Hackers of CypherCon - Season 1

Hackers of CypherCon - Season 1

Season 1

CypherCon 3.0

Network
Episodes21
Datesjuin 22, 2018 - mars 13, 2019
Next Season

Episodes

Hacking, Phreaking & Juvenile Delinquency with Joe Grand
Season 1Episode 163 min

Hacking, Phreaking & Juvenile Delinquency with Joe Grand

In a time when tinkering with technology was a guarantee for ridicule and torment, a small group of curious explorers were connecting to computer systems, traversing the telephone network, and occasionally causing mischief. Joe shares unheard stories of his early days as a hacker, phone phreak, and troublemaker, following a rebellious path towards the eventual redirection of his passion for good.

juin 22, 2018
Hacking a Better Tomorrow with Ben Heck
Season 1Episode 245 min

Hacking a Better Tomorrow with Ben Heck

A self-taught hacker, modder and maker Benjamin Heckendorn - better known as Ben Heck is host of element14's The Ben Heck Show, a weekly web series in which Ben tackles fun and interesting projects across a wide range of topics. In this exclusive CypherCon 3.0 key note presentation, Ben discusses his beginnings, where he is today and how you can help hack a better tomorrow.

juil. 6, 2018
Forensics When You're Broke with Phil Cochran
Season 1Episode 344 min

Forensics When You're Broke with Phil Cochran

Exploring the forensic methodology and tasks using free open source software. We won't be focusing on what tools are available, the focus of the presentation is explaining the methodology and where these tools fit in to the process to get the job done.

juil. 20, 2018
Hack in the Day with Brad Swanson
Season 1Episode 441 min

Hack in the Day with Brad Swanson

This talk will be about hacking/phreaking in the late 1980's, early 1990's, and what the scene was like back then compared to today. What was considered cutting edge back then has either changed or disappeared entirely. The general attitude around hacking, and hacking 'groups' has matured and evolved over the years. Some of the origins of how we got to where we are today is covered.

août 3, 2018
Developer Friendly Cryptography with Brice Williams
Season 1Episode 547 min

Developer Friendly Cryptography with Brice Williams

Brice Williams will look at some common cryptography usage errors and why popular libraries often fall short. He will also discuss nuances such as backwards compatibility, FIPS 140-2 validation, and weak standards such as JOSE/JWT that contribute to the overall confusion. Advice is also provided to ensure more secure cryptographic implementations are used.

août 17, 2018
Hacking Academia with Anita Nikolich
Season 1Episode 630 min

Hacking Academia with Anita Nikolich

Anita will present some ideas about how three communities with different incentives, yet the same goals, can work together to shorten the time to discovery and overcome many of the obstacles that impeded progress in the sciences centuries earlier.

août 31, 2018
Attacking Wireless Devices Using SDR with Caleb Madrigal
Season 1Episode 740 min

Attacking Wireless Devices Using SDR with Caleb Madrigal

In this talk, we'll be exploring how wireless communication works. We'll capture digital data live (with Software-Defined Radio [SDR]), and see how the actual bits are transmitted. From here, we'll see how to view, listen to, manipulate, and replay wireless signals. We'll also look at interrupting wireless communication, and finally, we'll even generate new radio waves from scratch.

sept. 14, 2018
SOAR: Operating at Attacker Speed with Brian Genz & Ben Zimmerman
Season 1Episode 852 min

SOAR: Operating at Attacker Speed with Brian Genz & Ben Zimmerman

Security Orchestration, Automation and Response (SOAR) enables defenders to operate at attacker speed by codifying detection and response expertise into automation playbooks. We will examine the core components of SOAR, skills required to design and implement it, common use cases in detection and response, and potential opportunities for security control testing in a defense-in-depth environment.

sept. 28, 2018
When Developers Fail to Secure with David Bryan
Season 1Episode 929 min

