Blurred Lines: Digital Attacks in the Physical Realm
Wireless Drone Strikes---doing wireless attaks with drones
Pointy Stick: Poking through to the heart of a binary
How I Turned VPN over DNS Into a Retroactive Wiretapping Mechanism
How Much of Your Personal Information Is Online?
Burning Up on Reentry: Searches of Electronic Devices at the U.S. Border
P.I.S.S.E.D (Privacy In a Surveillance State, Evading Detection)
Contrasting Traits Between A Social Engineer & A Sociopath
Ten Commandments of Incident Response (For Hackers)
Yelling at management isn't going to make them smarter.
Bypassing EMET 4.1