Blackhat

Results: 880



#Item
121

A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers!

Add to Reading List

Source URL: www.blackhat.com

- Date: 2015-05-28 15:51:02
    122

    PRNG: Pwning Random Number Generators George Argyros∗ Aggelos Kiayias∗† Randomness is a critical security feature of modern web applications. From session identifiers

    Add to Reading List

    Source URL: media.blackhat.com

    - Date: 2012-08-02 14:30:16
      123

      New Tricks For Defeating SSL In Practice Moxie Marlinspike

      Add to Reading List

      Source URL: blackhat.com

      - Date: 2015-05-28 15:51:26
        124

        Overview of Certification Systems: X.509, CA, PGP and SKIP E. Gerck* MCG - Meta-Certificate Group

        Add to Reading List

        Source URL: www.blackhat.com

        - Date: 2015-05-28 15:51:52
          125

          Crackstation Presented By Nick Breese © 2007 Security-Assessment.com

          Add to Reading List

          Source URL: www.blackhat.com

          - Date: 2015-05-28 15:51:31
            126Computing / Software / System software / Portable Executable / Malware / Dynamic-link library / Code signing / Executable compression / File format

            Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable August 2016

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2016-08-03 20:31:26
            127Economy / Money / ISO standards / Finance / Ubiquitous computing / EMV / Debit cards / Smart cards / Contactless payment / Near field communication / ISO/IEC 14443 / Maestro

            Relaying EMV Contactless Transactions using Off-The-Shelf Android Devices Jordi van den Breekel KPMG the Netherlands BlackHat Asia March, 2015

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2015-05-28 15:50:49
            128Cyberwarfare / Computer security / Engineering / Automation / Malware / Rootkits / Stuxnet / Programmable logic controller / Computer worm / Transmission Control Protocol / Blaster

            PLC-Blaster: A Worm Living Solely in the PLC Ralf Spenneberg, Maik Brüggemann, Hendrik Schwartke 1 OpenSource Security Ralf Spenneberg

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2016-03-30 22:52:18
            129Cyberwarfare / Computer security / Malware / Espionage / Malware research / FinFisher / Pin / Binary star / Regin / Command and control / Spyware

                BIG GAME HUNTING: THE PECULIARITIES IN  NATION­STATE MALWARE RESEARCH      

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2015-08-05 21:02:05
            130Software / Computer security / Computing / Computer network security / Software testing / Metasploit Project / Open core / H. D. Moore

            Metasploit and Money Black Hat DC 2010 hdm[at]metasploit.com Abstract In 2008, Metasploit expanded from a community-run project to a corporate product managed by

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2015-05-28 15:51:27
            UPDATE