The short answer is 'Yes'. The long answer is the rest of this post. So. Many. Presentations.
You probably want to go get your reading glasses. Or black-market cyber eyes. Eye strain is a real possibility, and we care about your optic health.
Remember – take care of your eyes and they'll take care of you.
DragonLady: An Investigation of SMS Fraud Operations in Russia
Ryan W. Smith
The Government and UFOs: A Historical Analysis
Richard Thieme
Analyzing and Counter-Attacking Attacker Implanted Devices Case Study:Pwn Plug
Wesley McGrew
Business logic flaws in mobile operators services
Bogdan Alecu
A Password is Not Enough: Why Disk Encryption Is Broken And How We Might Fix It
Daniel Selifonov
PowerPwning: Post-Exploiting By Overpowering PowerShell
Joe Bialek
Doing Bad Things to 'Good' Security Appliances
Phorkus and Evilrob
Collaborative Penetration Testing with Lair
Tom Steele and Dan Kottman
Android WebLogin: Google's Skeleton Key
Craig Young
BoutiqueKit: Playing WarGames with Expensive Rootkits and Malware
Josh "m0nk" Thomas
Hardware Hacking with Microcontrollers: A Panel Discussion
Joe Grand, RenderMan, FirmWarez, LosT and Mark 'Smitty' Smith
This Presentation Will Self-destruct in 45 Minutes: A Forensic Deep Dive into Self-destructing Message Apps
Drea London and Kyle O'Meara
10000 Yen into the Sea
Flipper
Fear the Evil FOCA: IPv6 Attacks in Internet Connections
Chema Alonso
Let's Screw with nmap
Gregory Pickett
Revealing Embedded Fingerprints: Deriving Intelligence from USB Stack Interactions
Andy Davis
The Bluetooth Device Database
Ryan Holeman
C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood
Jacob Thompson
Suicide Risk Assessment and Intervention Tactics
Amber Baldet
Conducting Massive Attacks with Open Source Distributed Computing
Alejandro Caceres
Resting on Your Laurels Will Get You Pwned: Effectively Code Reviewing REST Applications to Avoid Getting Powned
Abraham Kang and Dinis Cruz
Fast Forensics Using Simple Statistics and Cool Tools
John Ortiz
Forensic Fails - Shift + Delete Won't Help You Here
Eric Robi and Michael Perklin
EDS: Exploitation Detection System
Amr Thabet
HiveMind: Distributed File Storage Using JavaScript Botnets
Sean Malone
OTP, It won't save you from free rides!
bughardy and Eagle1753
Utilizing Popular Websites for Malicious Purposes Using RDI
Daniel Chechik and Anat (Fox) Davidi
gitDigger: Creating Useful Wordlists From Public GitHub Repositories
Jaime Filson (WiK) and Rob Fuller (Mubix)
Evolving Exploits Through Genetic Algorithms
soen
Proliferation
Ambassador Joseph DeTrani
The Growing Irrelevance of US Government Cybersecurity Intelligence Information
Mark Weatherford
Meet the VCs
Ping Li, Matt Ocko, Phil Paul, Eileen Burbridge
From Nukes to Cyber - Alternative Approaches for Proactive Defense and Mission Assurance
Lt Gen Robert Elder, USAF (Retired
An Open Letter - The White Hat's Dilemma: Professional Ethics
Alex Stamos
The Policy Wonk Lounge
Sameer Bhalotra, Robert Brese, Lt. Gen. Robert Elder, Bruce McConnell, Mark Weatherford
View the full article