All Videos

In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks.

MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: Instructor: Nickolai Zeldovich In this lecture, Professor Zeldovich gives a brief overview of the class, summarizing class organization and the concept of threat models.

More than just a router. The open-source center of your home.

MagSpoof is a device that can spoof/emulate any magnetic stripe or credit card *wirelessly*.

Shedun automatically install a trojanized app that masquerades itself as an official app.

Shedun Trojanized adware family implements the ability to automatically install any app on the devices by exploiting the Android Accessibility Service.

After months of bombing by the U.S. and coalition forces, ISIS remains undefeated on the ground and has now entered a new phase, using the cyber-world as a weapon.

Discussion: Keeping the skies safe from commercial drones.

We use cookies to maintain login sessions, analytics and to improve your experience on our website. By continuing to use our site, you accept our use of cookies, Terms of Use.