# Title RETURN TO OVERVIEW PAGE
2020-07-30 Metasploit Payloads GUI - Create Backdoors & Control Hacked Devices Easily (20:48) BACK DOORS
2020-07-21 Backdoors & Breaches (41:04)
2020-07-02 Create Fully Undetectable Backdoors! (33:44)
2020-06-26 Linux Mint vs Snaps: Backdoors or Overreacting? (34:13)
2020-05-12 Analyzing Dark Crystal RAT, a C# backdoor
2020-04-30 Chinese Mobile Giant Xiaomi Recording Millions Of People’s ‘Private’ Web And Phone Use
2020-04-06 Innocent Vulnerabilities vs Malicious Backdoors: How to Manage Your Risk (56:16)
2020-01-16 RFC 1984: Or why you should start worrying about encryption backdoors and mass data collection (45:38)
2019-11-27 TLS decryption attacks and back doors (30:55)
2019-10-14 China's Study the Great Nation app 'enables spying via back door'
2019-07-05 Hacker Heaven: Huawei’s Hidden Back Doors Found
2019-05-16 Mechanical Backdoors in Cold War Encryption Machines (48:24)
2019-04-01 IoT backdoors in cars (57:19)
2019-02-12 Backdoors in Cybersecurity Tools Gives Privacy Only to Outlaws (57:25)
2018 GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs (50:59)
2018 GOD MODE UNLOCKED Hardware Backdoors in redacted x86 (46:03)
2018 Huge Facebook breach leaves thousands of other apps vulnerable
2018 NOKKI Malware Sports Mysterious Link to Reaper APT Group
2017 Alternatives to Government-Mandated Encryption Backdoors - Andrew Keane Woods
2017 AN OBSCURE APP FLAW CREATES BACKDOORS IN MILLIONS OF SMARTPHONES
2017 Analysis of TeleBots’ cunning backdoor
2017 Android backdoor GhostCtrl can do many unusual things
2017 Backdoor built in to widely used tax app seeded last week’s NotPetya outbreak
2017 Behind the CARBANAK Backdoor
2017 Encryption and Back Doors: The Line between Privacy and National Security (41:50)
2017 EU wants to ban encryption backdoors to protect your data from governments and the law
2017 Google opens up on Titan security: Here's how chip combats hardware backdoors
2017 Local governments keep using this software — but it might be a back door for Russia
2017 Ransomware attack is why we can't have security backdoors, say privacy advocates
2017 There Might Be a Hidden Backdoor in Your Computer (29:31)
2016 Amazon’s customer service backdoor
2016 Backdoors in Pseudorandom Number Generators Possibility and Impossibility Results - Crypto 2016 (20:34)
2016 Et tu, Fortinet? Hard-coded password raises new backdoor eavesdropping fears
2016 Pandora's iPhone (cartoon)
2016 Thinking About the Term "Backdoor"
2016 U.S. Congressman Warns Juniper Network Breach Demands More Government Attention | Hacked
2016 Using distributed code-signatures to make it much harder to order secret backdoors
2016 Why All Writs Is a Trojan Horse
2015 An Open Letter to Prime Minister Cameron: 20th-century solutions won’t help 21st-century surveillance
2015 Backdoors and Weak Passwords - Bill Buchanan (32:15)
2015 Finding government and vendor hardware backdoors - Kaspersky Labs (22:33)
2015 NSA director defends plan to maintain 'backdoors' into technology companies
2015 Tougher encryption guidelines close a back door for NSA spies
2015 US tech firms ask China to postpone 'intrusive' rules
2015 Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware (47:30)
2015 Windows 10 announcement: certified hardware can lock out competing OSes
2014 Hello, Dave. I control your thermostat. Google's Nest gets hacked
2014 Netcore, Netis routers have hardcoded password, Trend Micro says
2014 Revealed: how Whisper app tracks ‘anonymous’ users
2013 Documents Reveal Top NSA Hacking Unit
2011 Back Door Man (The Doors) (3:34)