1 |
|
Scs3: Dr. Peter A. Gloor - Collective Prediction In Digital Social Networks |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5888 |
None |
2 |
|
Scs3: Walter Sprenger - Identifying Users With Browser Fingerprinting |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
6206 |
None |
3 |
|
Scs3: Walter Sprenger - Mobile (In)Security |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5745 |
None |
4 |
|
Scs3: Rosario Valotta - Cookie Jacking Ui Redressing Attacks |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5216 |
None |
5 |
|
Scs3: Alaa Al-Din Al-Radhi - Ipv6 Security Testing &Amp; Tools |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5332 |
None |
6 |
|
Scs3: Julien Bachmann - Ios Applications Reverse Engineering |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5630 |
None |
7 |
|
Scs3: Stefan Frei - Failure To Endpoint Security |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
4790 |
None |
8 |
|
Scs3: Thomas Röthlisberger - Html5 (In)Security |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5020 |
None |
9 |
|
Scs3: Marco Balduzzi - Http Parameter Polution |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5153 |
None |
10 |
|
Scs3: Celil Ünüver - Threats On Your Smartphone |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5119 |
None |
11 |
|
Scs3: Srdjan Capkun - Cracking Keyless Car Systems |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5283 |
None |
12 |
|
Scs3: Jeremy Brown - Exploiting Scada Systems |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
4902 |
None |
13 |
|
Scs3: Dave Wollmann - Social Engineering - Humans, The Weakest Link In The Security Chain |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
4947 |
None |
14 |
|
Scs3: Fabian Rothschild &Amp; Peter Greko - Botnet Resistant Coding |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5022 |
None |
15 |
|
Scs3: Ching Wa Ng - Cyber Warfare Prediction |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
4967 |
None |
16 |
|
Scs3: Darren Turnbull - Turning Security Latency Into Competitive Advantage |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5076 |
None |
17 |
|
Scs3: Jörg Ewald - Application Security As A Team Effort |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
4974 |
None |
18 |
|
Scs3: Dr. Christian Folini - Hunting Slowloris And Friends |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
4920 |
None |
19 |
|
Scs3: Antonio Fontes - Open Web Application Security Project |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5095 |
None |
20 |
|
Scs3: Brian Mariani - Become Fully Aware Of The Potential Dangers Of Activex Attacks |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
4750 |
None |
21 |
|
Scs3: Lee Ling Chuan - Obfuscated Malc0de Hunting With Emulator+Disassembler |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
6935 |
None |
22 |
|
Scs3: Pascal Junod - Cryptography: How To Break It In Practice If You Must ? |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
4841 |
None |
23 |
|
Scs3: Stefano Di Paola - Dom Based Cross Site Scripting |
12 years |
Securitytube_Poster |
securitytube, swisscyberstorm, hacking, hackers, information security, convention, computer security, cyber storm 11, swisscyberstorm 11, swisscyberstorm-2011 |
5417 |
None |