Notacon 2014 April 10, 2014 to April 13, 2014, Cleveland,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Wearable Technology as Art for Countersurveillance, Cinemaveillance, and Sousveillance Ross Bochnek This presentation shows how art and design, including wearable technology and Performance Art, contributes to ...
Microsoft Vulnerability Research: How to be a finder as a vendor Jeremy Brown , David Seidman You may think of Microsoft as a company that fixes vulnerabilities, but we frequently find ...
Little Hackers Playdate Janet Kadiera Callahan Little Hackers Playdate has been offered the last two years, and has been a rousing ...
MDM is gone, MAM is come. New Challenges on mobile security Yury Chemerkin “Last years, we have been observing a market expansion on compliance, guidelines and best practices ...
Lessons Learned Implementing SDLC – and How To Do It Better Sarah Clarke Developers and Quality Engineers are wonderful people who understand how to create, test, and validate ...
Naisho DeNusumu (Stealing Secretly) – Exfiltration Tool/Framework Adam Crompton Naisho DeNumsumu – POC exfiltration tool created in Python. Using ways to hide data through ...
A Brief Introduction to Game Theory Charlotte Dekoning From game shows to warfare, strategic decision-making surrounds us every day, whether you realize it ...
Pwning the POS! Mick Douglas Everybody’s talking about the Target breach. However, there’s lots wrong with the retail space… and ...
Big Data Technology – The Real World ‘Minority Report’ Brian Foster This talk will take a deep dive into the role of Big Data technologies and ... IncludeThinkstScapes
DIY Autonomous Quadcopters using Android ( + Demo Flight! ) Brian Gesler This presentation is about building a quadcopter from the ground up. I will take you ...
Living in the Future: It seems to be in Beta Jeff Goeke-smith Living in the future is hard. For many years, Jeff has been exploring new user ...
Malware Analysis 101 – N00b to Ninja in 60 Minutes Grecs Knowing how to perform basic malware analysis can go a long way in helping infosec ...
Plunder, Pillage and Print Deral Heiland , Peter Arzamendi In this presentation I will go beyond the common printer issues and focus around penetration ...
Dominate! (Or let your computer do it for you.) Paul Jarc Dominion is a deck-building card game–a bit like Magic: The Gathering, except that choosing the ...
Moving the Industry Forward – The Purple Team David Kennedy Let’s start off with a strong statement – pentesting today isn’t working. The blue team ...
Wireless Mesh Protocols Alex C. Kot I plan to explain different ad-hoc mesh protocols and the difference between them. I also ...
Satin Weave Krüe Three Apple //c computers generate video and sound driven by the machine’s unique circuitry
Hacking Your Way Into the APRS Network on the Cheap Mark Lenigan APRS (Amateur Packet Reporting System) is a twenty-something year-old packet radio network run by amateur ...
building a private data storage cloud Michael Meffie Hey, get off of my cloud. In this talk Mike will describe how you can ...
Omega – A Universe Over IP Mo Morsi The Omega Project is an open source Universe Simulator built ontop of the JSON-RPC protocol. ...
Beyond Using The Buddy System Holly Moyseenko , Kris Perch “Beyond Using The Buddy System” is a workshop that aims to break down myths regarding ...
Science “Fair” The Nomad Clan Sometimes the biggest challenge at getting young minds, let alone old ones, into science is ...
Collaboration between Artificial Intelligence and Humans: How to cure every disease within 50 years Joe O’donnell The way to supercharge Biotechnology development with computer automation, is not to focus on the ...
Nindroid: Pentesting Apps for your Android device Michael L. Palumbo We explore the different “apps” available for the android platform that one can use for ...