable-out-of-the-box/ https://www.wired.com/story/pacemaker-hack-malware-black-hat/ https://www.wired.com/story/mac-remote-hack-wifi-enterprise/ https://www.wired.com/story/crestron-touchscreens-could-spy-on-hotel-rooms-and-meetings/ https://www.wired.com/story/bugs-in-mobile-credit-card-readers-could-leave-buyers-exposed/ 11:17 Defcon 26: Voting Machine Village One team cracked a voting machine in under 15 minutes. In another hack, an 11 year old was able to change election results on a replica website in under 10 minutes. Scared? Find out what the Association of Secretaries of State said in the video. https://www.cnet.com/news/us-officials-hope-hackers-at-defcon-find-more-voting-machine-problems/ http://time.com/5366171/11-year-old-hacked-into-us-voting-system-10-minutes/ 13:51 Should I Buy This 4K TV??? Kris emailed, "Thought I'd ping you for your sage TV wisdom and advice. Any reason not to buy the LG 65 C8 for $2800?" Nope.... LG's C8 is pretty impressive (though not a huge leap over some other OLED models, we explain in the video, and discuss the best deal 4K UHD HDR TVs you can buy: TCL's 55" and 65" 6 series! https://amzn.to/2OGRHa9 https://amzn.to/2OGRrrB 17:46 Google Tracks You Like It Or Not The AP reported earlier this week that, yes, Google tracks you even if you turn off location history. Or, in their words, "many Google services on Android devices and iPhones store your location data even if you’ve used a privacy setting that says it will prevent Google from doing so." We walk you through turning it off in the video! https://www.apnews.com/828aefab64d4411bac257a07c1af0ecb/AP-Exclusive:-Google-tracks-your-movements,-like-it-or-not 22:08 Google Backup Codes If you have 2FA on your gmail account… make sure you have backup codes somewhere you can get to them if you lose or destroy your phone. You can pick up a cheap phone just about anywhere, but getting locked out of email sucks! https://support.google.com/accounts/answer/1187538?co=GENIE.Platform%3DDesktop&hl=en 24:15 Hak5!!! A big Thank You to Hak5 for the studio space! Check out the security and privacy podcasts at hak5.org, then check out the superior pentesting and USB automation tools over at hak5.org/gear! hak5.org 24:50 Do Something Analog Like Build A Pair of Headphones!!! Props to Patrick's friends Nick and Jude, who noticed that most gaming headsets kinda suck then starting building their own... deets in the video, head over to Vokyl.io to sign up for info about the Indiegogo! https://vokyl.io/sd/ ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆ Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn't be able to make the show for you every week! https://www.patreon.com/tekthing EMAIL US! ➳ [email protected] SUPPORT: Amazon Associates ➳ https://amzn.to/2pHgf8T Subscribe ➳ https://www.youtube.com/tekthing Website ➳ http://www.tekthing.com RSS ➳ http://feeds.feedburner.com/tekthing Patreon ➳ https://www.patreon.com/tekthing Help us with translations! ➳ http://www.youtube.com/timedtext_cs_panel?c=UC6sWaC11f4mxnizvOroOvkQ&tab=2 THANKS! HakShop ➳ https://hakshop.myshopify.com/ Dale Chase Music ➳ http://www.dalechase.com/ SOCIAL IT UP! Twitter ➳ https://twitter.com/tekthing Facebook ➳ https://www.facebook.com/TekThing Reddit ➳ https://www.reddit.com/r/tekthingers HOSTS: Shannon Morse ➳ https://www.twitter.com/snubs / https://www.youtube.com/shannonmorse Patrick Norton ➳ https://www.twitter.com/patricknorton ☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆☆
Views: 14621 TekThing
Rapid Ransomware | Realtime Encryption
 
02:46
Rapid Ransomware which began attacks in early January continues to encrypt your data in realtime even after completing its initial cycle of destruction. ------------------------------------------- Thanks for watching! If you like what you see, check out the links below. Patreon: https://www.patreon.com/tpsc Forum: https://forum.thepcsecuritychannel.com/ Twitter: https://twitter.com/leotpsc Facebook: https://www.facebook.com/tpscyt
CICADA  3301 2019 - hardest puzzle on the internet
 
05:14
Hey this is Rudy this video is about 2019 cicada 3 3 0 1 puzzle. For those who don't know about cicada 3 3 0 1 First let’s see what is cicada 3 3 0 1. Cicada 3 3 0 1 is a name given to an enigmatic organization that on several occasions has posted a set of puzzles to recruit highly intelligent individuals from the public. On 4th of January 2012 users browsing 4chan were greeted with a mysterious image, unlike much else really seen on that board. That says hello. We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in this image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few that will make it all the way through. Good luck 3 3 0 1. This image made internet crazy and this was the beginning of the most mysterious puzzle on the Internet. Solving a level leads to another level and it continues. Nobody knows what happens to the winners and no one knows who's behind this game, those who won the game disappeared from the internet this makes the puzzle a mystery. Some theory came up that 3 3 0 1 is an intelligence agency like CIA, MI6 or NSA or Alternate reality game, and some suggest that Cicada 3 3 0 1 is a group who is behind several internet anonymity software including Bitcoin. Initially it was thought that someone sitting in their home can be behind this puzzle and the whole thing is nothing more than a joke, but in a round participants are given with a set of co-ordinate that they have to find posters situated in those co-ordinates spreader across the globe, and this made it clear that 3 3 0 1 is an organization that is widely spread around the globe. The puzzles are focused primary on cryptography and also stenography, data security, literature, and music. After a few months, The following message was posted in a subreddit which was used in a stage. It read, Hello. We have now found the individuals we sought. Thus our month-long journey ends. For now. Thank you for your dedication and effort. If you were unable to complete the test or did not receive an email, do not despair. There will be more opportunities like this one. Thank you all. 3 3 0 1. A second puzzle began one year later on January 5, 2013, by posting an image similar to the first one on 4chan and through several stages the second puzzle ended in March 2013, But this time it didn't end with an official statement. And third round on Twitter on January 6, 2014. on a twitter account that was used while the 2013 puzzle and 2014 puzzle doesn’t have any known ending. There was no game in 2015 and In 2016 the twitter account used by cicada during 2014 tweeted a hint says to focus on ‘Liber Primus‘ which is a set of images found during 2014 puzzle. Everybody waited for a new game in 2017, but disappointingly there was no new game on 2017 January, but a message was found on 4th April 2017 on Pastebin says that “Beware false paths. Always verify PGP signature from 7A35090F” means beware of fake game, always verify the PGP signature of cicada. And there was no sign of cicada in 2018 other than a lot of fake games with no PGP signature. Let's see what is going to happen this year. 3 3 0 1 has a regular pattern I will be looking for the similar pattern and PGP signature, there is an online web app which can be used to identify the PGP signature is real 3 3 0 1 or not, I found these puzzles but all of them are fake. till this video is uploaded no puzzle with cicada’s PGP key was found, there is a lot of fake puzzles. Remember: Trust nothing, Verify everything!, I will update this video if there was an update. Keywords cicada 3301 music, cicada 3301 video, cicada 3301 song, cicada 3301, cicada 3301 solved 2016, cicada 3301 top 5, cicada 3301 conspiracy, cicada 3301 update, cicada 3301 voce sabia, cicada 3301 solved, cicada 3301 all clues, cicada 3301 anonymous, cicada 3301 april 2017, cicada this year, cicada 2018, cicada 2019, cicada 3301 explained, cicada puzzle 2019, 3301 2018, Bitcoin, Satoshi nakanoto,
Views: 5839 RUDY Labs
NSA Shares Americans' Data with Israel
 
05:22
The NSA "routinely" shares Americans' data with Israel, reports say... This clip from the Majority Report, live M-F at 12 noon EST and via daily podcast at http://Majority.FM Subscribe to us on YouTube: http://youtube.com/user/SamSeder
Twitter Joins Censorship Partners FB & Google - Time to Roll Our Own - Yen.io!
 
