HOME
ABOUT
TRAINING
CXO BRIEF
CONFERENCE
TICKETS
MERCHANDISE
POSTS
CONTACT US
More
0
All Posts
Talks
Workshops
Training
Kampung (Village)
CTF
Electronic Badge
Today I Learned
Search
Introduction to YARA — by Matt Brooks
Hardware Hacking Live: Workshop, Q&A — by Joe FitzPatrick
The Human Nature of Cybersecurity — by Dr. Jessica Barker
Death, Taxes & IT Security — by Julian Ho
IoT: An Approach Into Analysis Smartlocks — by Lucas Kauffman
Catching Bad Guys with Machine Learning — by Eugene Teo
Getting Started with Windows Security Research — by James Forshaw
Security Is An Illusion: Why Robbing Banks Is Easy — by FC
Picking Your Favourite Children: Security Programmes Are Not Created Equal — by Iftach Ian Amit
Casing the Joint — How Good Preparation Is the Key To Any Social Engineering Exercise —by Ian Maxted
Think Like a Hacker — by Tachfine El Belky
What's Lurking In Your Home Network — by Christopher Lek
What Can We Do To Stop the Rot — by Stephen Kapp
Anatomy & Impact of Hardware Attacks — by Joe FitzPatrick
Let Me Pick Your Brain — by Vitaly Kamluk & Nicolas Collery
Mobile Banking with Cellular Security on iOS & Android Devices — by Egor Saltykov & Viktor Vukolov
Deep-Web Analysis & Threat Monitoring with Machine Learning — by Louis Hur
Maximise the Power of Hex-Rays Decompiler — by Igor Kirillov
IoT Army — Poking Botnets with a Honeypot — by Tan Kean Siong
A Bridge Too Far — by James Forshaw
2
3
4
5
6