Star 0

Talks

Title Humans
Flushing Away Preconceptions of Risk
Why TV news gets tech security wrong – and why it matters
Hacking an Internet Enabled Lagomorph Alex Chapman
Using Hadoop for Malware, Network, Forensics and Log analysis Michael Boman
Automatic Reverse Compilation & Semantic Comprehension
Breaking AV Software Joxean Koret
Chicken of the ‘APT’: Using Shadowlab Incubation for Targeted Attack Attribution Kyle Wilhoit
Social Engineering Your Own – Developing An Awareness Training Program That Actually Works
A Year in Recap: I Am The Cavalry Beau Woods
On Her Majesty’s Secret Service: GRX and a Spy Agency
Pentesting NoSQL DB’s Using NoSQL Exploitation Framework Francis Alexander
Meterpreter Internals
STOP! Don’t make that NOOB Incident Handling mistake
I gave a talk about robots and hardware! Josh Thomas
Top 5 Media Fails
Lessons Learned from Black Hat’s Infrastructure: The Tweets Must Flow
Security Analytics Beyond Cyber
Researching Android Device Security with the Help of a Droid Army Joshua J. Drake
Side Channel attacks in the cloud
What Did You Just Say To Me? Jerry Gamblin
Hot or not, the hacker way Dan Tentler
Bug Bounties – Relationship Advice for the Hunters & the Hunted Katie Moussouris
Chopping Down Mountains Don A. Bailey
10 GBP simple hardware side channel attacks Joe FitzPatrick
GreedyBTS: Hacking Adventures in GSM
When Documents Bite
Darshak: how to turn your phone into a low cost IMSI catcher device
Payment applications handle lots of money. No, really: lots of it.
I Hunt TR-069 Admins: Pwning ISPs Like a Boss Shahar Tal
Manna from Heaven; Improving the state of wireless rogue AP attacks Dominic White
Stupid PCIe Tricks Joe FitzPatrick