Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies

Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies

Black Hat via YouTube Direct link

black hat Introduction

3 of 22

3 of 22

black hat Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 black hat Disclaimer
  3. 3 black hat Introduction
  4. 4 black hat Trading software
  5. 5 black hat Unencrypted comms
  6. 6 black hat Denial of Service
  7. 7 black hat Trading languages supporting DLL imports
  8. 8 black hat Passwords stored unencrypted
  9. 9 black hat Trading data stored unencrypted
  10. 10 black hat Weak password policies
  11. 11 black hat Authentication
  12. 12 black hat Session still valid after logout
  13. 13 black hat Privacy mode
  14. 14 black hat Hardcoded secrets
  15. 15 black hat Anti-exploitation mitigations
  16. 16 black hat Root detection
  17. 17 black hat Other weaknesses
  18. 18 black hat Responsible disclosure
  19. 19 black hat Regulators
  20. 20 black hat Rating organizations
  21. 21 black hat Recommendations
  22. 22 black hat Black Hat Sound Bytes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.