GATTACA - Final Warning!
Detecting Bluetooth Surveillance Systems
Curry and TARTS: A new technique for avoiding side-channel attacks on cryptosystems
Medical Device Security: An Infectious Disease
Giving a LUKS. Learning to encrypt your data properly.
The Right to be Forgotten - Now the EU, Tomorrow the World?
MMORPG (Massively Multiplayer Online Real-world Political Gamechanging)
Explore that which can not be explored
Hacking the CFAA: What You Need to Know, What’s Happening, and Where It’s Going.
Bypassing the Secure Desktop Protections
How to Grow a Hacker
Threat Modeling in the Gaming Industry
Killing them Softly – Hunting on DarkNet
We Don't Need Another Damn Whitepaper: Going Kinetic on Cybercrime Networks on a Budget
GSM Sucks: Detecting IMSI Catchers
Hacking Citizens United, or How to Influence Elections on a Budget
Card skimming using a RaspberryPi
Being a Victim can be a Crime [Ain’t Losin’ Data a Breach?]
One Step Closer to the Matrix: Machine Learning and Augmented Reality in Networking Defense
Wireless Drone Strikes Episode II: Attack of the Drones!
Compliance kills the security star - Why security standards kill security!