• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2020
  • 2019
  • 2018
  • 2017
Edition logo

Securi-Tay 2019

2019-03-01
  • Thumbnail for the video - click to play

    ►

    Introduction
    - Abertay Ethical Hacking Society
  • Thumbnail for the video - click to play

    ►

    Software Security: Never Stop Evolving
    - Nick Murison
  • Thumbnail for the video - click to play

    ►

    We Take Your Security Seriously. Or Do We?
    - The Beer Farmers
  • Thumbnail for the video - click to play

    ►

    Beyond Windows Forensics With Built-In Microsoft Tooling
    - Thomas V Fischer
  • Thumbnail for the video - click to play

    ►

    Obfuscating PDF Malware: How I Nearly Created A FUD
    - Jonathan Ross
  • Thumbnail for the video - click to play

    ►

    GPU Accelerated Security
    - Andrew Calder
  • Thumbnail for the video - click to play

    ►

    7 Hardware Hacks For 7GBP
    - Joe FitzPatrick
  • Thumbnail for the video - click to play

    ►

    RATs, Crypters & Zombies: A History Of Consumer Malware
    - Dan Nash
  • Thumbnail for the video - click to play

    ►

    Profiling The Attacker: Why Data Is Good, But Context Is Better
    - James Stevenson
  • Thumbnail for the video - click to play

    ►

    Using Natural Language Processing Techniques To Crack Passwords
    - Robin Vickery
  • Thumbnail for the video - click to play

    ►

    Ridiculous Radios
    - Dominic Spill
  • Thumbnail for the video - click to play

    ►

    Physical Security Games: Lessons Learnt Building CTF Challenges For Hackers
    - Steve Wilson
  • Thumbnail for the video - click to play

    ►

    Striking While The Iron's Hot The Do's And Dont's For Getting A Job In Infosec
    - J Stevenson,C Ungar,B Calderbank and D Nash & J Wilson
  • Thumbnail for the video - click to play

    ►

    Hardware Isn't Hard
    - Graham Sutherland
  • Thumbnail for the video - click to play

    ►

    Mobile Application Hardening: Protecting Business Critical Apps
    - Grant Douglas And Nikola Cucakovic
  • Thumbnail for the video - click to play

    ►

    From Breaking In To Breaking Through: The Applicability Of Skills From Social Engineering To Teaching Security Behaviours
    - Rose Regina Lawrence
  • Thumbnail for the video - click to play

    ►

    Intro To Machine Learning For Hackers
    - Helena Lucas
  • Thumbnail for the video - click to play

    ►

    Where 2 Worlds Collide: Bringing Mimikatz Et Al To UNIX
    - Tim Wadhwa-Brown
  • Thumbnail for the video - click to play

    ►

    Weaponising Layer-8
    - Stefan Hager
  • Video will not be published
    It Might Get Loud! Exfiltrating Data Using Audio Interfaces
    - Miguel Marques
  • Video will not be published
    Back To School: Bringing It Back To The Students
    - Callan Garratley
  • Video will not be published
    ISIS Online: Junaid Hussain
    - Michael Jack
  • Thumbnail for the video - click to play

    ►

    Closing Remarks
    - Abertay Ethical Hacking Society