The Ghost of Security Past
Synspotting for Teenagers and Real Swinging Adults
Week to Weak: Weaponization of Vulnerabilities
Wanna Cyber?
Vomiting Shells: Tracking the Splatter Patterns
Firmware Vulnerability Analysis
Pwning People Personally
Everything You Need to Know About Crypto in 50 minutes
The Bad, The Worse, and The Ugly - No Hope for POS Security
Cartero - Another Social Engineering Framework
Building a Poor Man’s RFID Cloner
InfoSec: What we know, and what we need to know.
Trojaned Gems - You can’t tell you’re using one!
BREAKING in BAD! (I’m the one who doesn’t knock)