Podcasts by Black Hat Webcasts RSS Feed
Security news doesn't always wait for conference season. That's the guiding principle behind the Black Hat Webcasts – a regular series of live web events focusing on what's hot in the infosec space all year long. On the third Thursday of every month, we'll bring together Black Hat speakers, independent researchers and leading security experts from the government to the underground to answer your questions live.
Further podcasts by Black Hat Briefings
Podcast on the topic Technologie
All episodes
Black Hat Webcast 10: Mobility and Security from 2009-05-20T18:19:12
Overview:
We're trying out a new format for the May 21 webcast on Mobility and Security. We're going to bring in some researchers and some industry folks and have a round-table discussion on t...
Black Hat Webcast 9: Europe 2009 Sneak Peek from 2009-03-25T13:01:43
Overview:
Black Hat Europe is right around the corner - we'll be returning to Amsterdam April 14-17. We're very excited about the lineup of speakers we've put together, and this webcast will ...
Black Hat Webcast 8: Rich Internet Application Security from 2009-03-10T13:01:50
Rich Internet Application (RIA) frameworks are seeing an enormous growth in popularity - technologies like Ajax and Flash create nearly unlimited opportunities to expand and improve the web user ex...
ListenBlack Hat Webcast 7: Mac OS X Security from 2009-01-23T17:07:15
Overview:
Our seventh installment of the Black Hat Webcast Series arrives next week with an in-depth and fascinating look into the world of Mac Security. As the Mac platform grows in popularit...
Black Hat Webcast 6: Database Forensics with David Litchfield from 2008-12-23T14:17:22
Database Forensics expert David Litchfield will discuss his new tool and paper with Black Hat Founder and Director Jeff Moss and take questions from our webcast audience. The tool, orablock, allows...
ListenBlack Hat Webcast 5: Clickjacking and Browser Security from 2008-12-19T15:27:27
"Clickjacking"is all over the news lately. For the uninitiated, it's a set of techniques discovered by Jeremiah Grossman and Robert Hansen that allows an attacker to transparently capture a user's ...
ListenBlack Hat Webcast 3: How to Impress Girls with Browser Memory Protection Bypasses from 2008-12-19T13:20:36
Over the past several years, Microsoft has implemented a number of memory protection mechanisms with the goal of preventing the reliable exploitation of common software vulnerabilities on the Windo...
ListenBlack Hat Webcast 4: Trust Doesn't Scale: Practical Hijacking On the World's Largest Network from 2008-12-19T12:13:23
Our monthly free webcast series rolls on with another talk about a major vulnerability. This webcast is entitled"Trust Doesn't Scale: Practical Hijacking On the World's Largest Network."The webcast...
ListenBlack Hat Webcast 2: Dan Kaminsky's DNS Discovery: The Massive, Multi-Vendor Issue and the Massive, Multi-Vendor Fix from 2008-12-18T17:46:34
Early in 2008, security researcher Dan Kaminsky located a gaping hole the basic underpinnings of the internet. This fundamental flaw in DNS security renders almost all DNS serves open to cache pois...
ListenBlack Hat Webcast 1: The Forbidden Sneak Peek: Black Hat USA 2008 from 2008-12-18T17:46:30
During this inaugural webcast, Jeff Moss provided an overview of prevailing security trends and technologies and was joined by several of the world’s leading security minds who will each provide a ...
Listen