Hacking with GNURadio
Hacking the Apple TV and Where your Forensic Data Lives
 
                        
                        
                        
                    
                    Beckstrom's Law - A Model for Valuing Networks and Security
Is That You, Baby, or Just a Bridge in the Sky?
Death of Anonymous Travel
 
                        
                        
                        
                    
                    Defcon Security Jam 2: The Fails Keep on Coming
 
                        
                        
                        
                    
                    Ask EFF: The Year in Digital Civil Liberties
Meet the Feds 2009
Weaponizing the Web: New Attacks on User-generated Content
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    CSRF: Yeah, It Still Works
The security risks of Web 2.0
 
                        
                        
                        
                    
                    Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Abusing Firefox Addons
 
                        
                        
                        
                    
                    Hijacking Web 2.0 Sites with SSLstrip--Hands-on Training
 
                        
                        
                        
                    
                    Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
Clobbering the Cloud
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    The Middler 2.0: It's Not Just for Web Apps Anymore
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Down the Rabbit Hole: Uncovering a Criminal Server
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                    Who Invented the Proximity Card?
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Lockpicking Forensics
RAID Recovery: Recover your PORN by Sight and Sound
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
The Psychology of Security Unusability