When Developers Fail to Secure with David Bryan

David has found some pretty stupid security mistakes. Blatantly overlooked controls, or flat out lazy system admins. David will show real-world examples of misuse & abuse, and improper data handling of passwords inside application code. We must remember a breech in one security system, can lead to a breach on another system because of the implicit trust relationships we build to get the job done.

oct. 12, 2018
What the Fungi? How to Grow Your Own Nootropics with Eric Zimmermann
Season 1Episode 1045 min

What the Fungi? How to Grow Your Own Nootropics with Eric Zimmermann

Learn how mushrooms are medicinal and doing some amazing things like fighting cancer, boosting immunity, improving cognition, etc. In this presentation learn which compounds mushrooms produce that are medicinal and how you can easily grow them at home. We'll review the latest research from clinical trials and unveil the low cost, high yield techniques gleaned from anonymous mushroom cultivators.

oct. 26, 2018
Text Mining: Reading Between the Lines with John Platais
Season 1Episode 1134 min

Text Mining: Reading Between the Lines with John Platais

"Read between the lines" usually refers to one's ability to infer hidden meaning from text. This talk will look at the tools and efforts needed for "Text Mining". Using data mining techniques to infer meaning, misconceptions, or hidden agendas from common documents. Learn a general understanding of the process along with a list of tools & services to start text mining right away.

nov. 9, 2018
SAEDY - Subversion & Espionage Directed Against You with Judy Towers
Season 1Episode 1253 min

SAEDY - Subversion & Espionage Directed Against You with Judy Towers

Espionage is the practice of secretly gathering information about a foreign government or a competing industry, with the objective of placing one's own government or corporation at a strategic or financial advantage. Presenting case examples of military and industrial espionage, Judy illustrates how tricks of the spy trade are parleyed against ordinary individuals every day.

nov. 23, 2018
The Arms Race with Ken Grigas
Season 1Episode 1340 min

The Arms Race with Ken Grigas

United States military veteran Ken Grigas talks about his time in service during the "Cold War" between the Unites States and U.S.S.R.

déc. 7, 2018
Alice in ICSLand with Lesley Carhart & Mark Stacey
Season 1Episode 1454 min

Alice in ICSLand with Lesley Carhart & Mark Stacey

The past decade has made it clear that threats of cyber attacks on Industrial Control Systems (ICS) is real, and poses a fundamental risk to our way of life. The demand of ICS security professionals far exceeds the supply. Mark and Lesley of Dragos Inc. will provide an overview of some great ways to learn about the operational and technical aspects of ICS networks without breaking the bank.

déc. 21, 2018
How to 'Theoretically' Kill a Continent with Michelle Meas
Season 1Episode 1559 min

How to "Theoretically" Kill a Continent with Michelle Meas

The human body is terrifyingly vulnerable. With the rise of novel gene-editing techniques and our increasing knowledge of genomics, we are forced to confront the idea of a microscopic enemy. This talk will explore the not-so-theoretical aftermath of an unchecked pandemic of unknown origin, the monsters we created in our own medical hubris, and the ever-present threat of bio-terrorism.

janv. 1, 2019
Embedding Security with Mike Kavka
Season 1Episode 1621 min

Embedding Security with Mike Kavka

Sequestered, cordoned off, separated, even out of touch. These words have been used by plenty of non-infosec folks. From Dev teams to Admins, Sales people and more, we get looked at as these mystical people who say nO! The people who are stopping others from doing their job. Maybe it is time for our team to take a different approach...

janv. 18, 2019
Handshakes & Hashes, Plucking Passwords from Thin Air with Robert Reif and Shannon Fritz
Season 1Episode 1751 min

Handshakes & Hashes, Plucking Passwords from Thin Air with Robert Reif and Shannon Fritz

New developments in Hashcat have brought some new WiFi attack techniques to light. We've taken concepts from classic WiFi attacks, added a little special sauce, and created a whole new attack vector for WiFi devices everywhere. All it takes is a friendly introduction and a little cracking time to gain access to protected networks. Come get some code and that uneasy feeling of being vulnerable.

