The History and Evolution of Computer Viruses
Physical Memory Forensics for Cache
From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
I'm Your MAC(b)Daddy
What Time Are You Anyway?
Covert Post-Exploitation Forensics With Metasploit
Mamma Don't Let Your Babies Grow Up to be Pen Testers
Are You In Yet? The CISO's View of Pentesting
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
Bosses love Excel, Hackers too.
We owe it all to the Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Smartfuzzing The Web: Carpe Vestra Foramina
Web Application Analysis With Owasp Hatkit
Bulletproofing The Cloud: Are We Any Closer To Security?
Abusing HTML5
Getting F***** On the River
Network Security Podcast Meetup
Big Brother on the Big Screen: Fact/Fiction?
PIG: Finding Truffles Without Leaving A Trace
Port Scanning Without Sending Packets
Cipherspaces/Darknets: An Overview Of Attack Strategies
Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's
Steganography and Cryptography 101
Pervasive Cloaking
Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud
Speaking with Cryptographic Oracles
VDLDS — All Your Voice Are Belong To Us
Virtualization under attack: Breaking out of KVM