Hacker Law School
Pentesters Toolkit
Oil & Gas Infosec 101
Meet Pentoo, the Longest Running Pen-testing Linux Distro
Wireless Penetration Testing 101 & Wireless Contesting
Adventures in Automotive Networks and Control Units
Hacking Driverless Vehicles
10000 Yen into the Sea
Business logic flaws in mobile operators services
Meet the VCs
The ACLU Presents: NSA Surveillance and More
The Government and UFOs: A Historical Analysis by Richard Thieme
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers
Predicting Susceptibility to Social Bots on Twitter
Fear the Evil FOCA: IPv6 attacks in Internet connections
Legal Aspects of Full Spectrum Computer Network (Active) Defense
We are Legion: Pentesting with an Army of Low-power Low-cost Devices
Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
PowerPreter: Post Exploitation Like a Boss
DNS May Be Hazardous to Your Health
Exploiting Music Streaming with JavaScript
Java Every-Days: Exploiting Software Running on 3 Billion Devices
HiveMind: Distributed File Storage Using JavaScript Botnets
Defending Networks with Incomplete Information: A Machine Learning Approach
Blucat: Netcat For Bluetooth
BYOD PEAP Show
The Bluetooth Device Database