Kawaiicon

Talk topics included: the psychology of user security errors, information warfare, hiding files in RAM, cracking with PlayStation,[8][9] and attacks on: kiosks, telecommunications company ethernet, non-IP networks, and a serious Windows hole.

Topics included: mass surveillance, using honeypots to detect malicious servers, physical security, using search engine optimization to make websites disappear from search results, Bluetooth surveillance, Internet probe counterattacking, speed hacking, and attacks on: wired and mobile phone systems, biometrics, Citrix XenApp, and Windows Vista via heap exploitation.

Talk topics included: professional vulnerability research, identifying online identities using Bayesian inference, social engineering, radio sniffing, defending against denial-of-service attacks, Linux rootkits, an introduction to the New Zealand Internet Task Force, and attacks on: physical access control systems, GPS, smart cards, shared hosting platforms, ActiveSync, iOS App Store, pagers, wireless routers, and scientific software.

Some talk topics included: a survey of unpatched devices connected to the internet, fast data erasure, urban exploration, web scraping, wardriving with Arduino, New Zealand's proposed Search and Surveillance Act, and attacks on: RFID tags, Internet exchange points, Amazon Kindle, Microsoft Office and Java serialization.

Talk topics included: hacktivist communities, measuring security, security lifecycle, one-time audio passwords, Bluetooth sniffing, biohacking,[14] phishing, stealth web application reconnaissance, remote wiping smartphones connecting to Exchange,[15] a social network monitoring tool, and a wardriving motorcycle.

Talk topics included radiation-induced cryptographic failures, a story of active incident response against attacks on Pacnet from Telstra researchers, a phishing automation tool, benefits of containers enabling an application to contain itself, the disconnect between security and business, spoofing GPS by changing the time, why machine learning exploitation is good, a history of lockpicking, remote activation of swipe-card readers, and exploits for iClass RFID, GUIs, macOS, native web-based applications, PHP 7, insecure random number generation, Amazon Web Services, infrared devices, NodeJS, and HTML _blank.

Kiwicon X, held at the Michael Fowler Centre in Wellington (2016)
Peter Gutmann speaking at the first Kawaiicon (2019).