Androids vs. Android: Synthetic Mobile Malware Analysis
Blurred Lines: Digital Attacks in the Physical Realm
Breaking Bus Tickets – MagStripe Hacks And You
Breaking Encryption with an Oscilloscope: An Introduction to Power Analysis Attacks
Building a GPU Cracking Rig (on the Cheap)
Burning Up on Reentry: Searches of Electronic Devices at the U.S. Border
Bypassing EMET 4.1
Contrasting Traits Between A Social Engineer & A Sociopath
Crowdsourcing Your Cisco Firewall Administration... WAT?
Eyes on IZON: Surveilling IP Camera Security
Hardware Hacking for Cheap Dummies
How I Turned VPN over DNS Into a Retroactive Wiretapping Mechanism
How Much of Your Personal Information Is Online?
Introducing idb - Simplified Blackbox iOS App PenTesting
It Ain't Rocket Science
Just What The Doctor Ordered?
Phishing Frenzy: 7 seconds from hook to sinker
P.I.S.S.E.D (Privacy In a Surveillance State, Evading Detection)
Pointy Stick: Poking through to the heart of a binary
Targeted Malware Final Form (APTrololol)
Ten Commandments of Incident Response (For Hackers)
The Cavalry is Us
The Perfectly Legitimate Project
UFOs and Government: a Case Study in Disinformation, Deception, and Perception Management
Wireless Drone Strikes---doing wireless attaks with drones
Yelling at management isn't going to make them smarter.