39:24 DEF CON 32 - Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ - Joseph Cox DEFCONConference 1.7M views - 1 year ago
32:55 DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro DEFCONConference 722.9K views - 4 months ago
20:31 DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin DEFCONConference 190.8K views - 2 years ago
31:20 Unraveling a REMOTE ACCESS TROJAN (VBScript Deobfuscation) John Hammond 176.3K views - 3 years ago
47:34 DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline DEFCONConference 686.9K views - 10 years ago
39:29 DEF CON 33 - Post Quantum Panic: When Will the Cracking Begin, & Can We Detect it? - K Karagiannis DEFCONConference 150.4K views - 4 months ago
42:55 DEF CON 32 - Counter Deception: Defending Yourself in a World Full of Lies - Tom Cross, Greg Conti DEFCONConference 267.3K views - 1 year ago
35:12 DEF CON 33 - China's 5+ year campaign to penetrate perimeter network defenses - Andrew Brandt DEFCONConference 104.2K views - 4 months ago
50:38 DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner DEFCONConference 39.7K views - 1 year ago
54:12 DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini DEFCONConference 290.9K views - 1 year ago