DeepSec 2011: Identity X.0 - Securing the Insecure
DeepSec 2011 Identity X 0 Securing the Insecure
Identity X 0 Securing the Insecure DeepSec 2011
DeepSec 2011: Intelligent Bluetooth Fuzzing - Why bother?
DeepSec 2011: Advances in IDS and Suricata
DeepSec 2011: Patching Vehicle Insecurities
DeepSec 2011: How To Rob An Online Bank And Get Away With It
DeepSec 2011: Behavioral Security: 10 steps forward 5 steps backward
DeepSec 2011: Human Factors Engineering for IT Security
DeepSec 2010: All Your Baseband are belong to Us
DeepSec 2011: On Cyber-Peace: Towards an International Cyber Defense Strategy
DeepSec 2011 On Cyber Peace Towards an International Cyber Defense Strategy
DeepSec 2011: Conference US Experience - Laws, Compliance and real Life
CIC News 23-08-2012: Plan X, DeepSec 2011,F-Secure
aitel_usenix.mp4
DeepSec 2010 Detection of Hardware Keyloggers
Secure Bluetooth pairing made easy with ST25 NFC - Webinar Replay
BlackHat 2011 - Auth: Securing the insecure
DeepSec 2009: TwitterRisks Bot CC, Data Loss, Intel Collection & More
DeepSec 2009: A Practical DoS Attack against the GSM Network