Robots are among us, but who takes responsibility? iOS malware: what's the risk and how to reduce it Why huntung IoC fails at protecting against targeted attacks Corporations - the new victims of targeted ransomware Le pentest pour les nuls #cybsec16 Understanding the fundamentals of attacks Introducing Man in the Contacts attack to trick encrypted messaging apps An easy way into your sap systems v3.0 Reverse engineering Swisscom's Centro Grande Modem Easy public-private-keys-strong-authentication-using-u2 f Create a-strong-two-factors-authentication-device-for-less-than-chf-100 Offline bruteforce attack on wi fi protected setup