Home / Series / BSides Las Vegas / Aired Order /
  • TheTVDB.com Season ID 819703
  • Created October 29, 2018
  • Modified October 29, 2018
When available, episode names will be translated into your preferred language. Otherwise they will be shown using the series' origin language.
Name First Aired Runtime Image
S2014E01 Opening Keynote -- Beyond Good and Evil: Towards Effective Security
August 5, 2014
S2014E02 SHA-1 backdooring and exploitation
August 5, 2014
S2014E03 #edsec: Hacking for Education
August 5, 2014
S2014E04 The Power Law of Information
August 5, 2014
S2014E05 USB write blocking with USBProxy
August 5, 2014
S2014E06 Skull And Bones (And Warez) - Secret Societies of the Computer Underground (and why you should create one too)
August 5, 2014
S2014E07 So, you want to be a pentester?
August 5, 2014
S2014E08 Evading code emulation: Writing ridiculously obvious malware that bypasses AV
August 5, 2014
S2014E09 Measuring the IQ of your Threat Intelligence feeds
August 5, 2014
S2014E10 Secure your email – Secure your password
August 5, 2014
S2014E11 Allow myself to encrypt...myself!
August 5, 2014
S2014E12 Custodiet watches your packets! The Open Source MSSP Framework
August 5, 2014
S2014E13 Securing Sensitive Data: A Strange Game
August 5, 2014
S2014E14 Is Pavlovian Password Management The Answer?
August 5, 2014
S2014E15 Highlights of CMU’s Recent Work in Preventing Bad Passwords
August 5, 2014
S2014E16 DoCatsLikeLemon? – Advanced phrase attacks and analysis
August 5, 2014
S2014E17 Password Hashing Competition: the Candidates
August 5, 2014
S2014E18 Brick in the Wall vs Hole in the Wall
August 5, 2014
S2014E19 What reaction to packet loss reveals about a VPN
August 5, 2014
S2014E20 Security Management Without the Suck
August 5, 2014
S2014E21 Master Serial Killer
August 5, 2014
S2014E22 Strategies Without Frontiers
August 5, 2014
S2014E23 Tradeoff cryptanalysis of password hashing schemes
August 5, 2014
S2014E24 What Microsoft would like from the Password Hashing Competition
August 5, 2014
S2014E25 Cut the sh**: How to reign in your IDS
August 5, 2014
S2014E26 Using cryptanalysis to speed-up password cracking
August 5, 2014
S2014E27 Untwisting the Mersenne Twister: How I killed the PRNG
August 5, 2014
S2014E28 Vulnerability Assessments on SCADA: How i 'owned' the Power Grid
August 5, 2014
S2014E29 501(c)(3) for (un)fun and (non)profit
August 5, 2014
S2014E30 Geek Welfare -- Confessions of a Convention Swag Hoarder
August 5, 2014
S2014E31 ClusterF*ck - Actionable Intelligence from Machine Learning
August 5, 2014
S2014E32 Password Security in the PCI DSS
August 5, 2014
S2014E33 How Forced Password Expiration Affects Password Choice
August 5, 2014
S2014E34 No InfoSec Staff? No Problem
August 5, 2014
S2014E35 Anatomy of memory scraping, credit card stealing POS malware
August 5, 2014
S2014E36 Malware Analysis 101 - N00b to Ninja in 60 Minutes
August 5, 2014
S2014E37 Protecting Data – How Cultural-Political Heritage Shapes Security Approaches
August 5, 2014
S2014E38 Can I Code Against an API to Learn a Product?
August 5, 2014
S2014E39 Know thy operator
August 5, 2014
S2014E40 Defense with 2FA
August 5, 2014
S2014E41 Security for the People: End-User Authentication Security on the Internet
August 5, 2014
S2014E42 Bridging the Air Gap: Cross Domain Solutions
August 5, 2014
S2014E43 Cluck Cluck: On Intel's Broken Promises
August 5, 2014
S2014E44 Travel Hacking With The Telecom Informer
August 5, 2014
S2014E45 FAP Fully Automated Pwning Techniques for Automated Reversing
August 5, 2014
S2014E46 Improving security by avoiding traffic and still get what you want in data transfers
August 5, 2014
S2014E47 Back Dooring the Digital Home
August 5, 2014
S2014E48 I have the hashcat so I make the rules
August 5, 2014
S2014E49 Authentication in the Cloud – Building Service
August 5, 2014
S2014E50 The Semantic Age - or - A Young Ontologist's Primer
August 5, 2014
S2014E51 Penetrate your OWA
