UFOs and Government: a Case Study in Disinformation, Deception, and Perception Management
Crowdsourcing Your Cisco Firewall Administration... WAT?
Blurred Lines: Digital Attacks in the Physical Realm
Breaking Encryption with an Oscilloscope: An Introduction to Power Analysis Attacks
Wireless Drone Strikes---doing wireless attaks with drones
Just What The Doctor Ordered?
Pointy Stick: Poking through to the heart of a binary
Building a GPU Cracking Rig (on the Cheap)
How I Turned VPN over DNS Into a Retroactive Wiretapping Mechanism
Androids vs. Android: Synthetic Mobile Malware Analysis
The Perfectly Legitimate Project
How Much of Your Personal Information Is Online?
The Cavalry is Us
Burning Up on Reentry: Searches of Electronic Devices at the U.S. Border
It Ain't Rocket Science
P.I.S.S.E.D (Privacy In a Surveillance State, Evading Detection)
Introducing idb - Simplified Blackbox iOS App PenTesting
Contrasting Traits Between A Social Engineer & A Sociopath
Hardware Hacking for Cheap Dummies
Ten Commandments of Incident Response (For Hackers)
Yelling at management isn't going to make them smarter.
Targeted Malware Final Form (APTrololol)
Eyes on IZON: Surveilling IP Camera Security
Bypassing EMET 4.1
Phishing Frenzy: 7 seconds from hook to sinker
Breaking Bus Tickets – MagStripe Hacks And You