05:18
🚀 Get the Apps! ★ http://cryptoyum.com ★ http://coinpuffs.com 10 Days of Bitcoin: 💯 Free Email Course! ★ http://10daysofbitcoin.com Twitter is joining the censorship party, just like Facebook and Google. // GET STARTED 🚀 Become a Cryptonaut - Support us on http://patreon.com/pub 💻 Join us at the PUB! - http://thebitcoin.pub 💰Get a Coinbase Wallet! - http://dctv.co/dctv-coinbase - Sign up! // WE DO SOCIAL 🔑 Decentralized Newsletter - https://dctv.co/dctv-news 📔 Twitter - https://dctv.co/dctv-twitter 📔 Facebook - https://dctv.co/dctv-fb 🔑 Instagram - https://dctv.co/dctv-instagram 💻 Google+ - https://dctv.co/dctv-googleplus ✏️ LinkedIn - https://dctv.co/dctv-linkedin 💻 Medium - https://dctv.co/dctv-medium Music by Charles Giovanniello, a Bitcoin Pub community member! Note: This is not financial advice as all investing is speculative. Have fun and good luck!
Views: 3617 Decentralized TV
Encrypt your entire hard drive! - Hak5
 
26:51
What's your best defense against a boot CD that breaks Windows passwords in two keystrokes? Encrypting your entire hard disk. Shannon's got the details on truecrypt drive encryption while Darren brings up plausible deniability with hidden volumes. -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~-
Views: 43888 Hak5
The Original Grumpy Cat!
 
00:56
http://grumpycats.com http://twitter.com/realgrumpycat http://facebook.com/theofficialgrumpycat http://instagram.com/realgrumpycat http://tumblr.com/realgrumpycat
Views: 21492781 Real Grumpy Cat
Cryptocurrencies  Oversight of New Assets in the Digital Age
 
02:01:54
Public Hearing: Cryptocurrencies Oversight of New Assets in the Digital Age Wednesday, July 18, 2018 – 10:00 a.m. 1300 Longworth House Office Building Washington, D.C. Full Committee – Public Hearing RE: Cryptocurrencies: Oversight of New Assets in the Digital Age
Views: 5020 Joey Rocket Cryptos
Password Hash Cracking at DEFCON 22
 
01:31
Hackaday built a hat for DEFCON 22 that was itself a game. Inside is hidden a WiFi router that invites you to hack in, leave your alias for the scoreboard, and push your own message to the hat. This is the only person who managed to do so during the course of the weekend. Read the entire article: http://hackaday.com/2014/08/21/hat-hash-hacking-at-defcon/
Views: 9131 HACKADAY
Will This Trick Your Brain? (Color TEST)
 
03:39
Your eyes and brain are pretty amazing! Watch ART vs SCIENCE: https://youtu.be/6Z37JA-wmgQ Subscribe: http://bit.ly/asapsci Written by Rachel Salt, Gregory Brown and Mitchell Moffit GET THE ASAPSCIENCE BOOK: http://asapscience.com/book/ FOLLOW US! Instagram and Twitter: @whalewatchmeplz and @mitchellmoffit Clickable: http://bit.ly/16F1jeC and http://bit.ly/15J7ube AsapINSTAGRAM: https://instagram.com/asapscience/ Facebook: http://facebook.com/AsapSCIENCE Twitter: http://twitter.com/AsapSCIENCE Tumblr: http://asapscience.tumblr.com Vine: Search "AsapSCIENCE" on vine! SNAPCHAT 'whalewatchmeplz' and 'pixelmitch' Created by Mitchell Moffit (twitter @mitchellmoffit) and Gregory Brown (twitter @whalewatchmeplz). Send us stuff! ASAPSCIENCE INC. P.O. Box 93, Toronto P Toronto, ON, M5S2S6 Further Reading: Number of discernible colors for color-deficient observers estimated from the MacAdam limits https://www.osapublishing.org/josaa/abstract.cfm?uri=josaa-27-10-2106 Afterimage of Perceptually Filled-in Surface http://www.cns.atr.jp/~kmtn/pdf/ssyksnScience01.pdf The primary visual cortex fills in color http://www.pnas.org/content/101/52/18251.full Microsaccades: Small steps on a long way http://www.sciencedirect.com/science/article/pii/S0042698909003691 Molecular Genetics of Human Color Vision: The Genes Encoding Blue, Green, and Red Pigments http://www.blueconemonochromacy.org/wp-content/uploads/2011/03/Science-1986-Nathans-193-202.pdf Comparing levels of crosstalk with red/cyan, blue/yellow, and green/magenta anaglyph 3D glasses http://cmst.curtin.edu.au/wp-content/uploads/sites/4/2016/05/2010-11.pdf Spooky Science: Discovering the Eerie Colors behind Afterimages http://www.scientificamerican.com/article/bring-science-home-afterimages/ Plants and colour: Flowers and pollination http://www.sciencedirect.com/science/article/pii/S0030399208002442 The influence of pigmentation patterning on bumblebee foraging from flowers of Antirrhinum majus. http://www.ncbi.nlm.nih.gov/pubmed/23420080 Why Are So Many Bird Flowers Red? http://www.ncbi.nlm.nih.gov/pmc/articles/PMC521733/ Mighty Mutualisms: The Nature of Plant-pollinator Interactions http://www.nature.com/scitable/knowledge/library/mighty-mutualisms-the-nature-of-plant-pollinator-13235427 The number of known plants species in the world and its annual increase http://www.biotaxa.org/Phytotaxa/article/view/phytotaxa.261.3.1
Views: 4929646 AsapSCIENCE
DEFCON 20: DDoS Black and White "Kungfu" Revealed
 
58:42
Speakers: ANTHONY "DARKFLOYD" LAI SECURITY RESEARCHER, VALKYRIE-X SECURITY RESEARCH GROUP (VXRL) TONY "MT" MIU RESEARCHER, VXRL KELVIN "CAPTAIN" WONG RESEARCHER, VXRL ALAN "AVENIR" CHUNG RESEARCHER, VXRL Enterprises currently dump millions of bucks to defense against DDoS, some trading firms here are paying for fear to the DDoS attack from China about 5K to 100K USD per day and InfoSec teams believe their solutions are perfect already. Are those controls effective and unbreakable? In the first part of the presentation, we would like to show our studies and carry out over 10 types of DDoS test against various big firms and organizations to see whether their defense is effective, showing how stupid and smart they are. Various interesting case studies will be briefed :) In the second part of the presentation, we will detail our proposed defense model to against Application-Level attacks. We have already checked with other vendors and researchers about our model, it is still not yet deployed and hopefully we could put this as an open source project in the future. Hopefully, you will enjoy this fun session with us and learn whether your organization could survive even under DDoS attack. For more information visit: http://bit.ly/defcon20_information To download the video visit: http://bit.ly/defcon20_videos Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Views: 5944 Christiaan008
Breaking Codes and Finding Patterns - Susan Holmes
 
