Being a Victim can be a Crime [Ain’t Losin’ Data a Breach?]
BREAKING in BAD! (I’m the one who doesn’t knock)
Building a Poor Man’s RFID Cloner
Bypassing the Secure Desktop Protections
Card skimming using a RaspberryPi
Cartero - Another Social Engineering Framework
Compliance kills the security star - Why security standards kill security!
Curry and TARTS: A new technique for avoiding side-channel attacks on cryptosystems
Detecting Bluetooth Surveillance Systems
Everything You Need to Know About Crypto in 50 minutes
Explore that which can not be explored
Firmware Vulnerability Analysis
GATTACA - Final Warning!
Giving a LUKS. Learning to encrypt your data properly.
GSM Sucks: Detecting IMSI Catchers
Hacking Citizens United, or How to Influence Elections on a Budget
Hacking the CFAA: What You Need to Know, What’s Happening, and Where It’s Going.
How to Grow a Hacker
InfoSec: What we know, and what we need to know.
Killing them Softly – Hunting on DarkNet
Medical Device Security: An Infectious Disease
MMORPG (Massively Multiplayer Online Real-world Political Gamechanging)
One Step Closer to the Matrix: Machine Learning and Augmented Reality in Networking Defense
Pwning People Personally
Synspotting for Teenagers and Real Swinging Adults
The Bad, The Worse, and The Ugly - No Hope for POS Security
The Ghost of Security Past
The Right to be Forgotten - Now the EU, Tomorrow the World?
Threat Modeling in the Gaming Industry
Trojaned Gems - You can’t tell you’re using one!
Vomiting Shells: Tracking the Splatter Patterns
Wanna Cyber?
We Don't Need Another Damn Whitepaper: Going Kinetic on Cybercrime Networks on a Budget
Week to Weak: Weaponization of Vulnerabilities
Wireless Drone Strikes Episode II: Attack of the Drones!