Mining Sensitive Information From Images Using Command-Line OCR
Walking the Green Mile: How to Get Fired After a Security Incident
Throw It in the River? Towards Real Live Actual Smartphone Security
Beat to 1337: Creating A Successful University Cyber Defense Organization
Rule 1: Cardio (and 9 other rules to keep intruders out)
Pentesting over Powerlines
Tactical Post Exploitation
Exploiting PKI for Fun & Profit or The Next Yellow Padlock Icon?
You are the Smart Meter: Making (and hacking) of the 2011 MA-CCDC electronic badges
Offensive Countermeasures: Still trying to bring sexy back
73o7\/\/@\/\/Ki – Survival Hacking your way out of Armageddon
Is locksport a sport?
When Fuzzers Miss: The no Hanging Fruit.
Avoiding the Landmines in your own Backyard
Virtual trust, Virtual Permission and the Illusion of Security
You’re Going to Need a Bigger Shovel – A Critical Look at Software Security Assurance
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Get Off of My Cloud: Cloud Credential Compromise and Exposure
OSINT Beyond the Basics
Your perimeter sucks
Mobile App Moolah: Profit taking with Mobile Malware
Anti-Forensics for the Louise
Hide yo kids, hide yo wife: Residential security and monitoring the bottom line
100 bugs in 100 days: An analysis of ICS (SCADA) software
Tomorrow you can patch that 0day – but your users will still get you p0wn3d
Free Floating Hostility
Open source firewalling with pfSense
Covert Channels using IP Packet Headers
Surviving a Teleporter Accident (It could happen to you)
How I learned to roll my own: Building custom pen testing platforms on the fly
BioMining: Data Mining for (Neuro) hackers
Building a Svartkast: Cheap hardware to leave behind on someone else’s network