Pilar Speranza-Weigel

Pilar Speranza-Weigel Yuliana Bellini

Yuliana Bellini

Online Dating Scams – Low Blows

Over time dating scams have claimed many victims, becoming an immense industry that uses psychological approaches, photographers, graphic designers, call centers, extortion and blackmail, as well as human trafficking. These scams have been around for many years, and they continue to grow and evolve, and the hackers have become much more elaborate and sophisticated with their methodologies, making them even more profitable than ever. We will dissect this dark business and identify its patterns and vulnerabilities, as well as bring awareness to a topic that is not often discussed.


Dr K, Jen and Darren

Dr K, Jen and Darren

Brain Hacking – Train Your Brain for Love, Joy and Peace

Meditation is becoming a buzz-word for “beating” stress but seems very complicated to learn. We will show how DIY (Do It Yourself) brain technology projects such as DIY EEG (electroencephalogram) and tDCS (Transcranial direct current stimulation) can actually work as training wheels for a relaxed and energized mind. Transcranial direct current stimulation (tDCS), is a non-invasive, painless brain stimulation treatment that uses direct electrical currents to stimulate specific parts of the brain. A constant, low intensity current is passed through two electrodes placed over the head which modulates brain activity.

Volunteers will be invited for on-screen demos and DIY designs will be shared.

Disclaimer:  These are not FDA approved devices, caution must be observed. Do at your own risk


Daniel Creed

Daniel Creed

Stop, think about the psychology of the hack and hacker FIRST!

We are by nature technologist, and far to often when we see something suspicious on the network, we immediately jump to a technological solution without stopping to think about the psychology of what we are seeing, and what that can mean in the form of an attack/breach.


F4R4D4Y

F4R4D4Y

Epstein Faraday didn’t kill himself

What happens when a social-media addicted hacker and Twitter Troll quits the internet for six months? What happens to a human being – whom are social animals – when their main contact methods with friends, family, enemies, and coworkers is dissolved?
Did erasing his data from OSINT and family tree/ancestry sites help with privacy, at least? What about the memes? WHAT ABOUT THE MEMES?!
Listen to his story how it simultaneously saved and ruined his social life at the same time as his health improved (with all the consequential data he could collect) to help you make an informed decision if you decide to make the ultimate pièce de résistance of our digital age.

Alyssa Miller

Alyssa Miller

KEYNOTE: Stealing Reality – Deepfakes Ushering in a New Paradigm of Attacks

As a result of continuing advancements in neural networks, deep fake media has become increasingly convincing and easy to produce. Experts have warned of the impact this could have on elections and personal security. Additionally, deepfakes also pose very real threats to businesses and global markets, although these threats receive far less attention. Hacker and Security evangelist Alyssa Miller will analyze the technology behind creating deep fake media, showing how Generative Adversarial Networks (GAN) create convincing fake videos and audio from very limited samples. She will examine research into both low-tech and AI/ML based detection methods and counter measures, including leveraging the same neural network approaches being used to create deep fakes to help detect them. She’ll continue by discussing the theory and research behind
countermeasures such as Adversarial Perturbations and show how they can defeat facial recognition algorithms that deepfake generation relies on. Finally, Alyssa will present methods being developed to help certify the authenticity of real media.

As she concludes, Alyssa will offer up a hopeful viewpoint of the good that can be accomplished through the use of deepfake technology. From its use in entertainment, to improved analysis of medical imaging and even how GANs are being leveraged in malware identification.