.s02-poster.(16x9).jpg)
Hackers of CypherCon
2020•NR•58:00
In a time when tinkering with technology was a guarantee for ridicule and torment, a small group of curious explorers we...
2020•NR•44:00
Benjamin Heckendorn, a self-taught hacker, modder, and maker better known as Ben Heck, tackles fun and interesting proje...
2020•NR•43:00
This presentation explores forensic methodology using free open-source software, focusing not on available tools but on ...
2020•NR•41:00
This talk will be about hacking and phreaking in the late 1980s and early 1990s and what the scene was like back then co...
2020•NR•46:00
Brice Williams will look at some common cryptography usage errors and why popular libraries often fall short. He will al...
2020•NR•29:00
Anita will discuss how three communities, despite different incentives but shared goals, can collaborate to accelerate d...
2020•NR•40:00
In this talk, we'll be exploring how wireless communication works. We'll capture digital data live and see how the actua...
2020•NR•01:00:00
Security Orchestration, Automation and Response (SOAR) enables defenders to operate at attacker speed by codifying detec...
2020•NR•28:00
David reveals careless security mistakes, including overlooked controls and lazy admins. He shares real examples of pass...
2020•NR•21:00
Discover how medicinal mushrooms fight cancer, boost immunity, and improve cognition. This presentation covers key compo...
2020•NR•34:00
Read between the lines, usually refers to one's ability to infer hidden meaning from text. This talk will look at the to...
2020•NR•53:00
Espionage secretly gathers information to gain strategic or financial advantage. Judy presents military and industrial c...
2020•NR•39:00
United States military veteran Ken Grigas shares his experiences serving during the tense Cold War era between the Unite...
2020•NR•54:00
The last decade has demonstrated that cyberattacks on industrial control systems (ICS) are real and pose a serious threa...
2020•NR•58:00
With the rise of novel gene-editing techniques and our increasing knowledge of genomics, we are forced to confront the i...
2020•NR•20:00
Sequestered, cordoned off, separated, even out of touch. These words have been used by plenty of non-infosec folks. From...
2020•NR•50:00
New developments in Hashcat have brought some new WiFi attack techniques to light. We've taken concepts from classic WiF...
2020•NR•23:00
Steganography is the practice of hiding a message in plain sight inside an image, video, sound, text, or file. The pract...
2020•NR•37:00
In 2016, 791,820,040 data records were breached in the United States, which averages two breaches per American. France, ...
2020•NR•31:00
Tim Medin discusses the dumbest red team tricks and hacks encountered over the years. We are going to take the A out of ...
2020•NR•43:00
This presentation is aimed at helping developers avoid common cryptography pitfalls when encrypting sensitive data by gi...