Shmoocon - hacker conference, which ranks with Defcon, CCC, HOPE, Black Hat. This year, videos of all speeches from the conference were published on the Internet Archive. There are direct links to MP4 and OGG files, as well as torrent.
Below is a list of some reports. A little more detail about them can be found in
the conference
schedule (maybe someone will agree to annotate videos) and from the pages with links below.
List of reports
Nobody knows online that you're dead . Most hackers have massive possessions online: various infrastructure, servers, social media, accounts, and more. What happens when one of us dies?
The user is also a person: how to create your tools . Computer security programs are developed without taking into account the UX-design and the needs of ordinary "average" users.
')
Opening remarks by Professor Neil Gershenfeld (Neil Gershenfeld).
Difficult hacking: lessons and conclusions drawn after the epic investigation , when the hacker used PowerShell, WMI, Kerberos attacks, modern presence methods, practically unlimited C2 infrastructure and half a dozen constantly evolving malware families.
LTE Security and ProtocolsLostPass: pixel-accurate LastPass phishingWhere do phishers live? Collecting geographical data about phisers from automated hanipotsOSX vulnerability research and why we wrote our own debuggerExamination of memory corruption vulnerabilities in the FreeRTOS operating systemHiding from the investigator: Understanding code signing in OS X and iOS to hide dataStatic analysis of mail via SMTP and malware using GPGPUReverse engineering of wireless SCADA systemsCreating an encyclopedia of configs for malwareMy hash is my passport: understanding web and mobile authenticationThis message will be destroyed in 10 seconds: avoid bilateral enucleationLinks to videos of other reports, see the
Shmoocon 2016 page.