Flushing Away Preconceptions of Risk
|
|
Why TV news gets tech security wrong – and why it matters
|
|
Hacking an Internet Enabled Lagomorph
|
Alex Chapman
|
Using Hadoop for Malware, Network, Forensics and Log analysis
|
Michael Boman
|
Automatic Reverse Compilation & Semantic Comprehension
|
|
Breaking AV Software
|
Joxean Koret
|
Chicken of the ‘APT’: Using Shadowlab Incubation for Targeted Attack Attribution
|
Kyle Wilhoit
|
Social Engineering Your Own – Developing An Awareness Training Program That Actually Works
|
|
A Year in Recap: I Am The Cavalry
|
Beau Woods
|
On Her Majesty’s Secret Service: GRX and a Spy Agency
|
|
Pentesting NoSQL DB’s Using NoSQL Exploitation Framework
|
Francis Alexander
|
Meterpreter Internals
|
|
STOP! Don’t make that NOOB Incident Handling mistake
|
|
I gave a talk about robots and hardware!
|
Josh Thomas
|
Top 5 Media Fails
|
|
Lessons Learned from Black Hat’s Infrastructure: The Tweets Must Flow
|
|
Security Analytics Beyond Cyber
|
|
Researching Android Device Security with the Help of a Droid Army
|
Joshua J. Drake
|
Side Channel attacks in the cloud
|
|
What Did You Just Say To Me?
|
Jerry Gamblin
|
Hot or not, the hacker way
|
Dan Tentler
|
Bug Bounties – Relationship Advice for the Hunters & the Hunted
|
Katie Moussouris
|
Chopping Down Mountains
|
Don A. Bailey
|
10 GBP simple hardware side channel attacks
|
Joe FitzPatrick
|
GreedyBTS: Hacking Adventures in GSM
|
|
When Documents Bite
|
|
Darshak: how to turn your phone into a low cost IMSI catcher device
|
|
Payment applications handle lots of money. No, really: lots of it.
|
|
I Hunt TR-069 Admins: Pwning ISPs Like a Boss
|
Shahar Tal
|
Manna from Heaven; Improving the state of wireless rogue AP attacks
|
Dominic White
|
Stupid PCIe Tricks
|
Joe FitzPatrick
|