Title |
Speakers |
Summary |
Topic Types |
Keynote Address: Internet Explorer Security: Past, Present, and Future |
Tony Chor
|
N/A |
|
Assessing Server Security - State of the Art |
Roelof ( RT ) Temmingh
|
N/A |
|
STIF-ware Evolution |
Tim Pritlove
,
Fyodor Yarochkin
,
Meder Kydyraliev
|
N/A |
|
VoIPhreaking: How to make free phone calls and influence people |
The Grugq
|
N/A |
|
How (and Why) to Build a Security Operations Center |
Mohammed Haron
|
N/A |
|
Web Hacking Kung-Fu and Art of Defense |
Shreeraj Shah
|
N/A |
|
Corp vs Corp: Profiling Modern Espionage |
Fabio Ghioni
,
Roberto Preatoni
|
N/A |
|
Hacking Windows CE |
San
|
N/A |
|
Social Engineering Fundamentals |
Anthony Zboralski
,
Dave Mckay
|
N/A |
|
Hide-And-Seek: Defining the Roadmap for Malware Detection on Windows |
Joanna Rutkowska
|
N/A |
|
Keynote Address: Mobile Malware |
Mikko Hypponen
|
N/A |
|
Nematodes - Beneficial Worms |
Dave Aitel
|
N/A |
|
Analyzing all that data: Techniques for sifting haystacks and finding needles. |
Jose Nazario
,
Zubair Khan
|
N/A |
|
Wi-Fi Hotspot Security |
Jim Geovedi
|
N/A |
|
Phishing Attacks: A Guide to Self Assessment |
Aaron Higbee
|
N/A |
|
Kernel Level Vulnerabilities |
Swaraj
|
N/A |
|
Hacking Internet Banking Applications |
Fabrice Marie
|
N/A |
|
Analyzing Code for Security Defects |
Nish Bhalla
|
N/A |
|
x.25 (in)security in 2005: WHAT, WHY, WHEN, WHO, HOW |
Raoul "Nobody" Chiesa
|
N/A |
|
Java & Secure Programming |
Marc Shoenefeld
|
N/A |
|