The Ghost of Security Past
GATTACA - Final Warning!
Detecting Bluetooth Surveillance Systems
Synspotting for Teenagers and Real Swinging Adults
Curry and TARTS: A new technique for avoiding side-channel attacks on cryptosystems
Medical Device Security: An Infectious Disease
Week to Weak: Weaponization of Vulnerabilities
Giving a LUKS. Learning to encrypt your data properly.
The Right to be Forgotten - Now the EU, Tomorrow the World?
Wanna Cyber?
Vomiting Shells: Tracking the Splatter Patterns
MMORPG (Massively Multiplayer Online Real-world Political Gamechanging)
Explore that which can not be explored
Firmware Vulnerability Analysis
Hacking the CFAA: What You Need to Know, What’s Happening, and Where It’s Going.
Bypassing the Secure Desktop Protections
Pwning People Personally
How to Grow a Hacker
Threat Modeling in the Gaming Industry