01:09:36
In her Mathematics Research Center Public Lecture, “Breaking Codes and Finding Patterns,” Professor Susan Holmes will discuss what we can learn from the master codebreakers who solved the intricacies of the Enigma encryption machine during World War II and how to leverage patterns using mathematics and statistics.
Views: 7841 Stanford
DEF CON 26 - The Tarquin - Weaponizing Unicode Homographs Beyond IDNs
 
45:41
Most people are familiar with homograph attacks due to phishing or other attack campaigns using Internationalized Domain Names with look-alike characters. But homograph attacks exist against wide variety of systems that have gotten far less attention. This talk discusses the use of homographs to attack machine learning systems, to submit malicious software patches, and to craft cryptographic canary traps and leak repudiation mechanisms. It then introduces a generalized defense strategy that should work against homograph attacks in any context.
Views: 1140 DEFCONConference
John McAfee Bitcoin vs Cryptocurrencies, Security threats are imminent
 
14:32
John McAfee says his new security product is a 'f---ing game changer' john mcafee net worth john mcafee bitcoin john mcafee movie john mcafee wife john mcafee 2017 john mcafee twitter john mcafee bitcoin quote john mcafee sentinel john mcafee house john mcafee phone john mcafee john mcafee author john mcafee apps john mcafee autobiography john mcafee android app john mcafee siteadvisor john mcafee bitcoin price john mcafee brownlist john mcafee bitcoin mining john mcafee blockchain john mcafee birthday john mcafee bitcoin youtube john mcafee coin john mcafee company john mcafee cell phone john mcafee crypto john mcafee cognizant john mcafee documentary gringo john mcafee documentary trailer john mcafee dateline john mcafee debate john mcafee dimon john mcafee documentary stream john mcafee d central john mcafee ethereum john mcafee email john mcafee ethereum price john mcafee ether john mcafee e apple john mcafee funny john mcafee family john mcafee first wife john mcafee for president 2016 john mcafee gif john mcafee gringo stream john mcafee how to uninstall john mcafee height john mcafee hardware wallet john mcafee house ambergris caye john mcafee india john mcafee images john mcafee interview bitcoin john mcafee intel john mcafee in romania is john mcafee dead web bot report web bot report june 2017 webbot webbot 2017 predictions webbot alta report webbot clif high 2017 webbot ethereum
Views: 52 CryptoTweak
Security Holes In App Stores: Latest In NSA Spying Saga
 
01:54
New reports on the leaked NSA documents claim the agency exploited security flaws in mobile app stores instead of publicizing the vulnerabilities. Follow Kate Grumke: http://www.twitter.com/kgrumke See more at http://www.newsy.com Transcript: Yet another NSA program detailed in documents leaked by Edward Snowden is making headlines today. The NSA, along with spy agencies from several other countries, reportedly developed a plan to exploit weaknesses in several app stores to collect data on suspected terrorists. New documents published by CBC and The Intercept Wednesday detail a program dubbed "Irritant Horn," a combined effort from the U.S., Canada, U.K., New Zealand and Australia. The program targeted vulnerabilities in UC Browser, an incredibly popular app in China and India run by e-commerce giant Alibaba. It also sought ways to access information through Google and Samsung's servers. It doesn't appear the companies were informed of the weaknesses, which left open the possibility for hackers and criminals to exploit the same vulnerabilities, as well as other government agencies. It appears the program began after vulnerabilities in UC Browser were discovered in 2011. The documents detail what's called a "man-in-the-middle" attack to collect data and even plant spyware on some smartphones. It's a method sometimes used by hackers to commit fraud. The NSA has been accused of letting security vulnerabilities go unchecked in the past. Bloomberg published a report last year that accused the agency of knowing about the infamous "Heartbleed" security vulnerability for two years and exploiting it. For its part, the government denied that report, and the director of National Intelligence later released a statement saying, when a weakness is discovered, "it is in the national interest to responsibly disclose the vulnerability." But it did include the caveat "unless there is a clear national security or law enforcement need." A source from Alibaba told CBC the company was never contacted by any of the agencies involved about UC Browser's vulnerability and said it wasn't aware any user data had been leaked. This video includes images from Getty Images. Sources: Getty Images http://www.gettyimages.com/detail/news-photo/navy-admiral-michael-rogers-commander-of-the-u-s-cyber-news-photo/466108154 Getty Images http://www.gettyimages.com/detail/news-photo/in-this-handout-photo-provided-by-the-guardian-edward-news-photo/170248179 The Intercept https://firstlook.org/theintercept/2015/05/21/nsa-five-eyes-google-samsung-app-stores-spyware/ CBC http://www.cbc.ca/news/canada/spy-agencies-target-mobile-phones-app-stores-to-implant-spyware-1.3076546 Getty Images http://www.gettyimages.com/detail/news-photo/participant-looks-at-lines-of-code-on-a-laptop-on-the-first-news-photo/136135707 Bloomberg http://www.bloomberg.com/news/articles/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers Getty Images http://www.gettyimages.com/detail/news-photo/director-of-national-intelligence-james-clapper-speaks-at-news-photo/464967098 Office of the Director of National Intelligence http://icontherecord.tumblr.com/post/82416436703/statement-on-bloomberg-news-story-that-nsa-knew Alibaba https://www.youtube.com/watch?t=21&v=X9eToqxqz7Y Image via: Getty Images / Chip Somodevilla http://www.gettyimages.com
Views: 533 Newsy Tech
Black Hat Asia 2014 - Keynote by Dr. Steve Crocker
 
52:32
By: Dr. Steve Crocker Forty-five years ago the Arpanet came into existence, connecting computers with permanent, leased lines. Within a few years multiple networks were interconnected to form today's Internet. Billions of users, trillions of dollars of commerce and a new "flat" world emerged. Two of the less attractive consequences of the explosive growth were the myriad security problems and the wrangling over Internet governance issues. Dr. Crocker will talk a bit about the early history, particularly the creation of the Requests for Comments and the positive impact the open approach had on technology development, and then focus on current activities, both positive and negative. Security technologies such as DNSSEC and rPKI hold some promise of improving the game, but they are but a small sample of what needs to be done. Meanwhile, a variety of policy issues permeate the security arena. He'll also talk briefly about ICANN, what it does, and, perhaps more important, what it doesn't do. Dr. Crocker will close with a challenge to the Black Hat community.
Views: 1815 Black Hat
DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers
 
