It has been six years since the first Tor market opened shop. The period between then and now has been one marked by violent growth, innovation, and adaptation.
With more than thirty active darkweb markets and countless individual shops in operation...
This innovative talk will mix DIY, emerging technologies and computer security. First part of the talk will explain how to build your own low-cost, powerful, totally silent and ecological password cracker using a cheap and publicly available FPGA boa...
Vice Admiral Arnaud Coustilliere was born in Toulon on the 3rd of November 1960. He has led a distinguished career as a surface warfare officer, commanding officer, and other appointments in the Navy and Joint Defence staff.
Permission management control is becoming a primary concern due to the always growing privacy and data concerns, and even more specifically on mobile devices. With Marshmallow, and based on the AppOp project under KitKat, Android users now have (par...
Communication protocols have evolved from the traditional Serial and LAN ports to complex and lightweight protocols of today, such as Bluetooth Low Energy (BLE), ANT+ and ZigBee. Bluetooth Low Energy (BLE) is a popular protocol of choice for wearable...
The hardware has changed, it has been closed, connected, unusable when the companies get bankrupted. This is a problem because those
connected objects such as watches, locks, alarms, drones... A real invasion.
It is time for us to take back the con...
(EN) THE NEW SHERIFF IN TOWN IS A MACHINE: THE PROBLEMS WITH USING AI, PREDICTIVE ANALYTICS, AND BIG DATA TO FIGHT CRIME AND FIND “TERRORISTS" WITH JENNIFER LYNCH
In the last few years, law enforcement technologies have become “smarter” and cheaper. Now even small agencies can buy their own drones or collect face recognition images or DNA from anyone right out on the street. But as police technologies have...
Along this talk, we will talk about a well-known filesystem used by millions of people, the NTFS, which is used in every Windows machine.
In fact, only a few people know what you can really find in a NTFS filesystem, we will see how it works and how...
Remedial courses for CIA and other state agencies…
From recent times, more and more leaks inform us how national agencies work to bypass antivirus securities for surveillance activities. Press write about sophistication of attacks, tricks used,...
For many years, Windows drivers have been a great attack vector in order to elevate privileges and acquire kernel execution.
And for many years, Microsoft has been working to mitigate those attacks, increasing the security for each version of Window...
As we know the Android Application Industry from a security perspective, it is also quite well known that the Android platform is succeptible to malicious applications. And with the recent trend where all the vendors and customers going completely mo...
The connected car is a subject often discussed in the media. The digital takeover of the vehicle is a nightmare for builders. Instead of opening and sharing common standards, we are able to reproduce the errors made in the past on the mechanical side...