Agenda
●
Examine different types of vulnerabilities from a hacker's standpoint
Look at the future of hacking
Look into the future of defensive measures