Media Summary: Two huge security issues found in almost all modern processors. How do they work and what can we do about it? Let's find out! Squarespace link: Visit and use offer code TECHQUICKIE to save 10% off your first order. Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP...

Spectre Meltdown Computerphile - Detailed Analysis & Overview

Two huge security issues found in almost all modern processors. How do they work and what can we do about it? Let's find out! Squarespace link: Visit and use offer code TECHQUICKIE to save 10% off your first order. Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP... Over the past decades, security has been largely regarded as a software developer's responsibility, while hardware vendors have ... Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's ... Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike ...

A presentation on my understanding of the Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr ... The Port Smash exploits Hyperthreading and timings to work out what other programs are doing. Dr Steve Bagley looks at how. Why does my neighbour hear the score in the big game before I do? Dr Steve Bagley looks at why video streams suffer delays. Wanacrypt works super fast and even when you're offline. Dr Pound explains how hybrid ransomware systems work. Original ... Gentle overview of the core ideas exploited by the

Photo Gallery

Spectre & Meltdown - Computerphile
Meltdown & Spectre vulnerabilities - Simply Explained
Meltdown and Spectre in 3 Minutes
Why are Spectre and Meltdown So Dangerous?
TCP Meltdown - Computerphile
Leaky processors: Lessons from Spectre, Meltdown, and Foreshadow
How Meltdown and Spectre Make Your Computer Vulnerable
Running a Buffer Overflow Attack - Computerphile
Meltdown And Spectre
Power LED Attack - Computerphile
Meltdown and Spectre - Understanding and mitigating the threats - SANS DFIR Webcast
What's Behind Port Smash? - Computerphile
View Detailed Profile
Spectre & Meltdown - Computerphile

Spectre & Meltdown - Computerphile

Spectre

Meltdown & Spectre vulnerabilities - Simply Explained

Meltdown & Spectre vulnerabilities - Simply Explained

Two huge security issues found in almost all modern processors. How do they work and what can we do about it? Let's find out!

Meltdown and Spectre in 3 Minutes

Meltdown and Spectre in 3 Minutes

Meltdown

Why are Spectre and Meltdown So Dangerous?

Why are Spectre and Meltdown So Dangerous?

Squarespace link: Visit http://squarespace.com/techquickie and use offer code TECHQUICKIE to save 10% off your first order.

TCP Meltdown - Computerphile

TCP Meltdown - Computerphile

Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP...

Leaky processors: Lessons from Spectre, Meltdown, and Foreshadow

Leaky processors: Lessons from Spectre, Meltdown, and Foreshadow

Over the past decades, security has been largely regarded as a software developer's responsibility, while hardware vendors have ...

How Meltdown and Spectre Make Your Computer Vulnerable

How Meltdown and Spectre Make Your Computer Vulnerable

Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's ...

Running a Buffer Overflow Attack - Computerphile

Running a Buffer Overflow Attack - Computerphile

Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow attack. Assistant Professor Dr Mike ...

Meltdown And Spectre

Meltdown And Spectre

A presentation on my understanding of the

Power LED Attack - Computerphile

Power LED Attack - Computerphile

Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr ...

Meltdown and Spectre - Understanding and mitigating the threats - SANS DFIR Webcast

Meltdown and Spectre - Understanding and mitigating the threats - SANS DFIR Webcast

On Jan 3 2018, two new vulnerabilities (

What's Behind Port Smash? - Computerphile

What's Behind Port Smash? - Computerphile

The Port Smash exploits Hyperthreading and timings to work out what other programs are doing. Dr Steve Bagley looks at how.

Video Streaming Problems - Computerphile

Video Streaming Problems - Computerphile

Why does my neighbour hear the score in the big game before I do? Dr Steve Bagley looks at why video streams suffer delays.

CPUs Are Out of Order - Computerphile

CPUs Are Out of Order - Computerphile

Spectre

Explaining the Spectre and Meltdown Vulnerabilities

Explaining the Spectre and Meltdown Vulnerabilities

This video provides an overview of the

How WanaCrypt Encrypts Your Files - Computerphile

How WanaCrypt Encrypts Your Files - Computerphile

Wanacrypt works super fast and even when you're offline. Dr Pound explains how hybrid ransomware systems work. Original ...

How to Check Your Linux PC for Meltdown or Spectre Vulnerability FINAL

How to Check Your Linux PC for Meltdown or Spectre Vulnerability FINAL

Meltdown

Spectre and Meltdown attacks explained understandably

Spectre and Meltdown attacks explained understandably

Gentle overview of the core ideas exploited by the