August 5, 2014
S2014E52 How EFF is Making STARTTLS Resistant to Active Attacks
August 5, 2014
S2014E53 Offline bruteforce attack on Wifi Protected Setup
August 5, 2014
S2014E54 All your SAP P@$$w0ЯdZ belong to us
August 6, 2014
S2014E55 Proof of work as an additional factor of authentication
August 6, 2014
S2014E56 iOS URL Schemes: omg://
August 6, 2014
S2014E57 A Better Way to Get Intelligent About Threats
August 6, 2014
S2014E58 The untold story about ATM Malware
August 6, 2014
S2014E59 A&Q Session - Communications Presentation
August 6, 2014
S2014E60 A&Q Session - Disclosure
August 6, 2014
S2014E61 A&Q Session - Burnout
August 6, 2014
S2014E62 A&Q Session - Legal
August 6, 2014
S2014E63 A&Q Session Media
August 6, 2014
S2014E64 A&Q Session - X Altruism
August 6, 2014
S2014E65 A&Q Session - Career
August 6, 2014
S2014E66 Business lessons that made me a better Security Professional
August 6, 2014
S2014E67 Target specific automated dictionary generation
August 6, 2014
S2014E68 The future of mobile authentication is here
August 6, 2014
S2014E69 Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter
August 6, 2014
S2014E70 Bring your own Risky Apps
August 6, 2014
S2014E71 Using Superpowers for Hardware Reverse Engineering
August 6, 2014
S2014E72 Reverse Engineering Mac Malware
August 6, 2014
S2014E73 What I've Learned As A Con-Man
August 6, 2014
S2014E74 Bitslice DES with LOP3.LUT
August 6, 2014
S2014E75 Password hashing delegation: How to get clients work for you
August 6, 2014
S2014E76 Training with Raspberry Pi
August 6, 2014
S2014E77 Invasive Roots of Anti-Cheat Software
August 6, 2014
S2014E78 Why am I surrounded by friggin' idiots?!? (Because you hired them!)
August 6, 2014
S2014E79 Secret Pentesting Techniques Part Duex
August 6, 2014
S2014E80 Net hashes: A review of many network protocols
August 6, 2014
S2014E81 Throw the User ID Down the Well
August 6, 2014
S2014E82 Black Magic and Secrets: How Certificates Influence You!
August 6, 2014
S2014E83 Attacking Drupal
August 6, 2014
S2014E84 Vaccinating Android
August 6, 2014
S2014E85 Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY
August 6, 2014
S2014E86 Energy-efficient bcrypt cracking
August 6, 2014
S2014E87 Password Generators & Extended Character Set Passwords
August 6, 2014
S2014E88 Ripped from the Headlines What the news tells us about Information Security Incidents
August 6, 2014
S2014E89 RFID Hacking
August 6, 2014
S2014E90 Hackers vs Auditors
August 6, 2014
S2014E91 Insider Threat Kill Chain: Human Indicators of Compromise
August 6, 2014
S2014E92 Security testing for Smart Metering Infrastructure
August 6, 2014
S2014E93 Fuck These Guys: Practical Countersurveillance
August 6, 2014
S2014E94 The problem with the real world
August 6, 2014
S2014E95 Encryption and Authentication: Passwords for all reasons
August 6, 2014
S2014E96 Third-Party Service Provider Diligence: Why are we doing it all wrong?
August 6, 2014
S2014E97 A Place to Hang Our Hats: Security Community and Culture
August 6, 2014
S2014E98 Pwning the hapless or How to Make Your Security Program Not Suck
August 6, 2014
S2014E99 Password Topology Histogram Wear-Leveling, a.k.a. PathWell
August 6, 2014
S2014E100 Enhancing Password Based Key Derivation Techniques
August 6, 2014
S2014E101 The Savage Curtain
August 6, 2014
S2014E102 Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014
August 6, 2014
S2014E103 Ask the EFF
August 6, 2014
S2014E104 Teach a man to Phish...
August 6, 2014
S2014E105 The Lore shows the Way
August 6, 2014
S2014E106 Beam Me Up Scotty! – Passwords in the Enterprise
August 6, 2014
S2014E107 Capturing Passwords into the Secure Desktop
August 6, 2014
S2014E108 We Hacked the Gibson! Now what?
August 6, 2014
S2014E109 The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
August 6, 2014
S2014E110 Closing Keynote
season finale
August 6, 2014

No artwork of this type.

No artwork of this type.

No artwork of this type.

No artwork of this type.