Hacking with GNURadio
Hacking the Apple TV and Where your Forensic Data Lives
Beckstrom's Law - A Model for Valuing Networks and Security
Is That You, Baby, or Just a Bridge in the Sky?
Death of Anonymous Travel
Defcon Security Jam 2: The Fails Keep on Coming
Ask EFF: The Year in Digital Civil Liberties
Meet the Feds 2009
Weaponizing the Web: New Attacks on User-generated Content
CSRF: Yeah, It Still Works
The security risks of Web 2.0
Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers
Abusing Firefox Addons
Hijacking Web 2.0 Sites with SSLstrip--Hands-on Training
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
Clobbering the Cloud
The Middler 2.0: It's Not Just for Web Apps Anymore
Down the Rabbit Hole: Uncovering a Criminal Server
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
Who Invented the Proximity Card?
Lockpicking Forensics
RAID Recovery: Recover your PORN by Sight and Sound
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
The Psychology of Security Unusability