Star 0

Talks

Title Humans
sex +/- drugs: known vulns and exploits
Press Start: The basics of malware analysis
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics) Andrew Hay
Google-jacking: A review of Google’s 2-Factor Authentication Craig Young
All Your Base Still Belong To Us: Physical Penetration Testing Tales From The Trenches
Cash Rules Everything Around Me: The Commercialization of Online Spying
Sorry Your Princess is in Another Castle: Intrusion Deception to Protect the Web
Strategic Cyber Security & Warfare: If We Don’t Get It Right, People Die
Chinese Advanced Persistent Threats: Corporate Cyber Espionage Processes and Organizations
Building a Security Graph Dan Hubbard
The Pineapple Express: Live mobile application hacking demonstration....A speeding bullet to the mobile backend
SCADA Protection: Imminent Phishing Attacks and The U.S. Cyber Strategy
Hitting above the Security Mendoza Line
Penetration Testing is Stupid
An Anti-Forensics Primer
RFID Credentials or (Cyber Pearl 9/11 Harbor of DOOM)
Stick Around - Windows Persistence from Weak Sauce to #Winning Matt Hastings
“I want my PC back!”: An in-depth look at ransomware
JavaScript Security and HTML5
Build your own Android botnet
SSL++ : Tales of Transport Layer Security at Twitter
Why are we still vulnerable to side channel attacks? (and why should I care?) Jasper van Woudenberg
My First Incident Response Team: DFIR for Beginners