sex +/- drugs: known vulns and exploits
|
|
Press Start: The basics of malware analysis
|
|
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics)
|
Andrew Hay
|
Google-jacking: A review of Google’s 2-Factor Authentication
|
Craig Young
|
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches
|
|
Cash Rules Everything Around Me: The Commercialization of Online Spying
|
|
Sorry Your Princess is in Another Castle: Intrusion Deception to Protect the Web
|
|
Strategic Cyber Security & Warfare: If We Don’t Get It Right, People Die
|
|
Chinese Advanced Persistent Threats: Corporate Cyber Espionage Processes and Organizations
|
|
Building a Security Graph
|
Dan Hubbard
|
The Pineapple Express: Live mobile application hacking demonstration....A speeding bullet to the mobile backend
|
|
SCADA Protection: Imminent Phishing Attacks and The U.S. Cyber Strategy
|
|
Hitting above the Security Mendoza Line
|
|
Penetration Testing is Stupid
|
|
An Anti-Forensics Primer
|
|
RFID Credentials or (Cyber Pearl 9/11 Harbor of DOOM)
|
|
Stick Around - Windows Persistence from Weak Sauce to #Winning
|
Matt Hastings
|
“I want my PC back!”: An in-depth look at ransomware
|
|
JavaScript Security and HTML5
|
|
Build your own Android botnet
|
|
SSL++ : Tales of Transport Layer Security at Twitter
|
|
Why are we still vulnerable to side channel attacks? (and why should I care?)
|
Jasper van Woudenberg
|
My First Incident Response Team: DFIR for Beginners
|
|