Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.
August: Built-in Security in IoT Devices
ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast
RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief
Microsoft BlueHat v8 - Real World Code Review
Mozilla Security Blog - Threat Modeling Using Trike
UAT - What Palpatine Can Teach About Pentesters
BayThreat - Where To Start When Securing A Startup?
Black Hat USA 2005 - Catch Me If You Can
HP Webinar-Harness the Power of Agile
Watch this webinar and learn how organizations have harnessed the power of Agile.
Black Hat USA 2011 - Pulp Google Hacking
DEF CON 20 (2012) - Tenacious Diggity
RFID Hacking: Distance Limitation - Proxmark3
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.