Side-channel attacks

SWAPGS (security vulnerability)

SWAPGS, also known as Spectre variant 1 (swapgs), is a computer security vulnerability that utilizes the branch prediction used in modern microprocessors. Most processors use a form of speculative execution, this feature allows the processors to make educated guesses about the instructions that will most likely need to be executed in the near future. This speculation can leave traces in the cache, which attackers use to extract data using a timing attack, similar to side-channel exploitation of Spectre. The Common Vulnerabilities and Exposures ID issued to this vulnerability is CVE-2019-1125. (Wikipedia).

Video thumbnail

Ledger Hack: SIM Swap Attack. Protect Yourself Now. Right Now. Learn How.

One of the biggest risks to cryptocurrency owners is SIM swapping. With the ledger hack, we're once again seeing an influx of SIM swap attacks. What is a SIM swap attack? How can you protect yourself from SIM swaps? Learn what you need to do right now. Chapters 0:00 Your hardware wallet

From playlist Ledger Hack Playlist

Video thumbnail

What are Swaps? Financial Derivatives Tutorial

In todays video we learn about Swaps. These classes are all based on the book Trading and Pricing Financial Derivatives, available on Amazon at this link. https://amzn.to/2WIoAL0 Check out our website http://www.onfinance.org/ Follow Patrick on twitter here: https://twitter.com/Patrick

From playlist Swaps

Video thumbnail

What are Dividend Swaps, commodity swaps, equity swaps?

In todays video we will learn about Dividend Swaps, Commodity Swaps and Equity Swaps. These classes are all based on the book Trading and Pricing Financial Derivatives, available on Amazon at this link. https://amzn.to/2WIoAL0 Check out our website http://www.onfinance.org/ Follow Patri

From playlist Swaps

Video thumbnail

Internet Safety: Your Browser's Security Features

In this video, you’ll learn more about your browser's security features. Visit https://www.gcflearnfree.org/internetsafety/your-browsers-security-features/1/ for our text-based lesson. This video includes information on: • Using browser security to check web addresses and identify securit

From playlist Internet Tips

Video thumbnail

LastPass Data Breach - Password Security 101

In this episode of CyberTalk, I discuss the latest LastPass data breach (December 2022) and outline a failsafe password management policy for you, your family, and or your business. The following is a set of password security and management guidelines you should follow: 1. Generate secure

From playlist Cybertalk

Video thumbnail

Symmetric Key Cryptography | Stream Cipher & Block Cipher Explained | Network Security | Simplilearn

This video on Symmetric Key Cryptography will acquaint you with the process of symmetric encryption and decryption. Here, we take a small recap into cryptography, the working and applications of symmetric key cryptography, and its advantages. We also have stream cipher and block cipher exp

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Staysafe.org: Protect your computer

The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer

From playlist awareness

Video thumbnail

Security Vulnerability Mitigations

Security vulnerabilities allow software to be manipulated in such a way that it misbehaves to the benefit of an attacker - security vulnerability mitigations work to thwart attempts to successfully exploit such a vulnerability. This landscape is continually changing in both the types of at

From playlist Security

Video thumbnail

Web App Vulnerabilities - DevSecOps Course for Beginners

In this DevSecOps course, you will learn how to take advantage of common web vulnerabilities, how to fix those vulnerabilities, and how to use DevSecOps tools to make sure your applications (and containers) are secure. You will also learn all about DevSecOps. 💻 Get the goof example app sh

From playlist DevOps Courses

Video thumbnail

22C3: Vulnerability markets

Speaker: Rainer Böhme What is the economic value of a zero-day exploit? What is the market value of a zero-day exploit? It is evident that information on vulnerabilities and information security threads is very valuable, but the market for it is neither structured nor liquid. This talk

From playlist 22C3: Private Investigations

Video thumbnail

Rasa Office Hours: Jamie MacDonald, Senior Security Engineer (Security Advisory Special Edition)

Our weekly Rasa Office Hours! This week we'll be joined by Jamie MacDonald, Senior Security Engineer to talk about our recent security advisory (https://github.com/RasaHQ/rasa/security/advisories), what it means and what we recommend you do. (Plus answer your questions, of course!) Want t

From playlist Rasa Office Hours

Video thumbnail

Why is SCADA Security an Uphill Battle? - Amol Sarwate

Why is SCADA Security an Uphill Battle? - Amol Sarwate This talk will present technical security challenges faced by organizations that have SCADA, critical infrastructure or control systems installations. It will provide examples of attacks and examples of security controls that orginiza

From playlist AppSecUSA 2013

Video thumbnail

DevOpsDays Boston 2022: Andreas Grabner - DevSecOps by Default: What have, can and must we learn...

Andreas Grabner - DevSecOps by Default: What have, can and must we learn from Log4Shell? It’s been a couple of months since Log4Shell ruined many Christmas holidays for developers, architects, ITOps and especially Dev(Sec)Ops teams. How did this incident help us strengthen our software su

From playlist DevOpsDays Boston 2022

Video thumbnail

Cloud OnAir: Unravel the mystery of container security

Containers are increasingly being used to deploy applications, and with good reason, given their portability, scalability and lower management burden. However, the security of containerized applications is still not well understood. Join this webinar to learn - how container security diff

From playlist Center for Applied Cybersecurity Research (CACR)

Video thumbnail

DeepSec 2010: Attacking SAP Users Using sapsploit extended

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Alexander Polyakov, Digital Security Business applications like ERP, CRM, SRM and others are one of the major topics within the field of computer security as these applic

From playlist DeepSec 2010

Video thumbnail

RubyHACK 2018: Ruby Web Application Security Defense in Depth by Jeremy Evans

RubyHACK 2018: Ruby Web Application Security Defense in Depth by Jeremy Evans How bad a shape would you be in if an attacker was able to exploit a remote code execution vulnerability in your web application? When designing web applications that deal with confidential information, you shou

From playlist RubyHACK 2018

Video thumbnail

Cybersecurity and COVID-19: Lessons from recent breaches and how COVID-19 affects security

In this webinar, Neil Daswani, Co-Director of the Stanford Advanced Computer Security Program, discusses the cyber landscape in light of COVID-19 and offer advice on how to maintain cyber security. Together you and Neil will explore the lessons learned from recent mega-breaches and examine

From playlist Stanford Webinars

Video thumbnail

SOURCE Boston 2008: Vulnerability in the Real World: Lessons from both sides of the fence

Speaker: Ryan Permeh There is a distinct rift between software vendors and security researchers. Common ground between these camps is sometimes difficult to find. From experience, both sides have much to offer the other. By utilizing researcher techniques, software vendors can build safer

From playlist SOURCE Boston 2008

Video thumbnail

Transport Layer Security: Part 2 - TLS & HTTPS

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Related pages

Timing attack | Microarchitectural Data Sampling | Computer security | Spectre (security vulnerability)