#
Title
RETURN TO OVERVIEW PAGE
2020-07-30
Metasploit Payloads GUI - Create Backdoors & Control Hacked Devices Easily (20:48)
BACK DOORS
2020-07-21
Backdoors & Breaches (41:04)
2020-07-02
Create Fully Undetectable Backdoors! (33:44)
2020-06-26
Linux Mint vs Snaps: Backdoors or Overreacting? (34:13)
2020-05-12
Analyzing Dark Crystal RAT, a C# backdoor
2020-04-30
Chinese Mobile Giant Xiaomi Recording Millions Of People’s ‘Private’ Web And Phone Use
2020-04-06
Innocent Vulnerabilities vs Malicious Backdoors: How to Manage Your Risk (56:16)
2020-01-16
RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection (45:38)
2019-11-27
TLS decryption attacks and back doors (30:55)
2019-10-14
China's Study the Great Nation app 'enables spying via back door'
2019-07-05
Hacker Heaven: Huawei’s Hidden Back Doors Found
2019-05-16
Mechanical Backdoors in Cold War Encryption Machines (48:24)
2019-04-01
IoT backdoors in cars (57:19)
2019-02-12
Backdoors in Cybersecurity Tools Gives Privacy Only to Outlaws (57:25)
2018
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs (50:59)
2018
GOD MODE UNLOCKED Hardware Backdoors in redacted x86 (46:03)
2018
Huge Facebook breach leaves thousands of other apps vulnerable
2018
NOKKI Malware Sports Mysterious Link to Reaper APT Group
2017
Alternatives to Government-Mandated Encryption Backdoors - Andrew Keane Woods
2017
AN OBSCURE APP FLAW CREATES BACKDOORS IN MILLIONS OF SMARTPHONES
2017
Analysis of TeleBots’ cunning backdoor
2017
Android backdoor GhostCtrl can do many unusual things
2017
Backdoor built in to widely used tax app seeded last week’s NotPetya outbreak
2017
Behind the CARBANAK Backdoor
2017
Encryption and Back Doors: The Line between Privacy and National Security (41:50)
2017
EU wants to ban encryption backdoors to protect your data from governments and the law
2017
Google opens up on Titan security: Here's how chip combats hardware backdoors
2017
Local governments keep using this software — but it might be a back door for Russia
2017
Ransomware attack is why we can't have security backdoors, say privacy advocates
2017
There Might Be a Hidden Backdoor in Your Computer (29:31)
2016
Amazon’s customer service backdoor
2016
Backdoors in Pseudorandom Number Generators Possibility and Impossibility Results - Crypto 2016 (20:34)
2016
Et tu, Fortinet? Hard-coded password raises new backdoor eavesdropping fears
2016
Pandora's iPhone (cartoon)
2016
Thinking About the Term "Backdoor"
2016
U.S. Congressman Warns Juniper Network Breach Demands More Government Attention | Hacked
2016
Using distributed code-signatures to make it much harder to order secret backdoors
2016
Why All Writs Is a Trojan Horse
2015
An Open Letter to Prime Minister Cameron: 20th-century solutions won’t help 21st-century surveillance
2015
Backdoors and Weak Passwords - Bill Buchanan (32:15)
2015
Finding government and vendor hardware backdoors - Kaspersky Labs (22:33)
2015
NSA director defends plan to maintain 'backdoors' into technology companies
2015
Tougher encryption guidelines close a back door for NSA spies
2015
US tech firms ask China to postpone 'intrusive' rules
2015
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware (47:30)
2015
Windows 10 announcement: certified hardware can lock out competing OSes
2014
Hello, Dave. I control your thermostat. Google's Nest gets hacked
2014
Netcore, Netis routers have hardcoded password, Trend Micro says
2014
Revealed: how Whisper app tracks ‘anonymous’ users
2013
Documents Reveal Top NSA Hacking Unit
2011
Back Door Man (The Doors) (3:34)