This slide deck includes:
Managing Application Security Risk with Threat Modeling
SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns
.Net Roulette Exploiting Insecure Deserialization in Telerik UI
Ham Hacks: Breaking Into the World of Software-Defined Radio
Demystifying Capture the Flags (CTFs)
Expose Yourself Without Insecurity: Cloud Breach Patterns
Attacking the Data Before the Decision
How to Write Like It's Your Job
ZigDiggity: ZigBee Hacking Toolkit
Ghost In The Browser - Broad-Scale Espionage With Bitsquatting
Reverse Engineering Mobile Apps
Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.