50:57
EFF's Apollo 1201 project is a 10-year mission to abolish all DRM, everywhere in the world, within a decade. We're working with security researchers to challenge the viability of the dread DMCA, a law that threatens you with jail time and fines when you do your job: discover and disclosing defects in systems that we rely on for life and limb. Speaker Bio: Cory Doctorow (craphound.com) is a science fiction author, activist, journalist and blogger — the co-editor of Boing Boing (boingboing.net) and the author of the YA graphic novel IN REAL LIFE, the nonfiction business book INFORMATION DOESN’T WANT TO BE FREE and young adult novels like HOMELAND, PIRATE CINEMA and LITTLE BROTHER and novels for adults like RAPTURE OF THE NERDS and MAKERS. He works for the Electronic Frontier Foundation and co-founded the UK Open Rights Group. Born in Toronto, Canada, he now lives in London.
Views: 21712 DEFCONConference
Cryptocurve - Enhancing the User Experience
 
09:46
👇Business Inquiries [email protected] 👉Cryptocurve https://cryptocurve.io/ is a new digital asset that plans to offer a one-stop-shop to any cryptocurrency investor. It is not the only asset trying to do something similar, bringing a new user-interface that has a multitude of capabilities. Fronted by an all-star core team I am personally interested in using this application and it seems they are only after the very serious investors with a 100 ether minimum (as far as I can see). Still, as with most other assets it looks really good. Time will tell how successful their funding campaign will be and what features get released and when - it is still very early in development. If you'd like to stay updated with Cryptocurve make sure to check out their twitter and follow any other social media platforms they use! https://twitter.com/crypto_curve Previously on CRC: European Parliament went on record today (July 3rd) generally speaking positively yet realistically about cryptocurrencies and digital assets. The positivity is surrounding their statements that blockchain technology deserves widespread recognition for the inherent benefits it brings. The realistic part is saying that cryptocurrencies fall short of replacing traditional systems (I.E FIAT!!!) due to a number of reasons (key one being volatility). In short: Do not underestimate the power this market has to revolutionize a variety of different industries, funneling big data into useful tools while increasing speed, transparency, and efficiency like nothing before it. Bitcoin (BTC) fell below $6k and $5,800 was bottom. Facts. Bitcoin (BTC) pumps beyond $6k, stable @ $6,300. Facts SEC is fully engaged in crypto. FALSE Coinbase Custody will bring $10bn of Institutional Investment. FALSE - Purely Speculative RUMOR All we can do is wait, watch, and hope & pray. Please pray, it'll make a difference :) No one knows the future, all we can do is monitor the markets. So Stay Tuned! As for the rest of the markets, earlier this week I covered: Many top analysts are talking big numbers for Bitcoins (BTC) future, while some (very few) are making the argument for a lower low from the major $6k support level we are pretty much at. The longterm fundamentals are great, but those aside Bitcoin (BTC) is seriously running the risk of bottoming out in the coming weeks. Who really knows, comment your predictions and I'll shout out someone who predicts it right in a few weeks, give a date and a price and whoever is the closest I will personally highlight it in a video :) Could Cardano (ADA) hit $1.00? Could Tron (TRX) hit $0.25? Time will tell... When will the bull run everyone's been talking about since February happen? This Year? Many Hardcore Cryptocurrency investors believe in the longevity of this market, believe that through all the ups and downs in the market, despite what the mainstream media says, and regardless of how controversial it may be, that cryptocurrency and blockchain technology are the change society has been yearning for. Recently the SEC has ruled that Bitcoin and Ethereum are not securities, and it got many discussing the rest of the cryptocurrency market and what is a security. Along with Ripple and XRP's continued distinction, and Ripple now having an executive on a Task Force for the Federal Reserve it's really looking promising for Brad Garlinghouse et al. What does that mean for XRP though? Comment below and let us know... As well as when you think another bubble will occur, or a bitcoin (BTC) trend reversal will happen, or when a cryptocurrency trend reversal will happen! 💥Thanks for watching!💥 We provide regular and up to date trending Cryptocurrency news, Bitcoin (BTC) price analysis as well as trending cryptocurrency price analysis and developments in a wide range of financial technologies. Financial technology (FinTech or fintech) is a new technology and innovation that aims to compete with traditional financial methods in the delivery of financial services; using technology to improve activities in finance. The use of smartphones for mobile banking, investing services and cryptocurrency are examples of technologies aiming to make financial services more accessible to the general public. Financial technology companies consist of both startups and established financial and technology companies trying to replace or enhance the usage of financial services provided by existing financial companies. Have a topic you would like us to cover? Let us know in the comments! 🤑GIVEAWAY RULES 1. Subscribe + Bell Notifications 2. SMASH that Like 3. Comment something of value. Also leave your bitcoin address with the comment. *WINNER WILL BE RANDOMLY SELECTED, AND SENT THE FUNDS. WE VERIFY THAT ALL RULES HAVE BEEN FOLLOWED. *
Views: 2330 Crypto Review Central
50 cent don't have bitcoin?! The IRS is really coming for your bitcoin! Satoshi Nakamoto is real?
 
12:25
50 cent don't have bitcoin?! The IRS is really coming for your bitcoin! Satoshi Nakamoto is real? #SgtCrypto #letsgetthiscrypto #cryptowarriors Referral Links Coinbase get $10 free when you purchase $100 of cryptocurrency: https://www.coinbase.com/join/59e8c58660bf4b02422ce4fb Buy Alt Coins Binance: https://www.binance.com/?ref=15803763 HitBTC: https://hitbtc.com/?ref_id=5a3f2b7226852 Cryptopia: https://www.cryptopia.co.nz/Register?referrer=sgtcrypto99 Bittrex: https://bittrex.com YoBits: https://yobit.io/?bonus=OOHNZ Kucoin: https://www.kucoin.com/#/?r=7Pa7H3 Robinhood app https://robinhood.com/referral/marlons17/?_branch_match_id=485467338030708353 Cloud Mining Genesis mining get 3% off any mining packages use code 02sEe9 at the checkout: https://www.genesis-mining.com Hashflare mining: https://hashflare.io/r/A056F9C9 Hardware wallet Trezor: https://shop.trezor.io?a=7c0399d6a181 Social Media Twitter: @Sgtcrypto99 https://twitter.com/sgtcrypto99 Steemit: https://steemit.com/@sgtcrypto Donate to help the channel grow Donate BTC: 1G9AL6oLvN8uVh7ockMXWXWeAqasRoXKFR Donate ETH: 0x18d6aF4C2c5d5a4c275439C3E608620B02da4cde Donate LTC: LYbh2ZpkS4ehYz9TdBET1QTj8TjWgSRUwM Donate BCH: 1M3CHWjCBWRFtme8vuNruywUvYu5JyAmku Donate XRP: rNKrG7NbLsiAuyBdF6Vhe7c6e7Xa1T7CAM Free Bitcoin Free Litecoin Free Ethereum Free Altcoin Bitcoin Bitcoin Scam Bitcoin Trading Bitcoin Tutorial Bitcoin Wallet Bitcoin Wealth Coinbase Coinbase Scam Coinbase Trading Coinbase Tutorial Coinbase Wallet Coinbase Wealth Cryptocurrency Cryptocurrency Scam Cryptocurrency Trading Cryptocurrency Tutorial Cryptocurrency Wallet Cryptocurrency Wealth Exodus Exodus Wallet Gdax Gdax Scam Gdax Trading Gdax Tutorial Gdax Wallet Gdax Wealth Genesis Genesis Mining Genesis Scam Genesis Tutorial Genesis Wallet Hashflare Hashflare Scam Hashflare Mining Hashflare Tutorial Hashflare Wallet Trezor Wallet
Views: 47 Sgt. Crypto
‘NSA can’t keep its secrets forever’ – hacking expert to RT
 
