or cancel
  1. Why IT Security Is Fucked Up And What We Can Do About It

    48:11

    from Deepsec Conference / Added

    Stefan Schumacher is head of the Magdeburger Institut für Sicherheitsforschung (Magdeburg Institute for Security Research) and currently running a research programme about the psychology of security.…

    + More details
    • Why Antivirus Software fails

      32:34

      from Deepsec Conference / Added

      Anti-virus software is present on most desktops and even mobile devices. It is also used on servers to filter messages. Daniel Sauder takes a look at how anti-virus solutions work and how they fail.…

      + More details
      • Trusting Your Cloud Provider - Protecting Private Virtual Machines

        59:01

        from Deepsec Conference / Added

        Armin Simma (Vorarlberg University of Applied Sciences, FHV) talks about his project with regards to assess the trustworthiness of cloud infrastructure. The results stem from his academic research: "My…

        + More details
        • Trap a Spam-Bot for Fun and Profit

          35:47

          from Deepsec Conference / Added

          At DeepSec 2014 Attila Marosi (Sophos Lab) held a presentation about the use of honeypot systems in anti-spam and anti-virus research: "The most of honeypot systems pretend that they are vulnerable…

          + More details
          • The IPv6 Snort Plugin

            41:15

            from Deepsec Conference / Added

            IPv6 is already being deployed. There are still very few tools to defend against IPv6 related attacks. To improve this situation Martin Schütte (DECK36) wrote a plugin for Snort, the popular…

            + More details
            • TextSecure and RedPhone - bring them to iOS!

              50:44

              from Deepsec Conference / Added

              WhisperSystems has introduced secure messaging and communication with the TextSecure and RedPhone applications for Android. Christine Corbett gave an overview about the state of bringing both applications…

              + More details
              • Suricata Intrusion Detection

                37:02

                from Deepsec Conference / Added

                At DeepSec 2014 Victor Julien (Open Information Security Foundation) and other developers of the Suricata intrusion detection software gave a status on the Suricata engine and its features.

                + More details
                • Social Authentication - Vulnerabilities, Mitigations, and Redesign

                  34:52

                  from Deepsec Conference / Added

                  At DeepSec 2014 Marco Lancini (CEFRIEL - Politecnico di Milano) held a presentation about the results of a study conducted to find the attack surface of social authentication: "As social networks…

                  + More details
                  • SENTER Sandman - Using Intel TXT to Attack BIOSes

                    01:02:31

                    from Deepsec Conference / Added

                    Xeno Kovah leads a team of 5 researchers focusing on low level PC firmware and BIOS security. His specialty area is stealth malware and its ability to hide from security software and force security…

                    + More details
                    • Security Operations – Moving to a Narrative-Driven Model

                      42:58

                      from Deepsec Conference / Added

                      At DeepSec 2014 Josh Goldfarb (FireEye) held a presentation about the fundamental paradigm of security operations. The current security operations model is an alert-driven one. Alerts contain a snapshot…

                      + More details
                      • SAP BusinessObjects Attacks - Espionage and Poisoning of Business Intelligence Platforms

                        45:49

                        from Deepsec Conference / Added

                        At DeepSec 2014 Juan Perez-Etchegoyen (Onapsis, Inc.) held a presentation about SAP Business Objects Attacks. SAP systems provides Business Intelligence platforms, which can be a promising target…

                        + More details
                        • Safer Six - IPv6 Security in a Nutshell

                          30:14

                          from Deepsec Conference / Added

                          At DeepSec 2014 Johanna Ullrich (SBA Research) presents findings on the deployment and the state of affairs regarding information security and IPv6: "The history of computers is full of underestimation:…

                          + More details

                          Browse Videos

                          Deepsec Conference

                          Here are all of the videos that Deepsec Conference has uploaded to Vimeo. Appearances are videos that Deepsec Conference has been credited in by others.

                          Also Check Out