ReviewRückblick

Click on the buttons below to review a year.Schaltflächen klicken um auf ein Jahr rückzublicken.

AI & Hacking

by Bruce Schneier in Personvon Bruce Schneier in Person

Where do Internet Standards come from?

by Christian Amsüssvon Christian Amsüss

Ascon - The new NIST standard for lightweight authenticated encryption and hashing

by Martin Schläffervon Martin Schläffer

Analyzing and Understanding the Internet of Insecure Things

by Martina Lindorfervon Martina Lindorfer

You wouldn't STEAL a CAR? - security in automotive control units

by Reinhard Kuglervon Reinhard Kugler

10$ for a cookie : A modern view on the threat detection landscape

by Michel de Crevoisiervon Michel de Crevoisier

Pitfalls in Embedded Security

by Niklas Grimm von Niklas Grimm

Turning Container security up to 11 with Capabilities

by Mathias Tausig von Mathias Tausig

Project presentation: JavaScript Pentest Powerhouse

by Valentin Kogard, Timothy Nicholson von Valentin Kogard, Timothy Nicholson

Nimm zwei, Privacy & Security – wichtige Zutaten für eine resiliente Bank

by Carina Kloibhofer, Nenad Milanovic von Carina Kloibhofer, Nenad Milanovic

Cyber Security for industry (Cybersicherheit für die Industrie)

by Wolfgang Mödritsch, Stefan Pfeiffer von Wolfgang Mödritsch, Stefan Pfeiffer

Betreutes Hacken - Senior und die Juniorcrew

by Petar "Hetti" Kosicvon Petar "Hetti" Kosic

Die Macht des OSINT: Wie man öffentliche Daten effektiv nutzt

by Fabio Birnegger, Fatih Varlivon Fabio Birnegger, Fatih Varli

Unpacking firmware

by Florian Lukavsky, Marton Illesvon Florian Lukavsky, Marton Illes

Web Security CTF für Anfänger

by Alexander Ressl, Florentina Paschinger, Lukas Pühringer, Lukas Putzvon Alexander Ressl, Florentina Paschinger, Lukas Pühringer, Lukas Putz

Bleibt im Kopf: Wirkungsvolle Methoden der Mitarbeitersensibilisierung

by Sandra Wiesbeck und Klaudia Zotzmann-Kochvon Sandra Wiesbeck und Klaudia Zotzmann-Koch

The importance of Security-Leadership in a multinational company

by Roland Suppervon Roland Supper

Panel Discussion: Usable Security

Participants: Bruce Schneier, Katharina Krombholz, Mathias Tausig, Silvie Schmidt and Nenad Milanovic Hosted by Manuel KoschuchParticipants: Bruce Schneier, Katharina Krombholz, Mathias Tausig, Silvie Schmidt and Nenad Milanovic Hosted by Manuel Koschuch

Cybercrime – prevention measures, crisis handling and post incident analysis

Axel Anderl und Nino TlapakAxel Anderl und Nino Tlapak

WiFi und der Unsichtbarkeitszauber

Alexander Ressl, Lukas Putz, Lukas Pühringer Alexander Ressl, Lukas Putz, Lukas Pühringer

Warum der Osterhase beliebter als Security Awareness ist: Security Gamification bei der Erste Bank

Elisabeth DanielElisabeth Daniel

Umwandlung Desktop-App - Web-App: Was kann schon schiefgehen?

by Simon Schöneggervon Simon Schönegger

AI that can Save the Day or Hack it Away

by Patrick Fettervon Patrick Fetter

OT Security - das unfassbar Unsichere

by Bernhard Lorenz, Felix Eberstallervon Bernhard Lorenz, Felix Eberstaller

Verstehen, Erkennen und Mitigieren von Angriffsvektoren, unterstützt durch MITRE ATT&CK

by Tom Perkovicvon Tom Perkovic

Automating and attacking complex HTTP processes with OWASP Raider

by Daniel Neagaruvon Daniel Neagaru

Captcha.eu vs. bots

by Helmut Januschkavon Helmut Januschka

Dissecting the Unknown - How to Extend Wireshark with Lua

by Gabriel Karl Gegenhuber, Florian Holzbauervon Gabriel Karl Gegenhuber, Florian Holzbauer

Designing Secure and Usable Authentication for Smart Homes

by Alexander Ponticello and Katharina Krombholzvon Alexander Ponticello and Katharina Krombholz

Tox CryptoParty - Install a Tox Client and have some fun with it

by Zoffvon Zoff

The Cold Boot Attack and other Hot Stuff

by Pol Hölzmervon Pol Hölzmer