Rio Pavilion 3, between Vendors and Chill Out
Prehack - How to create and/or prevent a backdoor during the design and development of a product
Juice Jacking: Hacking the Defcon Attendee's Smartphones
2005 Called - They want their Lotus Notes password hashes back
Appearance Hacking 101: The Art of Everyday Camouflage
TBA-sky1
TBA-sky2
Making Lockpicks the Legion303 Way
Stiltwalker, Round 2
Hammer: Smashing Binary Formats Into Bits
Taking Back Our Data - An Invitation To Discussion
The Devil is in the Details - Why the way you used to do Social Engineering Sucks
The Patsy Proxy - Getting Others To Do Your Dirty Work
TBA-sky3
Grepping the Gropers - Airport Security
The Breach That Wasn't
Interface Puncher
Why You Should Not Get a CISSP
Builders vs. Breakers
Bureaucratic Denial of Service
Cyber Weapons, Castle Doctrine, and the Second Amendment
Fun with Software Defined Radios
Jukebox Jacking
Following the Digital Footprints
Your Network Sucks
PWN'D by SIGINT: Applied TEMPEST
The Leverage of Language - Advanced Workflow Environment for Security Intelligence and Exposure Management
Introducing the Smartphone Pentesting Framework
Dr. Strangenerd: How I learned to collaborate and love the Maker Movement