Latest Hacker conference Podcast Episodes
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Craig Young - How to Train Your RFID Hacking Tools
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 01:08 ★★★ - 4 ratingsMaterials Available Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Craig-Young-How-To-Train-Your-RFID-Hacking-Tools-UPDATED.pdf Whitepaper Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Craig-Young-How-To-Train-Y...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Atlas - Fun with Symboliks
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:39 ★★★ - 4 ratingsMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Atlas-Fun-With-Symboliks.pdf Fun with Symboliks atlas dude at Grimm Asking the hard questions... and getting answer! Oh binary, where art thine vulns? Symbolic analysis has been a "thin...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Yuwei Zheng & Haoqi Shan - Build a free cellular traffic capture tool with a vxworks based femoto
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:30 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yuwei-Zheng-Haoqi-Shan-Build-a-Free-Cellular-Traffic-Capture-Tool-with-a-VxWorks-Based-Femto.pdf Build a free cellular traffic capture tool with a vxworks based femoto Yuwei Zheng Senior ...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP stack - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:08 ★★★ - 4 ratingsMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Lance-Buttars-Nemus-Hacking-SQL-Injection-for-Remote-Code-Execution-on-a-LAMP-UPDATED.pdf Hacking SQL Injection for Remote Code Execution on a LAMP stack Nemus Software Engineer Remember...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Paul Amicelli & David Baptiste - How to secure the keyboard chain
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:08 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Paul-Amicelli-David-Baptiste-How-to-secure-the-keyboard-chain.pdf How to secure the keyboard chain Paul Amicelli Student from IT Engineering School - ESIEA in Laval, France Baptiste Da...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Peter Desfigies, Joshua Brierton, Naveed Ul Islam - Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:08 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins.pdf References:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Desfigies-Brierton-Islam-Guests-N-Goblins-Referenc...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Saif El-Sherei & Etienne Stalmans - Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:07 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Saif-El-Sherei-Etienne-Stalmans-SensePost-Introducing-Wadi-Fuzzer.pdf Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers Saif El-Sherei Analyst, SensePost ...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Sarah Edwards - Ubiquity Forensics - Your iCloud and You - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:07 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Sarah-Edwards-Ubiquity-Forensics.pdf Ubiquity Forensics - Your iCloud and You Sarah Edwards Test Engineer, Parsons Corporation & Author/Instructor, SANS Institute Ubiquity or "Everything...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Tony Trummer & Tushar Dalvi - QARK: Android App Exploit and SCA Tool - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:06 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tony-Trummer-Tushar-Dalvi-QARK.pdf QARK: Android App Exploit and SCA Tool Tony Trummer Staff Information Security Engineer/LinkedIn Tushar Dalvi Sr. Security Engineer/LinkedIn Ever wond...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Zack Allen & Rusty Bower - Malware in the Gaming Micro-economy
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:06 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Zack-Allen-Rusty-Bower-Malware-In-Gaming.pdf Malware in the Gaming Micro-economy Zack Allen Lead Research Engineer, ZeroFOX Rusty Bower Information Security Engineer Microeconomics focu...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Yaniv Balmas & Lior Oppenheim - Key-Logger, Audio, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 16, 2015 00:05 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Yaniv-Balmas-Lior-Oppenheim-Key-Logger-Audio-Mouse.pdf Key-Logger, Audio, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster Yaniv Balmas Security Researcher, Check Point Soft...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Vivek Ramachandran - Chellam – A Wi-Fi IDS Firewall for Windows
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 15, 2015 23:59 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Vivek-Ramachadran-Chellam.pdf Chellam – a Wi-Fi IDS/Firewall for Windows Vivek Ramachandran Founder, SecurityTube.net and Pentester Academy This talk will introduce techniques to detect ...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Tamas Szakaly - Shall We Play a Game?
