We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B

Episodes

Total: 86

Have you ever walked into your local Global Mega Super Tech Store and wondered how cheaply you could

The Internet industry is currently riding a new wave of investor and consumer excitement, much of wh

In the last 3 years, Bluetooth has gone from geeky protocol to an integral part of our daily life.

Online games are very popular and represent some of the most complex multi-user applications in the

Traditionally, host-based anomaly detection has dealt with system call sequences, but not with syste

Windows Vista comes with redesigned support for WiFi (802.11 wireless). For those of us who live wit

Panel: Disclosure Discussion

2006/6/4

Technology vendors, security researchers, and customers - all sides of the vulnerability disclosure

Wireless stealth was somewhat expensive some years ago as we were required to use proprietary radios

There is a growing need to develop improved methods for discovering vulnerabilities in closed-source

To be able to defend against IT security attacks, one has to understand the attack patterns and henc

Social networking sites such as MySpace have recently been the target of XSS attacks, most notably t

Printers, scanners, and copiers still have a reputation of being embedded systems or appliances; dum

Usually, a personal firewall and an antivirus monitor are the only tools run by a user to protect th

Technologies emerge on a regular basis with new promises of better security. This is more or less tr

All applications and operating systems have coding errors and we have seen technical advances both i

In the first half of this session, Paul Simmonds will present on behalf of the Jericho Forum taking

Looking for instant gratification from the latest client side attack? Your search may be over when y

Automated identification of malicious code and subsequent classification into known malware families

Web apps continue to be the soft, white underbelly of most corporate IT environments. While the opti

Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005