Boyd's OODA and General Predator/Prey theory
How Government Accountability Conflicts With Citizen Privacy (and Why It's Your Fault)
Exploiting Management For Fun and Profit - or - "Management is not stupid, you are"
Are There Still Wolves Among Us?
Planes keep falling on my head
Weaponizing The Smartphone: Deploying The Perfect WMD
Using the Teensy for so much more...
Agnitio: the security code review Swiss army knife. Its static analysis, but not as we know it
A study of what really breaks SSL
Vulnerability Research Circa 1851
2011: A Cloud Odyssey
Distributed Denial of Service Attacks for Whitehats
Pentultimate Hack - Manipulating Layers 8 & 9 of the OSI Model (Management & Budget)
All about the Benjamins -- Google's vulnerability reward programs
Sounds Like Botnet
Hacking Google Chrome OS
Smile for the Grenade! Camera go Bang!
Anti Anti Forensics
UDID pwnage (0day for iOS)
How to Win Followers and Influence Friends: Hacking Twitter to Boost Your Security Career
Tell Me Your Secrets - Tales of Social Engineering and The Human Mind