03:59
According to a recent release by Wikileaks, the NSA has been spying on 125 German officials. Hacking expert Dirk Engling shares his thoughts. RT LIVE http://rt.com/on-air Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday Like us on Facebook http://www.facebook.com/RTnews Follow us on Twitter http://twitter.com/RT_com Follow us on Instagram http://instagram.com/rt Follow us on Google+ http://plus.google.com/+RT Listen to us on Soundcloud: https://soundcloud.com/rttv RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.
Views: 16596 RT
Cory Doctorow: The Fight for a Free, Fair and Open Internet | Bioneers 2017
 
28:19
According to journalist, blogger, “creative commons” advocate, Electronic Frontier Foundation Fellow, and award-winning science fiction author Cory Doctorow, the fight for a free, fair and open Internet isn’t the most important fight on the planet, but you can’t win any of the other major battles without it. Although the Net is the nervous system of the 21st century, so far we have misunderstood and mismanaged it and made it susceptible to capture by the powerful and corrupt. Cory will share his strategies to reclaim the global lifeline that should belong to all of us. Introduction by Joshua Fouts, Bioneers Executive Director. This speech was given at the 2017 National Bioneers Conference. Since 1990, Bioneers has acted as a fertile hub of social and scientific innovators with practical and visionary solutions for the world's most pressing environmental and social challenges. Subscribe to the Bioneers Radio Series, available on iTunes and other podcast providers and on your local radio station. Support Bioneers today: www.bioneers.org/donate Please join our mailing list (http://www.bioneers.org/subscribe), stay in touch via Facebook (https://www.facebook.com/Bioneers.org) and follow us on Twitter (https://twitter.com/bioneers).
Views: 1691 Bioneers
Yazidi girls who escaped Islamic State are trapped by trauma
 
10:25
Last summer, militants from the Islamic State group attacked a small ethnic group called the Yazidis, executing men and taking thousands of women and girls as slaves. Special correspondent Marcia Biggs reports from Northern Iraq on the rape, violence, threats and harrowing escapes that some young women endured and their continuing struggles with psychological trauma and stigma. Get the full story: http://www.pbs.org/newshour/bb/freed-free-yazidi-girls-escaped-islamic-state-trapped-trauma/
Views: 117159 PBS NewsHour
ShmooCon 2014: The "Science of Cyber" and the Next Generation of Security Tools
 
41:24
For more information visit: http://bit.ly/shmooc14 To download the video visit: http://bit.ly/shmooc14_down Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl Speaker: Paulo Shakarian Governments around the world are investing heavily in the so called "science of cyber" in order to create a rigorous scientific base for the next generation of security tools. But what's going on in the walled-off world of academia? Will this new science eventually lead to more improved security in cyber space? In this talk, I will describe three ongoing projects at West Point in collaboration with Oxford University, the Netherlands Defense Academy, and George Mason University where we are actively conducting research in this new area of science. We will look at how a new logical theory is being developed to shed light on the attribution problem, how we are looking to use graph theory to defend against an already-compromised network, and how a game theoretic model can help us protect from particularly devious attacks against the smart grid. We firmly believe that exposing such research to the community of practitioners (i.e. the ShmooCon audience) will help initiate a dialogue with academic in order to both ground scientific endeavors in the real world as well as lead to more rapidly fielding of cutting-edge innovation.
Views: 826 Christiaan008
Phil Zimmermann: "Communications Security" | Talks at Google
 
54:39
Phil Zimmermann, the creator of PGP and Silent Phone is our guest at Google, talking about communications security. How large scale deployments of end-to-end secure communications take place, the challenges this brings and the influence this focus on Enterprise has brought to the end-user.
Views: 2533 Talks at Google
Retaliatory Hacking: What Can Governments Do?
 
10:22
Jan. 2 -- Former NSA Director General Keith Alexander discusses how governments respond to hackers. -- Subscribe to Bloomberg on YouTube: http://www.youtube.com/Bloomberg Bloomberg Television offers extensive coverage and analysis of international business news and stories of global importance. It is available in more than 310 million households worldwide and reaches the most affluent and influential viewers in terms of household income, asset value and education levels. With production hubs in London, New York and Hong Kong, the network provides 24-hour continuous coverage of the people, companies and ideas that move the markets.
Views: 742 Bloomberg
Malware Disguised As Cybersecurity Conference! ~ Hacker Daily 10/27/17
 
03:28
Today's episode talks about hackers targeting conference attendees, a company becoming breached after reusing an old password, and Cisco revealing products affected by KRACK. Thanks for watching and don't forget to subscribe to our channel for the latest cybersecurity news! Visit Hacker Arsenal for the latest attack-defense gadgets! https://www.hackerarsenal.com/ FOLLOW US ON: ~Facebook: http://bit.ly/2uS4pK0 ~Twitter: http://bit.ly/2vd5QSE ~Instagram: http://bit.ly/2v0tnY8 ~LinkedIn: http://bit.ly/2ujkyeC ~Google +: http://bit.ly/2tNFXtc ~Web: http://bit.ly/29dtbcn
Edward Snowden and ACLU at SXSW
 
01:01:23
Take Action: https://www.aclu.org/immunity4snowden More information: https://www.aclu.org/nsa-surveillance Edward Snowden speaks about privacy and technology with the ACLU's Ben Wizner and Christopher Soghoian at SXSW Interactive.
Views: 89148 ACLU
DEFCON 20: The End of the PSTN As You Know It
 
50:01
Speakers: JASON OSTROM SECURITY RESEARCHER, VIPER LAB (VOICE OVER IP EXPLOIT RESEARCH), AVAYA, INC. KARL FEINAUER VULNERABILITY RESEARCH SOFTWARE ENGINEER, VIPER LAB WILLIAM BORSKEY SENIOR SECURITY CONSULTANT, VIPER LAB The PSTN as you know it is changing. In March of 2012, the NSA announced "Project Fishbowl", a reference architecture for secure mobility VoIP usage on smartphones using WiFi or 3GPP networks. At the same time, mobile carriers in the US (seemingly) ensure that subscribers must purchase voice plans on their smartphones and can't opt for data only plans - which curtails a compelling option of purchasing a smartphone for data only usage, such as VoIP. Other mysterious clues abound. Since the mid-to-late 90s, users have been able to host their own web and email servers using open standards and DNS for advertisements, peering directly between domains and systems. At the same time, since the early 2000s, the technology and protocols have existed for enabling direct VoIP peering between enterprises, bypassing the PSTN, using DNS SRV records and ENUM - the same way we've been using DNS for HTTP and SMTP for years. But why is this seemingly attractive option for cost savings and collaboration not more widely adopted? Surely this is the way VoIP was meant to be used? Or isn't it? In this talk, we will explore the so-called market buzz of "UC Federation". Rather, we will kick this term to the bit bucket, and present an overview of how the industry is deploying these solutions technically. We will take a closer look at the security of being able to use UC between organizations, advertised using DNS, the same way that companies use UC internally for VoIP, HD Video, data sharing, IM & Presence, and collaboration applications. This talk is divided into three sections. First, we'll share our research on the state of public SIP peering using DNS SRV. Is SIP peering proliferating? How? What does it mean? Using a PoC research tool, we'll look at some initial data we've found, in order to plot the increase of peering using DNS SRV records for SIP service location advertisement. Second, we will show the audience findings from our UC "Federation" Honeypot research project. We've built a UC solution using a large commercial vendor, and have tested "Federation" with the help of the Global Federation Directory. Just to see what would happen. We've also set up a network of cloud based UC Federation honeypots using open source software, to explore attacks against UC Federation Systems. For more information visit: http://bit.ly/defcon20_information To download the video visit: http://bit.ly/defcon20_videos Playlist DEFCON 20: http://bit.ly/defcon20_playlist
Views: 1624 Christiaan008
#realIT.   Un virus informatic a paralizat funcționarea unui hotel de lux
 
