Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System
Hacking and Securing DB2 LUW Databases
Whoever Fights Monsters... Aaron Barr, Anonymous, and Ourselves
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
Fun with EC2/Amazon Cloud Services
Battery Firmware Hacking
Chip & PIN is Definitely Broken
Smartfuzzing The Web: Carpe Vestra Foramina
Traps of Gold
DIY Non-Destructive Entry
Hacking and Forensicating an Oracle Database Server
Security When Nano Seconds Count
Federation and Empire
Hacking Google Chrome OS
Attacking and Defending the Smart Grid
Tractor Jacking 101
Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge
DEF CON Comedy Jam IV
Web Application Analysis With Owasp Hatkit
Hacking .Net Applications: The Black Arts
Vulnerabilities of Wireless Water Meter Networks
Advanced High Security Lock Bypass and Its Implications
Archive Team: A Distributed Preservation of Service Attack
Bulletproofing The Cloud: Are We Any Closer To Security?
Get Off of My Cloud: Cloud Credential Compromise and Exposure
Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence
DEF CON Awards
Economics of Password Cracking in the GPU Era
Abusing HTML5
Metasploit vSploit Modules
Smile for the Grenade! "Camera Go Bang!"
Network Migration for Penetration Testers
PCI 2.0: Still Compromising Controls and Compromising Security
Getting F***** On the River
Sounds Like Botnet
An Insider's Look at International Cyber Security Threats and Trends
Out of the basement and into the BEDROOM
My password is: #FullOfFail! — The Core Problem with Authentication and How We Can Overcome It
Network Security Podcast Meetup
VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP
Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Contractors, Clearances, and Chaos: Tales from the Crypt
Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely
Big Brother on the Big Screen: Fact/Fiction?
Fingerbank - Open DHCP Fingerprints Database
Phishing and Online Scam in China
Walking the Green Mile: How to Get Fired After a Security Incident
Pillaging DVCS Repos For Fun And Profit
Handicapping the US Supreme Court
This is REALLY not the droid you're looking for...