Side-channel attacks

Pacman (security vulnerability)

Pacman (stylized PACMAN or PacMan) is an exploit that takes advantage of a hardware bug in the speculative execution function of the Apple M1 processors which was made public on June 10, 2022 by MIT security researchers. The flaw is in a hardware security feature called pointer authentication codes (PAC) and is believed to be intrinsic to the platform and unable to be patched. The M1 was the first ARM desktop CPU to implement pointer authentication. Apple stated that they did not believe the vulnerability posed a serious danger to users because it requires specific conditions to be exploited. An exploit would involve a combination of memory corruption and speculative execution. (Wikipedia).

Pacman (security vulnerability)
Video thumbnail

PHP Security Pt 3

In this PHP Security video tutorial I go over the most vulnerable ways hackers attack websites. Website Authentication Cracking and Client Side Manipulation with Intercepting Proxy.

From playlist PHP Security

Video thumbnail

HTML5 JS Security - maty siman

JavaScript controls our lives -- we use it to zoom in and out of a map, to automatically schedule doctor appointments and to play online games. But have we ever properly considered the security state of this scripting language? Before dismissing the (in)security posture of JavaScript on t

From playlist AppSec California 2014

Video thumbnail

How To Create PacMan Game In Unity | Session 08 | #unity #gamedev

Don’t forget to subscribe! This project series is about how to create a PacMan game in Unity. This tutorial will teach you how to create a PacMan game from the ground up using Unity and C#, including level construction, simple enemy AI, and pill collection. It will also teach you the b

From playlist Create PacMan Game In Unity

Video thumbnail

How To Create PacMan Game In Unity | Session 06 | #unity #gamedev

Don’t forget to subscribe! This project series is about how to create a PacMan game in Unity. This tutorial will teach you how to create a PacMan game from the ground up using Unity and C#, including level construction, simple enemy AI, and pill collection. It will also teach you the b

From playlist Create PacMan Game In Unity

Video thumbnail

Some Comments on the Security of RSA

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Internet Safety: Your Browser's Security Features

In this video, you’ll learn more about your browser's security features. Visit https://www.gcflearnfree.org/internetsafety/your-browsers-security-features/1/ for our text-based lesson. This video includes information on: • Using browser security to check web addresses and identify securit

From playlist Internet Tips

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

How To Create Your Own Pentesting Distribution

In this video, I will be showing you how to set up your own penetration testing distribution by leveraging various open-source frameworks & repos like The PenTesters Framework and the BlackArch repos to install the tools you require. Timestamps 0:00 Introduction 6:00 PenTesters Framework

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

IP Security: Part 1

Fundamental concepts of IPSec are discussed. Authentication Header is explained. ESP & IKE are analyzed.

From playlist Network Security

Video thumbnail

DEF CON DC9111 - Docker For Pentesting & Bug Bounty Hunting

Alexis Ahmed's talk on DC9111 0x03 SAFE MODE event by DEF CON Delhi Group. In this presentation, I explain the importance of Docker and how it can be utilized for pentesting & bug bounty hunting. I also showcase how to set up Kali Linux, OWASP Juice Shop & Bug Bounty Toolkit on Docker. -

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Staysafe.org: Protect your computer

The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer

From playlist awareness

Video thumbnail

How To Install And Configure Arch Linux For Penetration Testing

In this video, I demonstrate how to install Arch Linux on VirtualBox and how to set up the BlackArch repos to enable the installation of penetration testing and security tools. Arch Linux is a Linux distribution for computers based on x86-64 architectures. The Arch Linux repositories conta

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

How To Install VMware Tools On BlackArch Linux

Hey guys! In this video, I will be showing you how to install Vmware tools and VirtualBox guest utilities on BlackArch Linux. BlackArch is a penetration testing distribution based on Arch Linux that provides a large number of cybersecurity tools. It is an open-source distro created especia

From playlist BlackArch Linux Training

Video thumbnail

Digital security - threats, risks and how to protect yourself | Part I

Support this channel on Patreon https://www.patreon.com/thehatedone Part I of the full talk with Daniel from Safing.io. We discuss the current state of digital security, most common threats, GDPR, artificial intelligence and quantum computing. Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC

From playlist Security by compartmentalization - learn to protect your privacy effectively

Video thumbnail

Why Do Snaps Get So Much Hate?

Today I talk about why Snaps and Snapd get so much hate, and why maybe they're not so bad. 👇 PULL IT DOWN FOR THE GOOD STUFF 👇 Patreon - https://patreon.com/thelinuxcast Liberapay - https://liberapay.com/thelinuxcast/ Youtube - https://www.youtube.com/channel/UCylGUf9BvQooEFjgdNudoQg/jo

From playlist Rambles

Video thumbnail

How To Install Desktop Environments And Change Screen Resolution With xrandr

Hey guys! In this video, I will be showing you how to install desktop environments and how to change the screen resolution with xrandr on BlackArch Linux. BlackArch is a penetration testing distribution based on Arch Linux that provides a large number of cybersecurity tools. It is an open-

From playlist BlackArch Linux Training

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

How To Create PacMan Game In Unity | Session 05 | #unity #gamedev

Don’t forget to subscribe! This project series is about how to create a PacMan game in Unity. This tutorial will teach you how to create a PacMan game from the ground up using Unity and C#, including level construction, simple enemy AI, and pill collection. It will also teach you the b

From playlist Create PacMan Game In Unity

Related pages

Side-channel attack