04:53
#realIT. Caz de ransomware în Austria: Un virus informatic a paralizat funcționarea unui hotel de lux http://www.publika.md/2884561
Views: 188 PublikaMD
Level9News: DARPA, AI and Emerging Government Technology
 
47:24
DJ of Level9News discusses DARPA and the different cutting-edge technologies being developed by the US Government including brain mapping and artificial intellligence. About the Guest DJ’s background is in system & network engineering. She departed from her career in the gaming industry in 2014 to pursue the challenge of making a difference in a world where right is wrong, up is down, truth is lies; Level9News will provide a protected platform to accelerate "The Awakening" humanity is experiencing world-wide. Level9News believes it is essential to keep the channels of truth and information open to continue to raise the consciousness of humanity so we don't wake up one day and wonder how we became enslaved to a global totalitarian government. The realization of the paradox which humanity has created in its acceleration of acquiring technology faster than the growth if its moral and ethical compass – has enabled an uncontrolled proliferation of abusive powers, which has made the process of controlling the natural spiritual access of consciences detached from the individual and the collective species. This has compelled DJ to explore solutions which can be accessible to all who are willing to receive knowledge with unfeigned guidance. Level9News.com prides itself on resisting censorship. Like-minded communities are encouraged to participate in our mission by being involved in the creation of mutually supportive network. In the future – Level9News.com will grow and further support the demand of unstoppable, decentralized media transcendence. From the primary topic of research in the field of Artificial Intelligence and Remote Neural Monitoring -- which is being fielded by private and government intelligence entities for the purpose of mastering the Human Domain -- to accompanying commentary on geo-political, health/medicine, geo-engineering, transhumanism, forced global integration, Hegelian dialectic, crypto-linguistics, and other areas which are being utilized as means to terraform the evolution of advanced civilization’s social and technological landscape. The future is what we make it – and if we are not prepared to decide our own destiny, the choice will be made for us. Level9News Website http://www.level9news.com https://www.youtube.com/user/Level9News/videos Related Links https://www.youtube.com/watch?v=nUc_3CZHzAM
DEF CON 23 - Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to Wireles
 
45:31
Gary Numan said it best. Cars. They’re everywhere. You can hardly drive down a busy freeway without seeing one. But what about their security? In this talk I’ll reveal new research and real attacks in the area of wirelessly controlled gates, garages, and cars. Many cars are now controlled from mobile devices over GSM, while even more can be unlocked and ignitions started from wireless keyfobs over RF. All of these are subject to attack with low-cost tools (such as RTL-SDR, GNU Radio, HackRF, Arduino, and even a Mattel toy). We will investigate how these features work, and of course, how they can be exploited. I will be releasing new tools and vulnerabilities in this area, such as key-space reduction attacks on fixed-codes, advanced "code grabbers" using RF attacks on encrypted and rolling codes, and how to protect yourself against such issues. By the end of this talk you’ll understand not only how vehicles and the wirelessly-controlled physical access protecting them can be exploited, but also learn about various tools for car and RF research, as well as how to use and build your own inexpensive devices for such investigation. Ladies and gentlemen, start your engines. And other people’s engines. Samy Kamkar is a security researcher, best known for creating The MySpace Worm, one of the fastest spreading viruses of all time. He (attempts to) illustrate terrifying vulnerabilities with playfulness, and his exploits have been branded: “Controversial”, -The Wall Street Journal “Horrific”, -The New York Times “Now I want to fill my USB ports up with cement”, -Gizmodo He’s demonstrated usurping typical hardware for surreptitious means such as with KeySweeper, turning a standard USB wall charger into a covert, wireless keyboard sniffer, and SkyJack, a custom drone which takes over any other nearby drones allowing them to be controlled as a massive zombie swarm. He’s exposed issues around privacy, such as by developing the Evercookie which appeared in a top-secret NSA document revealed by Edward Snowden, exemplifying techniques used by governments and corporations for clandestine web tracking, and has discovered and released research around the illicit GPS and location tracking performed by Apple, Google and Microsoft mobile devices. He continues to produce new research and tools for the public as open source and open hardware. Twitter: @samykamkar
Views: 86756 DEFCONConference
This Browser Takes Anonymous Surfing to the Next Level. But Is It Enough? - YMB Podcast E146
 
39:25
MP3, Links, and More: http://ymb.tc/e146 This is episode 146 of You, Me, and BTC – your liberty and Bitcoin podcast! We all know Tor is cool for anonymous browsing. Adblock is cool for, well, blocking ads. And ProTip is cool for tipping our favorite publishers with Bitcoin. But what if we could have all of the above in one fast, safe, and secure browser? Supposedly, such a product is in the works over at Brave. So today’s show is all about that browser, which uses a protocol called Anonize. It seems like a great idea, but it might have some serious flaws. For one thing, it doesn’t seem to be very decentralized. The company even has to collect tax forms from publishers. Is this a deal breaker? Tune in to learn all about the pros and cons of Brave! Your hosts are Daniel Brown and Tim Baker. Enjoy! Leave a comment and tell us if you would use the Brave browser! We’d also like to thank this episode’s sponsor, Satoshi Dice. Head to http://ymb.tc/satoshidice to play the original and best Bitcoin dice game! If this Bitcoin podcast was interesting, entertaining, or anything else, use the share buttons to let others know that it exists! Every click helps. Or to support YMB more directly, buy some Bitcoin swag! (http://ymb.tc/garb) Tips appreciated: 1Kiy8x4pwMS7RQuH7xDeVcfqeup7gUTqA
KERRY CASSIDY INTERVIEWED BY ELLA FREE ON REVOLUTION RADIO
 
01:57:31
FRIDAY DECEMBER [email protected] 3PM : Kerry will be interviewed by Ella Free on Revolution Radio. I will post the link here when I have it.
Views: 23603 Project Camelot
Foolish Tech Show 1610-12 (Random Recent News)
 