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 15, 2015 23:56 ★★★ - 4 ratingsMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Tamas-Szakaly-Shall-We-Play-A-Game-UPDATED.pdf Shall We Play a Game? Tamas Szakaly Lead security researcher @ PR-Audit Ltd., Hungary Everybody plays games, and a whole lot of people play...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Mahdi Namazifar - Detecting Randomly Generated Strings; A Language Based Approach
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 15, 2015 22:19 ★★★ - 4 ratingsMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mahdi-Namazifar-Detecting-Random-Strings-Language-Based-Approach.pdf Detecting Randomly Generated Strings; A Language Based Approach Mahdi Namazifar Senior Data Scientist, Talos Team, Cis...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Bruce Schneier - Questions and Answers
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 15, 2015 21:13 ★★★ - 4 ratingsBruce Schneier Q&A Bruce Schneier CTO, Resilient Systems Bruce Schneier Talks Security. Come hear about what's new, what's hot, and what's hype in security. NSA surveillance, airports, voting machines, ID cards, cryptography -- he'll talk about what's in the news and what matters. Always a liv...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Panel - DEF CON 101 The Panel
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 15, 2015 05:21 ★★★ - 4 ratingsDEF CON 101: The Panel. Mike Petruzzi (wiseacre), Senior Cyber Security Penetration Tester Nikita Kronenberg Not a Security Researcher, DEF CON PushPin Plug Russ Rogers Chief of Operations, DEF CON DEF CON has changed for the better since the days at the Alexis Park. It has evolved from a...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Ronny Bull & Jeanna Matthews - Exploring Layer 2 Network Security in Virtualized Environments
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 09, 2015 23:39 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-UPDATED.pdf Whitepaper Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Collin Cassidy, Robert Lee, Eireann Leverett - Switches Get Stitches
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 09, 2015 23:39 ★★★ - 4 ratingsMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Cassidy-Leverett-Lee-Switches-Get-Stitches.pdf Switches Get Stitches Colin Cassidy Senior Security Consultant at IOActive Éireann Leverett Robert M. Lee This talk will introduce you to...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Eric (XlogicX) Davisson - REvisiting RE:DoS
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 09, 2015 23:37 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Eric-XlogicX-Davisson-ReDoS.pdf REvisiting RE:DoS Eric (XlogicX) Davisson Not a security researcher Regular Expression Denial of Service has existed for well over a decade, but has not r...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Alessandro Di Federico & Yan Shoshitaishvili - Dark side of the ELF - leveraging dynamic loading to pwn noobs
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 09, 2015 23:37 ★★★ - 4 ratingsMaterials Available Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Alessandro-Di-Federico-Leakless-How-The-ELF-ruined-Christmas.pdf Dark side of the ELF - leveraging dynamic loading to pwn noobs Alessandro Di Federico PhD Student, Politecnico di Milano...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Chris Domas - REpsych: Psychological Warfare in Reverse Engineering
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 09, 2015 23:37 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Domas-REpsych.pdf REpsych: Psychological Warfare in Reverse Engineering Chris Domas Security Researcher Your precious 0-day? That meticulously crafted exploit? The perfect foothold...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Nadeem Douba - BurpKit - Using WebKit to Own the Web
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 09, 2015 23:36 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Nadeem-Douba-BurpKit.pdf Extras here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Nadeem-Douba-Extras.rar BurpKit - Using WebKit to Own the Web Nadee...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Joshua J. Drake - Stagefright: Scary Code in the Heart of Android
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 09, 2015 23:36 ★★★ - 4 ratingsMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joshua-Drake-Stagefright-Scary-Code-in-the-Heart-of-Android-UPDATED.pdf Stagefright: Scary Code in the Heart of Android Joshua J. Drake Sr. Director of Platform Research and Exploitation,...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Joe FitzPatrick & Matt King - NSA Playset: JTAG Implants
DEF CON 23 [Audio] Speeches from the Hacker Convention - October 09, 2015 23:36 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joe-FitzPatrick-Matt-King-NSA-Playset-JTAG-Implants-UPDATED.pdf Extras Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Joe-FitzPatrick-Matt-King-Ex...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Matteo Becarro & Matteo Collura - Extracting the Painful (blue)tooth
DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 06:15 ★★★ - 4 ratingsMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Matteo-Becarro-Matteo-Collura-Extracting-The-Painful-Bluetooth.pdf Extracting the Painful (blue)tooth Matteo Beccaro Matteo Collura Do you know how many Bluetooth-enabled devices are cu...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Fernando Arnaboldi - Abusing XSLT for Practical Attacks - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:28 ★★★ - 4 ratingsMaterials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Fernando-Arnaboldi-Abusing-XSLT-for-Practical-Attacks-UPDATED.pdf Whitepaper Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Fernando-Arnaboldi-Abusin...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Amit Ashbel & Maty Siman - Game of Hacks: Play, Hack & Track - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:28 ★★★ - 4 ratingsMaterials Available Here: ; https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Amit-Ashbel-Maty-Siman-Game-of-Hacks-Play-Hack-and-Track-UPDATED.pdf Game of Hacks: Play, Hack & Track Amit Ashbel Product Evangelist Checkmarx Maty Siman CTO and Founder Checkmarx F...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Brent White - Hacking Web Apps - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:28 ★★★ - 4 ratingsWhitepaper Here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Brent-White-Hacking-Web-Apps-WP.pdf Hacking Web Apps Brent White Security Consultant, Solutionary, Inc. Assessing the security posture of a web application is a common project for a penetration ...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Mark Ryan Talabis - The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:27 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Mark-Ryan-Talabis-The-Bieber-Project.pdf The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic Mark Ryan Talabis Chief Security Scientist, zVelo In the pas...
![DEF CON 23 [Audio] Speeches from the Hacker Convention artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c3/f8/7e/c3f87e44-fc95-645c-620b-3c8e5117429e/mza_5097239825481086059.jpg/100x100bb.jpg)
Chris Sistrunk - NSM 101 for ICS - 101 Track
DEF CON 23 [Audio] Speeches from the Hacker Convention - September 22, 2015 05:27 ★★★ - 4 ratingsMaterials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Sistrunk-NSM-101-for-ICS.pdf NSM 101 for ICS Chris Sistrunk Sr. ICS Security Consultant, FireEye Is your ICS breached? Are you sure? How do you know? The current state of securit...
Related Hacker conference Topics