Throw It in the River? Towards Real Live Actual Smartphone Security
Pentesting over Powerlines
You are the Smart Meter: Making (and hacking) of the 2011 MA-CCDC electronic badges
Is locksport a sport?
Virtual trust, Virtual Permission and the Illusion of Security
Get Off of My Cloud: Cloud Credential Compromise and Exposure
Mobile App Moolah: Profit taking with Mobile Malware
100 bugs in 100 days: An analysis of ICS (SCADA) software
Open source firewalling with pfSense
How I learned to roll my own: Building custom pen testing platforms on the fly
A Tribute to Dr. Strangelove
The Hidden XSS – Attacking the Desktop
Blue team is sexy — refocusing on defense — Part II — All you baseline are belong to us
Why InfoSec Practitioners Are Failing
OpenWIPS-ng
Exploiting Java Memory Corruption Vulnerabilities