45 min
When physical security depends on IT security
56 min
digital radio technology beyond GSM
55 min
Or: How I walked in and misbehaved
51 min
A look at the security of 3rd party iOS applications
40 min
A roundup of one the most advanced open hardware projects
51 min
Wardriving phone networks
58 min
Some details about SIM cards
51 min
Attacks on common failures when encrypting credit card…