Using the law to silence hackers and security researchers
Winning isn't Everything: How Trolling can be as much Fun
110 Years of Vulnerabilities
Antipwny: A Windows Based IDS/IPS for Metasploit
Fuzzing 101
HTML 5 Security
Playing the Forensics Game: Forensic Analysis of Gaming Applications For Fun and Profit
How to Image a skyscraper.
Project.Phree: Phucking the NSA
"Reasonable" Information Security
Give Yourself A Hand
Panel: Cloud - Business and Academia - Bringing it all together
Hackers Wanted: Creating an Interactive Cyberattack Playbook (Phase 1)
ANOTHER Log to Analyze - Utilizing DNS to detect Malware in Your Network