
August 2019
Security


A Previvors Story of Uncovering Massive Zero Day - DEF CON 27 Bio Hacking Village
Andrea Downing
August 2019
Security


DIY Medicine The Ethics of Hacking Pharma - DEF CON 27 Bio Hacking Village
Alex Pearlman
August 2019
Security


Employ Cybersecurity Techniques - DEF CON 27 Bio Hacking Village
Eric D Perakslis
August 2019
Security


Forensic Science and Information Security Lifetime - DEF CON 27 Bio Hacking Village
Najla Lindsay
August 2019
Security


Liven Up Augmenting Materials Bio Hybrid Function - DEF CON 27 Bio Hacking Village
Rachel Smith
August 2019
Security


The Attack Surface of a Networked Medical Device - DEF CON 27 Bio Hacking Village
Dr Avi Rubin