Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
Black Hat USA 2013 - OPSEC failures of spies
Black Hat USA 2013 Keynote - Gen. Alexander
Black Hat 2013 - TOR... ALL-THE-THINGS!
Black Hat 2013 - How to Build a SpyPhone
Black Hat USA 2013 - Lessons from Surviving a 300Gbps Denial of Service Attack
Black Hat USA 2013 - SSL, gone in 30 seconds - a BREACH beyond CRIME
Black Hat 2013 - Android: One Root to Own them All
Black Hat USA 2013 - CreepyDOL: Cheap, Distributed Stalking
Black Hat 2013 - Spy-jacking the Booters
Black Hat USA 2013 - Pass the Hash 2: The Admin's Revenge
Black Hat USA 2013 - Hacking like in the Movies: Visualizing Page Tables for Local Exploitation
Black Hat EU 2013 - Dude, Where's My Laptop?
Black Hat EU 2013 - Practical Exploitation Using A Malicious Service Set Identifier (SSID)
Black Hat 2013 - Million Browser Botnet
Black Hat USA 2013 - TOR... ALL-THE-THINGS!
Black Hat 2013 - End-to-end Analysis of Domain Generating Algorithm Malware Family
Black Hat EU 2013 - Hacking Appliances: Ironic exploitation of security products
Black Hat USA 2013 - Fact and Fiction: Defending your Medical Devices
Black Hat USA 2013 - How to Build a SpyPhone