Data Protection 101 - Successes, Fails, and Fixes
Practical Foxhunting 101
RF Penetration Testing, Your Air Stinks
AWS for Hackers
Anatomy of a Pentest; Poppin' Boxes like a Pro
Standing Up an Effective Penetration Testing Team
Reverse Engineering Mac Malware
The Making of DEFCOIN
Meddle: Framework for Piggy-back Fuzzing and Tool Development
USB for all!
ShareEnum: We Wrapped Samba So You Don’t Have To
Investigating PowerShell Attacks
Client-Side HTTP Cookie Security: Attack and Defense
An Introduction to Back Dooring Operating Systems for Fun and Trolling
Blinding The Surveillance State
Diversity in Information Security
Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!
Bug Bounty Programs Evolution
How to Disclose an Exploit Without Getting in Trouble
Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively
The Monkey in the Middle: A pentesters guide to playing in traffic.
Detecting Bluetooth Surveillance Systems
Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
DEF CON the Mystery, Myth and Legend
Around the world in 80 cons - A Perspective
You're Leaking Trade Secrets
Dropping Docs on Darknets: How People Got Caught
Home Alone with localhost: Automating Home Defense
Android Hacker Protection Level 0
Is This Your Pipe? Hijacking the Build Pipeline.