A mechanics view of SQL injection
App Assessments Reloaded
Beyond r57
Building Bridges - Forcing Hackers and Business to Hug it Out
Catch That Butterfly: Stopping Mariposa & Revealing a Growing Underground Network of Amateur Hackers
CDCC
ExploitHub: Arming the Pen Testers to Plug the Holes
Fierce v2
Fuck Tools, Do It yourself Jerk
Fun with VxWorks
How technology killed my heroes, and why they will never be born again
How to Make Network Diagrams that Don't Suck
Infosec Communities for Career Success: Understanding, Participating, and Cooking One Up
INFOSEC Mentoring, Mentee-ing Panel
InfoSec Speed Debates
Infosec Young and Restless
Injecting Simplicity not SQL
It Melts In Your Hand: An Overview of Security (Failures) In Mobile Applications
KeyPad Bypass Hacks
Mobile Hackery
Mobilizing the PCI Resistance: Lessons Learned From Fighting Prior Wars (SOX-404)
Multi-Player MetaSploit
Planes, Trains and Automobiles (OK, Cars and Buses)
Roman Profiles : The 6 Mistakes of
SET 0.6 release with special PHUKD Key
Sniper Forensics - One Shot, One Kill
Social Engineering the CFP Process
Social Network Special Ops: Extending data visualization tools for faster Pwnage
Stupid IP Tables Tricks
The Dark side of Twitter, Measuring and Analyzing Malicious Activity on Twitter
The road to hell is paved with best practices
Through the rabbit hole: An Expose of Darknets and the Onion Routed Underground
Top 10 Things IT is Doing to Enable CyberCrime
Who Owns the Internet? AKA: Where did all that cyberspace go?