Cyber security professionals all around the world are publishing their presentations, videos, and seminars on the internet for readers like you that are interested in getting the latest and best information on cyber security, hacking and cybercrime.
The hacking presentations which are listed here have been collected from various sources like Youtube, Vimeo and personal websites. The hacking presentations have been handpicked and we hope that you will enjoy the presentations that have been listed.
The first one which we strongly recommend is the video from Samy Kamkar, he describes how he is able to build an autonomous drone that hijacks unprotected drones within WiFi distance. The video of Samy Kamkar has been viewed over 200 000 times and it is one of the latest videos which provide insight on Drone hacking techniques.
- Sony ARM GoogleTV: NSZ-GS7 Rooted Preview “Hacking The GoogleTV” Presentation Demo
- Black Hat USA 2013 – RFID Hacking: Live Free or RFID Hard – 01Aug2013
- DEF CON 22 Hacking Conference Presentation By Weston Hecker Burner Phone DDOS 2 dollars a day
- GTVHacker – Hacking the GoogleTV
- DEF CON 19 Hacking Conference Presentation By Ming Chow Abusing HTML5 Slides
- DEFCON 19: Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
- DEFCON 18: How I Met Your Girlfriend 1/3
- DEFCON 19: Three Generations of DoS Attacks (with Audience Participation, as Victims)
- DEFCON 20: Owned in 60 Seconds: From Network Guest to Windows Domain Admin
- DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars
- DEFCON 19: The History and the Evolution of Computer Viruses
- DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit ( w speaker)
- DEFCON 19: The Art of Trolling (w speaker)
- DEFCON 17: Advanced SQL Injection
- Password Sniffing with Wireshark (Laura Chappell)
- DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin!
- DEFCON 17: Stealing Profits from Spammers or: How I learned to Stop Worrying and Love the Spam
- DEFCON 17: Cracking 400,000 Passwords, or How to Explain to Your Roommate why Power Bill is a High
- DEFCON 20: Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data
- DEFCON 20: Bypassing Endpoint Security for $20 or Less
- DEFCON 20: Hacker + Airplanes = No Good Can Come Of This
- First human infected with computer virus
- WPA/WPA2 cracking tutorial
- DEFCON 16: Nmap: Scanning the Internet
- DEFCON 20: Owning Bad Guys {And Mafia} With Javascript Botnets
- DEFCON 19: Bosses love Excel, Hackers too. (w speaker)
- DEFCON 18: Pwned By The Owner: What Happens When You Steal a Hackers Computer
- Ping of death
- DEFCON 17: Making Fun of Your Malware
- DEFCON 18: How to Hack Millions of Routers