Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Digital Marketing
Computer Science
Graphic Design
Mining Massive Datasets
Making Successful Decisions through the Strategy, Law & Ethics Model
The Science of Well-Being
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from BruCON. Dive deep into the latest insights, research, and trends from the world's leading experts.
Novel Android malware detection technique analyzing application HEAP at runtime, identifying dangerous objects without APK access. Potential integration with Android Attestation Framework for real-time malicious app identification.
Innovative fuzzing technique for embedded systems, overcoming challenges to discover critical vulnerabilities in network devices through emulation, dynamic binary instrumentation, and guided fuzzing.
Explore the challenges in organizational security and product development, and discover strategies for improvement in this insightful cybersecurity talk.
Explores common mistakes in penetration testing, comparing it to hiring a heart surgeon. Discusses issues faced by testers and customers, and examines if the industry has improved since 2011.
Explore the evolution of PowerShell attacks, offensive techniques, and defensive strategies since 2014, including insights on Desired State Configuration for covert persistence and command and control.
Explore Riot Games' innovative security program, focusing on feedback, self-service, and developer collaboration. Learn from successes and failures in implementing a hybrid infrastructure approach.
Explore advanced WiFi attacks using modified firmware on off-the-shelf dongles and mobile phones. Learn about jamming techniques, man-in-the-middle attacks, and vulnerabilities in WPA-TKIP and WPA2 protocols.
Transforming BBC Micro:Bit into a powerful wireless attack tool for sniffing keystrokes, hijacking quadcopters, and interacting with 2.4GHz protocols. Open-source firmware enables affordable, portable RF hacking.
Explore XFLTReaT, an open-source tunnelling framework that simplifies network bypassing. Learn about its versatile modules, customization options, and potential applications in various scenarios.
Explore a novel browser exploit detection technique using Live Network Stream Code Injection, offering agentless protection against modern browser-based attacks without OS API hooking or code injection.
Explore the transformative impact of hackers on cybersecurity and the ongoing need for industry evolution with insights from a leading expert.
Innovative machine learning approach for detecting malware in encrypted HTTPS traffic using Bro IDS logs, without decryption. Focuses on behavioral features and connection 4-tuples for improved accuracy.
Explore secure channel cryptography, including key establishment, data protection, and essential properties. Learn about famous security bugs and recent improvements in SSH and TLS implementations.
Explore CMS brute-forcing malware, focusing on WordPress attacks. Analyze prominent botnets, their capabilities, and a case study of Sathurbot. Learn detection methods for identifying and preventing these threats.
Explore security vulnerabilities in parental control apps, focusing on Smart Sheriff's flaws and the broader implications for user privacy and data protection.
Get personalized course recommendations, track subjects and courses with reminders, and more.