Courses from 1000+ universities
Buried in Coursera’s 300-page prospectus: two failed merger attempts, competing bidders, a rogue shareholder, and a combined market cap that shrank from $3.8 billion to $1.7 billion.
600 Free Google Certifications
Management & Leadership
Web Development
Digital Marketing
Extreme Geological Events
Teaching Young Learners Online
IngenierÃa de aeropuertos: diseño del lado aire según OACI (ICAO)
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Reverse-engineering bootloaders of popular microcontrollers to assess vulnerabilities in readout protection, focusing on software-based attacks and critical flaws in specific chip families.
Explore Apple's Continuity protocol, examining privacy and security implications of seamless device communication. Uncover potential vulnerabilities in AirDrop, iMessage, and other features within Apple's ecosystem.
Explore security vulnerabilities in Bluetooth proximity authentication, including new attacks on Android Smart Lock and Windows Dynamic Lock, and learn potential fixes for these issues.
Discover a tool for identifying vulnerable OEM IoT devices across thousands of images, revealing security risks in both supplier and vendor firmware distributions.
Unveiling advanced Java deserialization vulnerabilities: analysis of 10,000+ libraries, new exploit techniques, and their profound impact on Java security. Enhances attack vectors beyond deserialization.
Explore vulnerabilities in 4G/5G networks, focusing on the ToRPEDO attack that exploits paging occasions to compromise user privacy and security.
Explore Cisco's innovative BYOT solution replacing traditional smartcards, enabling self-provisioned digital identities for enhanced authentication and cryptographic functions using USB tokens.
Explore techniques for detecting hidden injected code through page table entry analysis, covering both intentional malware concealment and unintentional OS paging mechanisms.
Explore coverage-based fuzzing of RDP client virtual channels, targeting complex functionalities like Sound, Graphics, USB, and Filesystem to uncover potential vulnerabilities and crashes.
Explore iOS kernel emulation on QEMU, achieving interactive bash shell and live kernel debugging. Discover groundbreaking research towards a full open-source iOS system emulator.
Insights and humor from Black Hat's Network Operations Center, revealing security professionals' behavior on open WiFi and discussing network setup, security, and improvements.
Explore Project Zero's impact on cybersecurity, its core principles, and the need for such initiatives in the tech industry. Gain insights into vulnerability research and mitigation strategies.
Explore implications of poor cryptographic API design, insecure certificate chain validation, and widespread usage of APIs like Android SafetyNet. Recommendations for implementers and API authors are proposed.
Explore attack paths on a major bank HSM, including unauthenticated methods for full control, in this technical presentation targeting high-security solutions.
Explore modern application security challenges in DevSecOps, including evolving web technologies, persistent vulnerabilities, and emerging framework defenses against common threats.
Get personalized course recommendations, track subjects and courses with reminders, and more.