01:02:39
On this episode we go over some of the recent random news with our awesome IRC chat. Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections: http://thehackernews.com/2016/10/nsa-crack-encryption.html BlockChain.info Domain Hijacked; Site Goes Down; 8 Million Bitcoin Wallets Inaccessible: http://feedproxy.google.com/~r/TheHackersNews/~3/jaJ5kJm-UJg/blockchain-bitcoin-website.html Encrypted communications could have an undetectable backdoor for 1024 Bit keys: http://www.pcworld.com/article/3130160/security/encrypted-communications-could-have-an-undetectable-backdoor.html http://arstechnica.com/security/2015/10/how-the-nsa-can-break-trillions-of-encrypted-web-and-vpn-connections/ https://freedom-to-tinker.com/2015/10/14/how-is-nsa-breaking-so-much-crypto/ NSA paid $10 million bribe to RSA (circa 2013): http://thehackernews.com/2013/12/nsa-paid-10-million-bribe-to-rsa.html Amazon finds cache of reused passwords: change yours now!: https://nakedsecurity.sophos.com/2016/10/11/amazon-finds-cache-of-reused-passwords-change-yours-now/ Facebook, Twitter and Instagram Share Data with Location-based Social Media Surveillance Startup: http://thehackernews.com/2016/10/social-media-monitoring-tool.html https://yro.slashdot.org/story/16/10/11/178247/facebook-instagram-twitter-block-tool-for-cops-to-surveil-you-on-social-media Amazon Music Unlimited challenges Spotify with steep discounts for Echo, Prime users: http://www.pcworld.com/article/3130121/streaming-services/amazon-music-unlimited-challenges-spotify-with-steep-discounts-for-echo-prime-users.html Samsung will 'dispose of' recalled Note 7 phones, won't repair or refurbish them: http://www.theverge.com/circuitbreaker/2016/10/12/13257504/samsung-galaxy-note-7-disposal https://gizmodo.com/how-one-outrageous-law-turned-the-samsung-phone-recall-1787659621 https://www.engadget.com/2016/10/11/samsung-ships-fire-proof-boxes-and-gloves-to-recover-note-7s/ Google and Facebook building super high-speed cable between LA and Hong Kong: http://www.theverge.com/2016/10/12/13255858/google-facebook-submarine-cable-trans-pacific StrongPity' malware infects users through illegitimate WinRAR and TrueCrypt installers: https://www.neowin.net/news/strongpity-malware-infects-users-through-legitimate-winrar-and-truecrypt-installers Get CryptoPrevent version 8 Beta: https://www.foolishit.com/cryptoprevent-beta/ KeePass overview: https://youtu.be/Y7bPHpUOmK4 Yahoo adds security event tracking to its Account Info page, but still no “delete” button: https://techcrunch.com/2016/10/12/yahoo-adds-security-event-tracking-to-its-account-info-page-but-still-no-delete-button/ Verizon wants you to know its Google Pixel phones will get immediate Android updates: https://techcrunch.com/2016/10/12/verizon-pixel/ Enterprise customers pull back on security spending, says Fortinet http://www.zdnet.com/article/enterprise-customers-pull-back-on-security-spending-says-fortinet/ will not fix their IoT security flaws allowing ALL their hardware to be compromised: http://www.avtech.com.tw/ http://news.softpedia.com/news/avtech-shuns-security-firm-and-leaves-all-products-vulnerable-without-a-patch-509223.shtml AVTECH vulnerability matrix: http://www.search-lab.hu/media/vulnerability_matrix.txt Violent Extremism is a slippery slope FBI game: https://cve.fbi.gov/whatis/?state=blameSection1 Mr. President game: https://kotaku.com/mr-president-asks-players-to-save-donald-trump-from-as-1787677514 Military looking at blockchain for nuclear weapons: https://news.slashdot.org/story/16/10/11/2045240/us-military-is-looking-at-blockchain-technology-to-secure-nuclear-weapons WD finally gets into the ssd game: https://www.engadget.com/2016/10/11/western-digital-finally-offers-a-consumer-ssd/ space vid of the day: https://youtu.be/KRlfwZLGHxs weird vid: https://vimeo.com/185891294 Court rejects major penalties for torrent damages: https://yro.slashdot.org/story/16/10/11/2044252/court-rejects-massive-torrent-damages-claim-admin-avoids-jail Comcast fined for negative option billing practices: https://news.slashdot.org/story/16/10/11/1819210/comcast-fined-23-million-by-fcc-for-negative-option-billing-practices FCC Complaints link: https://consumercomplaints.fcc.gov/hc/en-us The power of the internet at it's worst: https://gizmodo.com/is-this-horrifying-youtube-video-linked-to-the-disappea-1787682470 https://gizmodo.com/that-horrifying-hostage-video-was-just-a-twisted-misund-1787702303 Lawmakers want UK to set example on transparency in AI decision making: http://www.pcworld.com/article/3130497/lawmakers-want-uk-to-set-example-on-transparency-in-ai-decision-making.html Colorado making batteries from beer waste: https://www.engadget.com/2016/10/12/colorado-researchers-turn-beer-waste-into-battery-electrodes/
Views: 41 d7xTech
ShmooCon 2012: Destroying Evidence Before Its "Evidence" (EN)
 
44:37
Speaker: Hanni Fakhoury Covering your tracks out of fear of getting caught with your hands in the digital cookie jar can sometimes get you in more trouble than whatever crime the feds think you may have committed in the first place. This presentation identifies three specific scenarios where the act of trying to cover your digital footprints -­‐ oftentimes in innocuous and legal ways -­‐ can get you into trouble: the nebulous crime of "anticipatory obstruction of justice," which can cover something as mundane as deleting an email before you're even suspected of committing (let alone charged with) a crime; the ever-­‐expanding Computer Fraud and Abuse Act, which has been stretched to cover things that are neither fraudulent or abusive; and the potential problems with encryption. We'll conclude with some ways you can protect yourself that can help minimize claims that you obstructed justice. For more information visit: http://bit.ly/shmoocon2012_information To download the video visit: http://bit.ly/shmoocon2012_videos Playlist Notacon 9: http://bit.ly/shmoocon2012_playlist
Views: 734 Christiaan008
Surrender ~ Mythos & Luis Royo Art
 
