Home Communication Disclosure & vulnerability Government & legislation Hardware Hacking Information security & security management CommunicationMobile deviceWirelessAllMobile deviceWireless Attacking SMS. It’s no longer your BFF 29C3 GSM: Cell phone network review RFID hacking DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers DeepSec 2010: Debugging GSM 24C3: Mifare (Little security, despite obscurity) DeepSec 2010: Android reverse engineering and forensics 25C3: Hacking the iPhone Hacking WPA2 key: Evil Twin method DeepSec 2013: Cracking and analysing Apple iCloud protocols ShmooCon 2014: ISP’s unauthenticated SOAP service OHM2013: SIM card exploitation DeepSec 2013: Uncovering your trails Disclosure & vulnerabilityDisclosureVulnerabilityAllDisclosureVulnerability Secure code reviews magic or art? A simplified approach to secure code reviews DeepSec 2011: The security of non-executable files DeepSec 2007: Browser hijacking OWASP AppSecUSA 2011: Ghosts of XSS past, present and future OWASP AppSecUSA 2012: Bug bounty programs 22C3: Attacking the IPv6 protocol suite DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities ShmooCon 2014: ISP’s unauthenticated SOAP service Government & legislationGovernmentLegislationAllGovernmentLegislation Asymmetric Digital Warfare 28C3: Towards a single secure European cyberspace? DEF CON 16: Forensics is ONLY for Private Investigators 29C3: Russia’s surveillance state DEF CON 14: US-VISIT: Raping personal privacy since 2004 29C3: We are all lawmakers! OHM2013: Should law enforcement have hacking powers? DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3 HardwareConsoleEmbedded systemGeneralPrinterAllConsoleEmbedded systemsGeneralPrinter Printers gone wild! RFID hacking NOTACON 3: Network printer hacking 24C3: Mifare (Little security, despite obscurity) 25C3: Hacking the iPhone BruCON 2010: Embedded system hacking and my plot to take over the world 1/4 24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security Black Hat USA 2010: Jackpotting automated teller machines redux 1/5 Battery firmware hacking HackingBotnetExploitGeneralMalwarePenetration testingPhishingAllBotnetExploitMalwarePenetration testingPhishing Rootkits: What they are, and how to find them DEF CON 13: Google hacking for penetration testers DEF CON 17: MetaPhish 24C3: Cybercrime 2.0 DEF CON 17: Abusing Firefox Addons DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network DEF CON 17: Making fun of your malware Testing SQL injection with sqlmap Owning bad guys (and mafia) with JavaScript botnets Remote hack on Damn Vulnerable Linux Information security & security managementDatabaseEncryptionInformation securityLoggingNetworkProgrammingSecurity managementTrainingAllDatabaseEncryptionInformation securityLoggingNetworkProgrammingSecurity managementTraining Toying with barcodes Rootkits: What they are, and how to find them How NOT to Store Passwords! Building the DEF CON Network Secure code reviews magic or art? A simplified approach to secure code reviews NOTACON 3: Network printer hacking OWASP AppSecUSA 2011:How NOT to implement cryptography for the OWASP Top 10 (Reloaded) DeepSec 2011: The security of non-executable files OWASP AppSecUSA 2011: Ghosts of XSS past, present and future ICS Cybersecurity Advanced Training Day 4 24C3: Mifare (Little security, despite obscurity) DeepSec 2009: Building the next generation IDS engine 22C3: Attacking the IPv6 protocol suite DEF CON 17: Hijacking web 2.0 sites with SSLstrip DEF CON 19: Hacking and forensicating an Oracle database server SOURCE Boston 2009: Splunk Introduction to Trusted Computing OWASP AppSecUSA 2011: Simplifying threat modelling Testing SQL injection with sqlmapBe surprisedVideo wall