févr. 1, 2019
Hidden in Plain Sight, Steganography & Digital Watermarking with Ryan Fox
Season 1Episode 1824 min

Hidden in Plain Sight, Steganography & Digital Watermarking with Ryan Fox

Steganography is the practice of hiding a message "in plain sight" inside an image, video, sound, text, or file. The practice goes back centuries, and in recent years has seen a rise in use for digital watermarking. It can be used for communication, leak prevention, or copyright protection. We'll look at techniques, analysis, and detection through the lens of digital watermarking.

févr. 15, 2019
An Interdisciplinary View of Risk, Applications for Security with Susan Lincke
Season 1Episode 1937 min

An Interdisciplinary View of Risk, Applications for Security with Susan Lincke

In 2016, 791,820,040 data records were breached in the United States, which averages two breaches per American. France, Canada and Taiwan also encountered breaches above or near their population levels - or double it. This begs the question: are we doing and spending enough for security? This study of ethical risk considers how to calculate risk and engineer solutions for this new environment.

mars 1, 2019
Hack Dumberly Not Smarterer with Tim Medin
Season 1Episode 2031 min

Hack Dumberly Not Smarterer with Tim Medin

Tim Medin discuss the dumbest red team tricks and hacks encountered over the years. We are going to take the A out of APT, because so few attackers really need to use advanced techniques. We'll also discuss the simple defenses that make an attacker's life much more difficult.

mars 13, 2019
Crypt-Oh No with Zach Grace
Season 1Episode 2143 min

Crypt-Oh No with Zach Grace

Even when the right crypto primitives are chosen, subtle programming mistakes can lead to issues with the efficacy of the encryption. This presentation is aimed at helping developers avoid common cryptography pitfalls when encrypting sensitive data by giving guidance on what algorithms to choose and identifying common implementation issues observed in real-world applications.

mars 13, 2019

Recently Updated Shows

Recently updated shows that might be of your interest.
The Great North
Running

The Great North

The Great North follows the Alaskan adventures of the Tobin family, as a single dad, Beef, does his best to keep his weird bunch of kids close - especially his only daughter, Judy, whose artistic dreams lead her away from the family fishing boat and into the glamorous world of the local mall. Rounding out the family are Judy's older brother, Wolf; his fiancé, Honeybee; her middle brother, Ham; and ten-year-old-going-on-fifty little brother, Moon. While the children's mother is not in the picture, Judy seeks guidance from her new boss, Alyson, and her imaginary friend, Alanis Morissette, who appears to her in the Northern Lights.

The Legend of Vox Machina
Running

The Legend of Vox Machina

The Legend of Vox Machina is an animated fantasy-adventure series for adults that follows Vox Machina, a band of misfits with a fondness for boozing and brawling. In a desperate attempt to pay off their mounting bar tab, these unlikely heroes end up on a quest to save the realm of Exandria from dark magical forces. From a sinister necromancer to a powerful curse, the group confronts a variety of obstacles that not only test their skills, but also the strength of their bond.

On Patrol: Live
Running

On Patrol: Live

Hosting and executive producing On Patrol: Live is Dan Abrams, CEO and Founder of Abrams Media, host of Dan Abrams Live on NewsNation, Chief Legal Analyst for ABC News, and former host of Live PD. Joining Abrams is Sgt. Sean "Sticks" Larkin, retired Tulsa Police Department lieutenant with nearly 25 years of service, and Deputy Sheriff Curtis Wilson, Division Commander with the Richland County Sheriff's Department in Columbia, SC.

GenreCrime
The Diplomat
Running

The Diplomat

In the midst of an international crisis, a career diplomat lands in a high-profile job she's unsuited for, with tectonic implications for her marriage and her political future.

The Lincoln Lawyer
Running

The Lincoln Lawyer

Mickey Haller, an iconoclastic idealist, runs his law practice out of the back seat of his Lincoln Town Car, as he takes on cases big and small across the expansive city of Los Angeles.