05:52
Mythos is a canadian new age musical project started by Bob D'Eith and Paul Schmidt in 1996. Bob (piano) and Paul (guitar) collectively wrote, produced, and performed on the albums with the help of various session performers. The centerpiece of the Mythos sound rests on the acoustic guitar and piano, which are accented by guest vocalists. Synthesizers and performances in various other musical styles are regularly incorporated into the music. Critics have described Mythos as New Age, Ambient, Ethereal, and Film-Oriented, with influences from Jazz, Classical, Gospel-Soul, and various World styles. Many of their songs include vocalize performances, but few have lyrics. The music is multi-layered, incorporating synthesizers and a numerous acoustic instruments. Multiple guest artists and/or session musicians have contributed to each of Mythos' studio releases, most prominently husband and wife pair Rene Worst (bass) and Jennifer Scott (vocals). Mythos was nominated for Juno Instrumental Artist of the Year award in 1998. Bob D'Eith was nominated for the Canadian Music Awards' Best Keyboardist of the Year in 1995. Individual albums have won and been nominated for various awards, as described in the Discography. Luis Royo is a spanish artist, born in Olalla (Teruel) in 1954. He has produced paintings for his own books and exhibitions, and has also produced art for many different media: video games, role games, CD covers for music, novels covers, tarot cards ... Known for his sensual and dark images, almost apocalyptic, in fantasy worlds with mechanical life forms. ~ ~ ~ ~ ~ ~ ~ ~ Mythos es un proyecto canadiense de música New Age iniciado en 1996 por Bob D'Eith y Paul Schmidt. Bob (piano) y Paul (guitarra), colectivamente escriben, producen e interpretan los álbumes con la ayuda de varias sesiones de artistas intérpretes. La pieza central del sonido de Mythos se basa en la guitarra acústica y el piano, que son acentuados por vocalistas invitados. Sintetizadores e interpretaciones en diversos estilos musicales son regularmente incorporados en la música. Los críticos han descrito a Mythos como New Age, Ambient, Ethereal, y Film-Oriented, con influencias de Jazz, Clásica, Gospel-Soul, y varios estilos del mundo. Muchos de sus temas incluyen interpretaciones vocales, pero pocos tienen letra. La música es de multiples capas, incorporando sintetizadores y numerosos instrumentos acústicos. Varios artistas invitados y/o músicos han contribuido a cada uno de los lanzamientos de estudio de Mythos, lo más prominente es la pareja de esposos, René Worst (bajo) y Jennifer Scott (voz). Mythos fue nominado para el premio Juno Artista Instrumental del Año en 1998. Bob D'eith fue nominado por los Premios de la Música Canadiense al mejor teclista en el en 1995. Álbumes individuales han ganado y han sido nominados a varios premios. Luis Royo es un artista español, nacido en Olalla (Teruel) en 1954. Ha producido pinturas para sus propios libros y exposiciones, y también ha producido arte para muy diversos medios de comunicación: videojuegos, juegos de rol, carátulas para CD de música, portadas de novelas, cartas del Tarot... Conocido por sus imágenes sensuales y oscuras, casi apocalípticas, en mundos de fantasía con formas de vida mecánica. Music: Surrender, Mythos (Album: Purity). http://www.mythosmusic.com Images: Luis Royo. http://www.luisroyo.com/ Creation video: By Reflexibiza. http://www.youtube.com/user/ByReflexibiza HD Video
Views: 10314 ByReflexibiza
Crypto Defenses for Real-World System Threats - Kenn White - Ann Arbor
 
01:36:58
Modern encryption techniques provide several important security properties, well known to most practitioners. Or are they? What are in fact the guarantees of, say, HTTPS TLS cipher suites using authenticated encryption, IPSec vs. SSL VPNs, Property Preserving Encryption, or token vaults? We live in an era of embedded Hardware Security Modules that cost less than $1 in volume, and countless options now exist for encrypting streaming network data, files, volumes, and even entire databases. Let's take a deep dive into the edge of developed practice to discuss real-world threat scenarios to public cloud and IoT data, and look closely at how we can address specific technical risks with our current encryption toolkits. Advanced math not required. Bio: Kenneth White is a security researcher whose work focuses on networks and global systems. He is co-director of the Open Crypto Audit Project (OCAP), currently managing a large-scale audit of OpenSSL on behalf of the Linux Foundation's Core Infrastructure Initiative. Previously, White was Principal Scientist at Washington DC-based Social & Scientific Systems where he led the engineering team that designed and ran global operations and security for the largest clinical trial network in the world, with research centers in over 100 countries. White co-founded CBX Group which provides security services to major organizations including World Health, UNICEF, Doctors without Borders, the US State Department, and BAO Systems. Together with Matthew Green, White co-founded the TrueCrypt audit project, a community-driven initiative to conduct the first comprehensive cryptanalysis and public security audit of the widely used TrueCrypt encryption software. White holds a Masters from Harvard and is a PhD candidate in neuroscience and cognitive science, with applied research in real-time classification and machine learning. His work on network security and forensics and been cited by media including the Wall Street Journal, Forbes, Reuters, Wired and Nature. White is a technical reviewer for the Software Engineering Institute, and publishes and speaks frequently on computational modeling, security engineering, and trust. He tweets @kennwhite.
Views: 891 Duo Security
I am a legend: Hacking Hearthstone with machine learning - Defcon 22
 
43:32
Recording of my Defcon 2014 talk on hacking hearthstone More info: https://www.elie.net/hs Slides: http://bit.ly/2ccotSX
Views: 148703 Elie Bursztein
(Audio only) Panel: Don't Tell Me Software Security - moderated by Mark Miller
 
41:33
Panel: Wait Wait... Don't Tell Me Software Security - Mark Miller, Josh Corman, Chris Eng, Space Rogue Test your wits and current AppSec news knowledge against our panel of distinguished guests Joshua Corman, Chris Eng, Space Rogue and Gal Shpantzer. "Wait Wait... Don't Pwn Me!" is patterned after the NPR news quiz show where we challenge the panel and the audience with "Bluff the Listener", "This Week's Security News", "The Security Limerick Challenge" and "Lightning Fill In the Blank". Think you know your stuff? Get selected as an audience participant and prove it! Join us for a rollicking hour as we test the panel and the audience on recent security stories in the news. Who knows? Maybe you can pwn the panel. Moderator: Mark Miller Founder and Curator, Trusted Software Alliance Mark Miller, Senior Storyteller, is recognized internationally for weaving engaging tales to simplify the explanation of complex, technological solutions. He is a serial community builder, participating in the creation of global online communities such as NothingButSharePoint, EndUserSharePoint and the Trusted Software Alliance. | | | | Mark travels internationally from his home in New York City, speaking on the building of community and methods for using social media. Speakers Josh Corman Director of Security Intelligence, Akamai Technologies Joshua Corman is the Director of Security Intelligence for Akamai. Most recently he served as Research Director for Enterprise Security at The 451 Group. Mr. Corman's cross-domain research highlights adversaries, game theory and motivational structures. His analysis cuts across sectors to the core security challenges plaguing the IT industry, and helps to drive evolutionary strategies toward emerging technologies and shifting incentives. | | A staunch advocate for CISOs, Chris Eng Veracode Chris Eng is Vice President of Research at Veracode. Chris is a sought after speaker at industry conferences, and has presented at events such as BlackHat, RSA, OWASP, and CanSecWest. In addition to presenting on a diverse set of application security topics, including cryptographic attacks, testing methodologies, mobile application security, and security metrics, Chris frequently comments on software security trends for media outlets worldwide. Throughout his career at organizations such as NSA... Space Rogue Space Rogue is widely sought after by journalists and industry analysts for his unique views and perceptions of the information security industry. He has been called to testify before the Senate Committee on Governmental Affairs and has been quoted in numerous magazine and newspaper articles. He has also appeared on such TV shows as News Hour with Jim Lehrer, CNN Nightly News, ABC News Online with Sam Donaldson, and others. A recognized name within the security industry, Gal Shpantzer Gal Shpantzer has 12 years of experience as an independent security professional and is a trusted advisor to CSOs of large corporations, technology and pharma startups, Ivy League universities and non-profits/NGOs specializing in critical infrastructure protection. Gal is a Contributing Analyst with Securosis and is involved in the Infosec Burnout research project and co-presented on this topic at BSides-Las Vegas (2011) and RSA (2012). Gal has been involved in multiple SANS Institute... - Managed by the official OWASP Media Project https://www.owasp.org/index.php/OWASP_Media_Project
Views: 169 OWASP