Quick Overview: Android malware creators constantly struggle to devise innovative methods to obscure apps and impede reverse engineering. As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ... Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ...

Def Con 31 Runtime Riddles - Detailed Overview & Context

Android malware creators constantly struggle to devise innovative methods to obscure apps and impede reverse engineering. As cyber threats continue to evolve, attackers constantly develop new methods for exploiting system vulnerabilities and evading ... Logs are a vital component for maintaining application reliability, performance, and security. They serve as a source of information ... Android devices are constantly improving their security to protect against attackers with physical access, with new protection ... For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ... What is it actually like to support and balance a global anonymity network, with users ranging from political dissidents to national ...

Have you ever wondered how you can access your family pictures on your home network-attached storage (NAS) device remotely ... Silk gets the details on the Password Cracking Village created by: ... To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ... SATURDAY 9 August 2025: 6PM - 10PM LOCATION: ... Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ... In 2014, someone by the name of Spencer Lucas released the “One Bitcoin Book“, a set of 20 clues that when solved, unlocked a ...

Photo Gallery

DEF CON 31 - Runtime Riddles - Abusing Manipulation Points in the Android Source - Laurie Kirk
DEF CON 31 - Exploring Linux Memory Manipulation for Stealth and Evasion - Polop, Gutierrez
DEF CON 31 - Weaponizing Plain Text  ANSI Escape Sequences as a Forensic Nightmare - STÖK
DEF CON 31 - Physical Attacks Against Smartphones - Christopher Wade
DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin
DEF CON 33 - Stories from a Tor dev - Roger 'arma' Dingledine
DEF CON 31 - A Pain in the NAS  Exploiting Cloud Connectivity to PWN your NAS - Moshe, Brizinov
DEF CON 31 - Password Cracking Village Interview - video team
DEF CON 31 - Attacking And Securing the Pixel Modem  - Karimi,  Xing , Gong, Rodionov
DEFCON 33 FIND THE HACKER - ROOM RIDDLE - NULL404
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris
DEF CON 31 -  Hacker Badges Interview - video team
Sponsored
Sponsored
View Main Result
Sponsored
Sponsored