Top Talks @ DEF CON 26: Your Complete Guide

8669827490?profile=original

Top Talks @ DEF CON 26, 2018: Your Complete Guide

Our editorial team has handpicked the best of the best talks at DEF CON 26 -is one of the world's largest hacker conventions, held annually in Las Vegas, Nevada. Following is the list of top Emerging Areas In Security Technology talks at DEF CON 26.

DEFCON 201826th Def-Con Hacking Conference is among one of the most main event on Computer, Information Technology, Cyber Security, Software, Hacking and Hack topics.

The Index below will help you navigate on this page. Each link will take you to the individual presentations. We have marked some particular slide number from each presentation which are particularly interesting. So, here's your shortcut to a full conference!

Index: Top Talks Handpicked by CISO Platform Editorial Team

(Click on the sections below to go directly to respective sections)

2n80lg0.jpg?width=750

1) Top talks on Android Security from DEF CON 26

Here are some great talks from DEF CON

Go Back To The Index

2rnifte.jpg?width=750

2) Top talks on Application Security from DEF CON 26

Here are some great talks from DEF CON which can help you understand how diverse the field of Application Security is and a holistic view of the advancements.

Go Back To The Index

10yjqzq.jpg?width=750

3) Top talks on Authentication Security from DEF CON 26

Here are some great talks from DEF CON

Go Back To The Index

2rx72ad.jpg?width=750

4) Top talks on Blockchain from DEF CON 26

Here are some great talks from DEF CON

  • You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts ... Go To Presentation
  • Tineola: Taking A Bite Out of Enterprise Blockchain ... Go To Presentation

Go Back To The Index

316kmlg.png?width=750

5) Top talks on Hacking from DEF CON 26

Here are some great talks from DEF CON

Go Back To The Index

jhaohk.jpg?width=750

6) Top talks on Hardware Security from DEF CON 26

Here are some great talks from DEF CON

Go Back To The Index

5k3dw7.jpg?width=750

7) Top talks on IoT Security from DEF CON 26

Here are some great talks from DEF CON

  • YOU'D BETTER SECURE YOUR BLE DEVICES OR WE'LL KICK YOUR BUTTS ! ... Go To Presentation
  • Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS & MODERN CITIES ... Go To Presentation
  • Who Controls the Controllers—Hacking Crestron IoT Automation Systems ... Go To Presentation

Go Back To The Index

8669820096?profile=original

8) Top talks on MAC/iOS Security from DEF CON 26

Here are some great talks from DEF CON

Go Back To The Index

8669822098?profile=original

9) Top talks on Malware from DEF CON 26

Here are some great talks from DEF CON

  • Looking for Perfect Signature : An Automatic YARA Rules Generation Algorithm in the AI-era ... Go To Presentation
  • RING 0/-2 ROOKITS : COMPROMISING DEFENSES ... Go To Presentation
  • Finding Xori: Malware Analysis Triage with Automated Disassembly ... Go To Presentation
  • Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability ... Go To Presentation

Go Back To The Index

scxrtc.jpg?width=750

10) Top talks on Security Research from DEF CON 26

Here are some great talks from DEF CON

  • Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones) ... Go To Presentation
  • You’re Just Complaining Because You’re Guilty: A DEF CON Guide to Adversarial Testing of Software Used in the Criminal Justice System ... Go To Presentation

Go Back To The Index

2411md0.jpg?width=750

11) Top talks on Vulnerabilities & Exploits from DEF CON 26

Here are some great talks from DEF CON

  • Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts,Government, Smart cities and more ... Go To Presentation
  • FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point of sales systems ... Go To Presentation
  • UEFI Exploitation For The Masses ... Go To Presentation
  • All your math are belong to us ... Go To Presentation
  • All your family secrets belong to us—Worrisome security issues in tracker apps ... Go To Presentation
  • Automated Discovery of Deserialization Gadget Chains ... Go To Presentation
  • Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities ... Go To Presentation
  • Exploiting Active Directory Administrator Insecurities ... Go To Presentation
  • Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits ... Go To Presentation

Go Back To The Index

10s66th.jpg?width=750

12) Top talks on Windows Security from DEF CON 26

Here are some great talks from DEF CON

Go Back To The Index

8669813498?profile=original

Discover & Compare 1000+ Cyber Security Products (It's Free!)

FireCompass is an AI Assistant for Cyber Security Decision Making. Discover & Compare 1,000+ Cyber Security Products. Grab your FREE Account Now (For a Limited Time ONLY).

>>Click Here To Sign Up For FREE

8669813678?profile=original

Pre Register For SACON -  India's First Security Architecture Conference

Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in February, 2019. Pre-Register and get special discount access and talk highlights.

>>Click Here To Pre Register & Avail Special Discounts

Go Back To The Index

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)