We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B

Episodes

Total: 86

If you give a thousand programmers the same task and the same tools, chances are a lot of the result

This session will examine the threat of spyware to corporations. What does the threat currently look

This presentation shows the next (2.) generation of Oracle Rootkits. In the first generation, presen

Voice analytics-once the stuff of science fiction and Echelon speculation-is now commercially availa

Web applications are normally the most exposed and the most easily compromised part of an organizati

Every application, from a small blog written in PHP to an enterprise-class database, receives raw by

When trying to analyze a complex system for its security properties, very little information is avai

It's late. You've been assigned the unenviable task of evaluating the security of this obtuse applic

Today’s privacy requirements place significant additional auditing burdens on databases. First you h

VoIP, IMS, FMC, NGN, PacketCore, MPLS. Put those together and you are looking at the next security n

In this day and age, forensics evidence lurks everywhere. This talk takes attendees on a brisk walk

Injecting shellcode into a vulnerable program so you can find it reliably can be tricky. With image

Linux® is the most popular open source project. The Linux random number generator is part of the ker

Over the last three years, the Metasploit Framework has evolved from a klunky exploit toolkit to a s

Expertise in computer forensic technology means nothing if that expertise can’t be conveyed convinci

Part two: Expertise in computer forensic technology means nothing if that expertise can’t be conve

This presentation will discuss the use of RSS and Atom feeds as method of delivering exploits to cli

Radio Frequency Identification (RFID) malware, first introduced in my paper 'Is Your Cat Infected wi

Rootkit technology has exploded recently, especially in the realm of remote command and control vect

The Achilles' heel of network IDSs lies in the large number of false positives (i.e., false attacks)